Shaarli export of all bookmarks on Sat, 03 Feb 24 17:10:28 -0500

Rook to XSS: How I hacked chess.com with a rookie exploit
Faction: Open-source pentesting report generation and collaboration framework - Help Net Security
Understand Linux Shell and Basic Shell Scripting - Part 1
5 Useful Shell Scripts for Linux Beginners - Part 2
Learn Practical BASH Scripting Projects - Part III
Japan will no longer require floppy disks for submitting some official documents
Vagrant on Windows: Simplifying Dev Environment Configuration
Tips for Vagrant on Windows - /* steve jansen */
Dracut emergency! LVM label missing after fdisk catastrophe | Technical Prose
Throughput vs Latency: The Yin and Yang of Software Performance - Geeks with Blogs
API security in 2024: Predictions and trends - Help Net Security
Mailtrap Service Review: Pros and Cons - Geeks with Blogs
Proxmox and OpnSense Crashing – ZenCoffee Blog – random notes, guides, and thoughts…
JSON Web Key Sets (JWKS) Ultimate Guide - Geeks with Blogs
What is a Technical Debt Register Template? - Geeks with Blogs
This Free App Is The Fastest Way To Get Through U.S. Immigration - foXnoMad
Why speed tests aren’t always the answer when troubleshooting Wi-Fi networks | The Packetologist
2024-01-21 multi-channel audio part 1
NSA admits to buying Americans’ web browsing data from brokers without warrants
Soo, you got access to Copilot, now what? Here are some best practices – msunified.net
ere
How to properly decommission a VMware ESXi Host - The Tech Journal
Packer - Use the SSH communicator for Windows images - ivobeerens.nl
Five Truths in Veeam's 2024 Data Protection Trends Report - The things that are better left unspoken
Backups still matter in 2024! VMs are only 25% of the problem 74% of enterprise organizations back up Microsoft 365 data Recovery test results are in – and sobering… "only 32% of organizations can recover a 50-server site within a business week. " 54% of organizations are very likely to change backup solutions in 2024
AWS Weekly Roundup—Amazon Route53, Amazon EventBridge, Amazon SageMaker, and more – January 15, 2024 | AWS News Blog
Book Recommendations from the AWS Enterprise Strategy Team | AWS Cloud Enterprise Strategy Blog
Locating Leviathan Files in Linux | Linux Journal
du -h --max-depth=1 /var | sort -hr | head -10
Understanding System Log Management Using Logrotate | Linux Journal
Migrate Red Hat AAP or AWX to Ascender with Automation | Greg Sowell Saves The World
Passing Ansible Variables In Workflows Using set_stats | Greg Sowell Saves The World
When is a client problem also an AP problem? | The Packetologist
Build your own container on Linux | Opensource.com
Fabric - Run Shell Commands Remotely Over SSH in Linux
Agile Principles in Software Development – Business
AlmaLinux Becomes More Than Just Another RHEL Clone With 9.3 Release - FOSS Force
Amazon ECS supports a native integration with Amazon EBS volumes for data-intensive workloads | AWS News Blog
The FDA has reportedly approved an AI product that predicts cognitive decline
De-duplicating $PATH
New Insights for the CASP+ CAS-004 Exam - WyzGuys Cybersecurity
Edge Browser Refusing a Self-Signed Certificate | Easy Bypass – CubicleNate's Techpad
That grumpy BSD guy: The 'sextortion' Scams: The Numbers Show That What We Have Is A Failure Of Education
Your People Are Routing Around Your IT Security
This tells me that there are a number of things going on, possibly. The rules are too strict and too inflexible. – Having a website or file storage location that a third party is using to work with your folks, that they can’t get access to means they don’t even bother coming to you anymore. That’s not good. Your users do not have the proper tools to collaborate with people outside of your environment. Your impression of how often this kind of thing happens is probably wrong.
E-Waste Is a Cybersecurity Problem, Too - IEEE Spectrum
Shegerian: I once had a big, big bank call me up: “John, we’ve had a breach, but we don’t believe it’s phishing or software. We think it came from hardware.” I go out thShegerian: I once had a big, big bank call me up: “John, we’ve had a breach, but we don’t believe it’s phishing or software. We think it came from hardware.” I go out there and it turns out one of their bankers threw his laptop in the trash in Manhattan and someone fished it out. On that laptop was information from the many clients of the entire banking firm—and the bank’s multibillion-dollar enterprise. The liability, the data…God, just absolutely priceless. If it got into the wrong people’s hands, the ransom that could have been extracted was truly of huge magnitude. ere and it turns out one of their bankers threw his laptop in the trash in Manhattan and someone fished it out. On that laptop was information from the many clients of the entire banking firm—and the bank’s multibillion-dollar enterprise. The liability, the data…God, just absolutely priceless. If it got into the wrong people’s hands, the ransom that could have been extracted was truly of huge magnitude.
Preserving IT Expertise: A Comprehensive Guide to Knowledge Transfer Strategies
Driven: The Four Drives Underlying Our Human Nature - Driven: How Human Nature Shapes Organizations - HBS Working Knowledge - Harvard Business School
we all are driven by four biological motivations: acquiring, bonding, learning, and defending.
Essential Midlife Career Change Frameworks & Mental Models
tailscale, Magic DNS, proxmox, and LXC | Nelson's log
OpenSSF Scorecard
Docker Security - OWASP Cheat Sheet Series
Container Tools, Tips, and Tricks - Issue #2
20 Terraform Best Practices to Improve your TF workflow
OpenTofu retained all the features and functionalities that had made Terraform popular among developers while also introducing improvements and enhancements. OpenTofu is the future of the Terraform ecosystem, and having a truly open-source project to support all your IaC needs is the main priority.
Tetragon Cloud Native Security - RodrigTech
Building OCI Images with Buildah
GitHub - masonr/yet-another-bench-script: YABS - a simple bash script to estimate Linux server performance using fio, iperf3, & Geekbench
Cybersecurity Maturity Model Certification Program Proposed Rule Published > U.S. Department of Defense > Release
HXServers Deadpools Due to ‘IPXO IP Revocation’ - LowEndBox
Chris's Wiki :: blog/spam/DKIMAloneMeansLittle
Vx Underground
Worried about Overfunded 529 Balances? The Half-Time Community College Method — My Money Blog
examples.el/README.org at master · lujun9972/examples.el · GitHub
Fix slimy plastic - The Silicon Underground
Fix 3.5-inch floppy drives with these easy tips - The Silicon Underground
Using terrascan to detect compliance and security violations -- Prefetch Technologies
PEStudio: Program analysis for Windows | Born's Tech and Windows World
DICOM protocol: Millions of patient data accessible unprotected via the Internet | Born's Tech and Windows World
21 Examples to Manage Secrets using AWS Secrets Manager CLI
/etc/hosts and the thousand-characters-long line | The eternal fight between admins and computers
https://documents.uow.edu.au/~blane/netapp/ontap/nag/networking/concept/c_oc_netw_maintaining_host_file_limits.html The following are hard limits for the /etc/hosts file: Maximum line size is 256. Maximum number of name servers is 3. Maximum domain name length is 256. Maximum search domains limit is 6. The total number of characters for all search domains cannot exceed 256. No file size limit.
Linux and bad memory | Nelson's log
LXC by hand | Nelson's log
Proxmox Linux container sizes (Alpine etc) | Nelson's log
Managing VMware Infrastructure with Ansible | Windows OS Hub
Cloning a physical Linux system into a Proxmox VM | Nelson's log
Database Backups to B2 Using Restic – Stuff I'm Up To
Vagrant and Ansible – Stuff I'm Up To
Manage EDI at scale with new AWS B2B Data Interchange | AWS News Blog
Automatic restore testing and validation now available in AWS Backup | AWS News Blog
Check your AWS Free Tier usage programmatically with a new API | AWS News Blog
Use Amazon CloudWatch to consolidate hybrid, multicloud, and on-premises metrics | AWS News Blog
New Cost Optimization Hub centralizes recommended actions to save you money | AWS News Blog
8 Linux Commands: To Find Out Wireless Network Speed, Signal Strength And Other Information - nixCraft
nmcli dev wifi
Handout from "Ethical Implications of Generative AI for the Michigan Lawyer" Presentation | DennisKennedy.Blog
What is RoPA? Records of Processing Activities Explained - Securiti
Records of Processing Activities
Privacy in Education: Guide for Parents and Adult-Age Students | Privacy Rights Clearinghouse
Data
2019 Consumer Data Privacy Legislation
Your Smart TV Knows What You’re Watching – The Markup
Backing up photos from Android to Debian - P.T.C.
Make sure to unmount any automated mounts. gphotofs ~/Camera/mnt ls -al ~/Camera/mnt mkdir -p ~/Camera/mnt mkdir -p ~/Pictures/Camerabackup cd ~/Pictures/Camerabackup rsync -av ~/Camera/mnt fusermount -u ~/Camera/mnt
GitHub - mrrfv/open-android-backup: Back up your device without vendor lock-ins, using insecure software or root. Supports encryption and compression out of the box. Works cross-platform.
Introducing the VGHF Digital Library | Video Game History Foundation
AWS Control Tower adds new controls to help customers meet digital sovereignty requirements | AWS News Blog
Logging, Monitoring and Observability - Same same, or different? - Cloud for the win!
(19) vCenter Database (VCDB) 101 | LinkedIn
(375) Azure Terraform Export Tool - What's New? - YouTube
Azure Terraform Export Tool formerly called Terrafy
Patch a VMware ESXI host with the ESXCLI command and choose the right image profile - ivobeerens.nl
How to Install the vSphere vCenter Root Certificate
Snap lays off 20 product managers to speed up decision-making
Running Graylog on Windows | Virtually Fun
Three new capabilities for Amazon Inspector broaden the realm of vulnerability scanning for workloads | AWS News Blog
Amazon Inspector introduces a new set of open source plugins and an API allowing you to assess your container images for software vulnerabilities at build time directly from your continuous integration and continuous delivery (CI/CD) pipelines wherever they are running. Amazon Inspector can now continuously monitor your Amazon Elastic Compute Cloud (Amazon EC2) instances without installing an agent or additional software (in preview). Amazon Inspector uses generative artificial intelligence (AI) and automated reasoning to provide assisted code remediation for your AWS Lambda functions.
Improve developer productivity with generative-AI powered Amazon Q in Amazon CodeCatalyst (preview) | AWS News Blog
Join the preview of Amazon Aurora Limitless Database | AWS News Blog
Amazon EBS Snapshots Archive is now available with AWS Backup | AWS News Blog
Charlie Munger CNBC Final Interview 2023: Highlights & Transcript — My Money Blog
The iron rule of life is everybody struggles.
A Tribute To Charlie – The Felder Report
RIP Charlie Munger: Thank You For Sharing Your Wit and Wisdom — My Money Blog
CCNA Training » CCNA Most Popular Questions
Chris's Wiki :: blog/linux/ZFSSortingOutPoolFeatures
New – Block Public Sharing of Amazon EBS Snapshots | AWS News Blog
New – Manage Planned Lifecycle Events on AWS Health | AWS News Blog
Microsoft drops SMB1 firewall rules in new Windows 11 build
Reflecting on 20 years of Windows Patch Tuesday | Windows Experience Blog
Digital Transformation in the UK Is Propelled by the Cloud – Business
Setup Harbor Proxy Cache and Harbor Container Webhook to overcome Docker Hub Pull Limits in Kubernetes | viktorious.nl – All things cloud-native
CI / CD Deployment of Conditional Access Policies for a Zero Trust Architecture Framework using Terraform and GitHub Actions
What’s new in the Azure Well-Architected Framework - Thomas Maurer
(335) Terraform On A Dime: Building Azure Infrastructure on a Shoestring Budget with Mark Tinderholt - YouTube
GitHub - Azure/review-checklists: This repo contains code and examples to operationalize Azure review checklists.
Data Protection Tips - Next Level SDDC
Chris's Wiki :: blog/sysadmin/OpenSSHWhatKeysForKeysigning
Automating Tasks Using Bash Scripts and Cron Jobs with AWS
Best Practices for Patching VMware vSphere | VMware
Every car is a smart car, and it's a privacy nightmare
Researchers posed as foreign actors, and data brokers sold them information on military servicemembers anyway
Non-interactive SSH password authentication
Moving to cloud is more than just a purchasing exercise · Major Hayden
Infracost: The Cloud’s Checkout Screen
The Art of Writing a Good Root Cause Analysis/Reason for Outage - LowEndBox
How to run an LLM locally with Arch Linux
AVX2
Best Practices for Patching VMware vSphere | VMware
Terence Luk: Deploy a ChatGPT service with Azure OpenAI Service in 6 minutes with PowerShell
are NOT available to other customers. are NOT available to OpenAI. are NOT used to improve OpenAI models. are NOT used to improve any Micro
New Horizons for EL: OpenELA Publishes Package Sources
Charlie Munger Acquired Podcast Interview w/ Transcript (October 2023) — My Money Blog
Project Gemini
GitHub - kr1sp1n/awesome-gemini: A collection of awesome things regarding the gemini protocol ecosystem.
Techrights — Our Second Month in Our Virtual Private Server
Losslessly splitting videos by chapter using bash and ffmpeg - Albert Armea
ffmpeg -i "$SOURCE.$EXT" 2>&1 | grep Chapter | sed -E "s/ *Chapter #([0-9]+\.[0-9]+): start ([0-9]+\.[0-9]+), end ([0-9]+\.[0-9]+)/-i \"$SOURCE.$EXT\" -vcodec copy -acodec copy -ss \2 -to \3 \"$SOURCE-\1.$EXT\"/" | xargs -n 11 ffmpeg
The US Senate and Silicon Valley reconvene for a second AI Insight Forum
AHCI vs. NVMe - Phison Blog
Formatting Terraform Code With the Terraform fmt Command
How To Use Docker Save Image and Export for Sharing
How to Read CSV in Python, Write and Append Too
How to Set up Pi-hole in Docker Container
WWoIT - Wayne's World of IT: VMware Command-Line Interface commands
WWoIT - Wayne's World of IT: More useful command-lines
Peace of Mind with Restic Backup on Linux
How to Reduce Docker Image Size in Docker Containers
10 Top Open Source Artificial Intelligence Tools for Linux
1. Deep Learning For Java (Deeplearning4j) 2. Caffe – Deep Learning Framework 3. H20 – Distributed Machine Learning Framework 4. MLlib – Machine Learning Library 5. Apache Mahout 6. Open Neural Networks Library (OpenNN) 7. TensorFlow 8. PyTorch 9. Apache SystemDS 10. NuPIC
Google ads for KeePass, Notepad++ lead to malware - Help Net Security
2023-10-15 go.com
Four Customers Who Found Out the Hard Way You Need To Backup Your Cloud Data - LowEndBox
Convert an Existing System to Use Thin LVs - A Random Walk Down Tech Street
Exchanging SSH keys using ssh-copy-id - A Random Walk Down Tech Street
Hard Drive Monitoring and E-mail Alerts Using smartd - A Random Walk Down Tech Street
Mabe
How to Install Jellyfin Media Server on Debian 12, 11 or 10 - LinuxCapable
archives.design
Street Smarts – Cool Tools
Like many other tools, it’s good to know these options exists, even if you have no plans to use them now. Being aware of what possibilities we have for deep disguise and obsessive privacy is empowering. And of course, if you are trying to find someone, this book has all the tricks they may be using. I learned tons and consider it a bargain education. — KK Level ThreeThis will almost certainly require a move from your present location. Both your home (or rental property) and you vehicles will be in the names of anonymous limited liability companies (LLCs). Your home address will now be hidden from all but your closest relatives and friends. It will no longer appear on your annual tax returns, or anywhere else. If you follow the directions in chapter 12, “E-mail and the Internet,” your Internet/e-mail connections will be under cover and the black-hat boys and/or law firms may have to pay a PI some truly serious money to track you down. Are you worth that much to them? If not, sleep well. I learned this one from a FEMA (Federal Emergency Management Agency) agent I met, while staying in a motel that was near a flooded area. Some years ago he bought a $98,995 motor home under another name, and did not license it. (He thus saved not only the license fees and road tax, but an $8,513.57 sales tax as well.) For $12 he got a fifteen-day permit to move it to a rural location in another state. From time to time he moves it, each time getting a temporary permit. Try to find out where this agent actually lives! Watch For This Sneaky TrickSuppose a private investigator wants to hear you talking to your lawyer (or mistress, or whomever). He may place a conference call, recording every word. Here is how it works. The first call would go to you, and when you answer, the PI punches HOLD and then speed-dials your lawyer. you start saying, “Hello? Hello?” Then your lawyer comes on the line. He recognizes your voice. Each of you may then assume the other person placed the call, and start to chat! Suppose you wish to send $25,000 from Vancouver, British Columbia, to a friend in Helsinki, Finland. You would hand $25,000 cash to a Vancouver money changer (Hawaladar) in Vancouver, and receive code words (or an agreed signal such as a secret handshake) and a contact address in Helsinki. No actual cash moves out of Canada. Instead, when your friend gives the code to the correspondent Hawaladar in Helsinki, he will receive the equivalent in euros (less a commission) from money that is already there. To review:There are no written documents. The exchanges are based on mutual trust (perhaps for that reason unpopular in the United States?).Only local currencies are used. Thus, if you are sending money from the UK to Mexico, you pay in pounds and the receiver in Mexico collects in pesos.This exchange cannot be traced because no money crosses a border. Since the IRS treats one-member LLCs as sole proprietorships for tax purposes, there are no income tax consequences. If you use your LLC for a part-time business, for example, you will merely report earnings and expenses on Schedule C and submit it with your 1040 tax return. Repeat: The income – -if any — is listed on your personal tax return. Nowhere on the tax form will the name of your limited liability company appear. As far as the IRS is concerned, your limited liability company is invisible.”How can I prove I own the company,” I’m often asked, “if my name doesn’t appear anywhere?” If privacy is the goal, I recommend New Mexico LLCs because they do not show ownership in the Articles of Organization (which are a public record). The best way to prove ownership, then, is to have the original LLC documents coupled with an operating agreement.
Beautiful Basics - Series - Malicious Link - Blog by mubix - Rob Fuller
Hunt | Home
These 38 Reading Rules Changed My Life - RyanHoliday.net
Fifty Dangerous Things (you should let your children do) - Let Grow
China Recon 101 - Google Slides
Testing a TCP port with curl in Linux | ComputerTechBlog
Maker’s Muse – Cool Tools
Revisiting “The Kenny Rogers Rule” In having done this newsletter for the past 5 years or so, I am frequently asked what are my top-most tips? What are the ones that stick, that “changed my life” (or at least my workflow). I was reminded a few nights ago of one tip that would be at the top of such a list: The Kenny Rogers Rule (as in “You’ve got to know when to hold ’em, Know when to fold ’em, Know when to walk away, Know when to run”). This is a name I came up with years ago for knowing when to take a break from a project that has turned to little but frustration. The other night, I was trying to put together a bed frame that was not cooperating. It was all the things we know all too well about modern flat-pack furniture: warpage, improperly-drilled holes, cheap hardware, confusing instructions. By the time I was down to the last two nuts and bolts, I was struggling, sweating profusely, and rung tight with curses and frustration. I decided to put the tools down and come back tomorrow. In the morning, rested and with a new dedication to getting this damn thing done, it took about ten minutes to finish (with nary a bead of sweat or profane utterance). A perennial lesson from Kenny to us all.
3 questions to get unstuck and start making progress
1. What haven't I done yet? Why? 2. What's stopping me from doing this? 3. What is making me frustrated or discontent?
PowerShell 7 Upgrade: A Comprehensive Walkthrough
2-Nodes clusters without Witness - StarWind VSAN Heartbeat Failover Strategy - ESX Virtualization
How I learned to stop worrying and love the CoreOS · Major Hayden
AWS Weekly Roundup: AWS Control Tower, Amazon Bedrock, Amazon OpenSearch Service, and More (October 9, 2023) | AWS News Blog
Quick Tip: Get CPU temperature | >_
divide
Dell Offers APEX Azure Storage for a Cool Million Dollars - Architecting IT
Hacktivism erupts in response to Hamas-Israel war | TechCrunch
SEC investigating MOVEit hack that exposed data of at least 64 million people
Common Ansible Errors | badllama.com
Enabling BitLocker with Group Policy and backing up Existing BitLocker recovery keys to Active Directory | A Windows System Admin's Blog
manage-bde -protectors -get c: for /f "skip=4 tokens=2 delims=:" %%g in ('"manage-bde -protectors -get c:"') do set MyKey=%%g echo %MyKey% manage-bde -protectors -adbackup c: -id%MyKey%
Copying files from one server to another as a different user (two separate domains) using PowerShell | A Windows System Admin's Blog
CORS | badllama.com
How to Install TIG Stack (Telegraf, InfluxDB, and Grafana) on Rocky Linux
TIG Stack (Telegraf, InfluxDB, and Grafana)
Reset Root Password in VMware ESXi | Windows OS Hub
Nginx Proxy Manager and GoAccess – Stuff I'm Up To
Simple SQL in PowerShell
How to Query and Change Teams User Presence Status with PowerShell | Windows OS Hub
Access:7 vulnerabilities impacting medical and IoT devices | Born's Tech and Windows World
Making Meetings more Inviting - American Boffin
Vulnerabilities in Notepad ++ (Sept. 2023) | Born's Tech and Windows World
PowerHell: Attention, unfixed vulnerabilities in the PowerShell gallery | Born's Tech and Windows World
Clint Boessen's Blog: Mass Converting Video Files changing Audio or Video Fromat
Chris's Wiki :: blog/solaris/ZFSRecordsizeChangeEffects
Chris's Wiki :: blog/tech/TLSShortCertDurationVsBlackBoxes
Chris's Wiki :: blog/linux/ZFSOnLinuxARCTargetSizeChanges
How to reliably get the system time zone on Linux? | /contrib/famzah
SSD - the definitive guide for Linux! · Igor Moiseev
I miss del.icio.us – the web’s discovery-engine and link classifier | Ctrl blog
How to Install Bluestacks (Android Emulator) on Ubuntu
Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers - Help Net Security
Ubuntu 23.10 to Introduce an Experimental TPM-Backed FDE
13 Best Free Linux DICOM Viewers for Medical Imaging
Velociraptor: Open-source digital forensics and incident response - Help Net Security
Kanban.bash - A Commandline Todo Manager For Linux - OSTechNix
Security Onion 2.4: Free, open platform for defenders gets huge update - Help Net Security
8 open-source OSINT tools you should try - Help Net Security
Amass Osmedeus
GitHub - alphasoc/flightsim: A utility to safely generate malicious network traffic patterns and evaluate controls.
How to Use Jupyter Notebook: Beginner's Tutorial
Example of scope in a Notebook document
Four Scenarios for the Future of Legal Education | DennisKennedy.Blog
23andMe user data breached in credential-stuffing attack
credential stuffing
Platform Engineering is Product Design at Scale - Wahl Network
Dall-E 3 vs MidJourney
How to keep up with technology | James Serra's Blog
PowerShell – Get top CPU and memory usage for windows service | geekdudes
Proxmox with one static IP
Cheatsheet to install Docker or Podman
Unit testing in PowerShell | John Louros
Basics of cryptography with OpenSSL | John Louros
How to encrypt web.config sections | John Louros
How to automate Windows Security prompt input | John Louros
Create a schedule task to periodically run a PowerShell script | John Louros
Enabling strong cryptography for all .Net applications | John Louros
Batch download images from a website | John Louros
Resignation letter template | John Louros
Chapstick left in pocket, stains all over clothes! | The DIS Disney Discussion Forums - DISboards.com
How to Get Chapstick Out of Clothes
Chainguard's Wolfi: Revolutionizing Containerized Workloads with Rapid Updates and Robust Security
Securing Docker with iptables – Stuff I'm Up To
Reaching the fork in the road · Major Hayden
Walt Disney said it best: We keep moving forward, opening new doors, and doing new things, because we’re curious and curiosity keeps leading us down new paths.
Terraform Certified Associate (003) – How to Study for the Exam
(16) How I cleared Terraform Associate (003) in 2 weeks. | LinkedIn
Retention of Millennial and Gen Z Employees Rests Heavily on Digital Employee Experience | APMdigest - Application Performance Management
Docker Exec Command With Practical Examples - buildVirtual
Your NFTs are Worthless. Everyone's NFTs are Worthless. - LowEndBox
Turbo-Charge Your Linux Shell With These Easy Tricks! - LowEndBox
CyberBunker: The ‘Bulletproof’ Darknet Market Host That Operated out of Bunkers (Founder Sentenced to Prison) - LowEndBox
The WGA strike may end as studios offer streaming and AI concessions
50+ Kubectl Commands for Managing Kubernetes Clusters
New – Amazon EC2 C7a Instances Powered By 4th Gen AMD EPYC Processors for Compute Optimized Workloads | AWS News Blog
WebAuthn and Yubikey – Stuff I'm Up To
Trust an IP address with firewalld’s rich rules · Major Hayden
Adding a ZFS mirror to Proxmox | Logan Marchione
What my toddler taught me about information security · Major Hayden
Reduce disk I/O for small reads using memory · Major Hayden
Generate self-signed certificate and key in one line · Major Hayden
How to Install dbWatch to Monitor MySQL Performance in Linux
How to Self-Host Your Own Email for Less Than $3/Mo… and Get Your Emails Delivered! - LowEndBox
Easy Chocolate Frosty Homemade Ice Cream Recipe - What a Good Day
Ice cream freezer
Hubbard on Networking: Apple MacBook Air M1 for Network Engineers Part 4
Hubbard on Networking: Apple MacBook Air M1 for Network Engineers Part 3
Hubbard on Networking: Apple MacBook Air M1 for Network Engineers Part 2
Hubbard on Networking: Apple MacBook Air M1 for Network Engineers Part 1
Unleashing Docker's Power: The Vital 20 Commands for Success
Gain Control of the Storage Controller Loading Order - Running Systems
Using vSphere Datasets in Salt · vNinja.net
PowerShell: How to export and import ssl certificate from commandline? | Networknet.nl
How to Use Ansible to Manage Windows Machines | Windows OS Hub
task-spooler | Nelson's log
Running my own LLM | Nelson's log
Matt Ventura's blog » Blog Archive » Upgrading an SC847 with a rear 2×2.5″ Drive Cage
My Automated Lab project: #2 Create a Ubuntu template in VMware vSphere with Packer
First Impressions with the Raspberry Pi 5
Amazon Bedrock Is Now Generally Available – Build and Scale Generative AI Applications with Foundation Models | AWS News Blog
Great Architects Always Seek Feedback - Wahl Network
There are three major reasons for this: Unknown unknowns are harder to find alone Context always matters Natural bias towards the familiar
PostgreSQL with TLS Client Auth – Stuff I'm Up To
Writing For Somebody - Marc's Blog
What is a container? - Marc's Blog
A common example is the word container, a popular term for a popular technology that means at least four different things. An approach to packaging an application along with its dependencies (sometimes a whole operating system user space), that can then run on a minimal runtime environment with a clear contract4. A set of development, deployment, architectural, and operational approaches built around applications packaged this way. A set of operational, security, and performance isolation tools that allow multiple applications to share an operating system without interfering with each other. On Linux, this tools include chroot, cgroups, namespaces, seccomp, and others. A set of implementations of these practices (the proper nouns, Docker, Kubernetes, ECS, etc).
The Four Hobbies, and Apparent Expertise - Marc's Blog
Engineering through layoffs · Major Hayden
Takeaways from The Obesity Code · Major Hayden
.)
Raise the bar with an SBAR · Major Hayden
Situation Background Assessment Recommendation
Secure Tailscale networks with firewalld · Major Hayden
Why ITIL Remains a Disaster in 2023 — EtherealMind
How to View and Change BIOS (UEFI) Settings with PowerShell | Windows OS Hub
"Industry standard" isn't useful in arguments - SysAdmin1138 Explains
Fudgy Brownies Recipe | Epicurious
add 1 tablespoon of powered milk
7 Ways to Escape a Container - Panoptica
Installing the IBM SCSI / A ‘tribble’ card in an IBM PS/2 model 60, using BlueSCSI, and a tale of painful lessons. | Virtually Fun
Microsoft’s big Windows 11 update drops on September 26 with Copilot AI baked in
VMware Carbon Black Emerges as a Leader in Frost & Sullivan’s 2023 XDR Report - VMware Security Blog - VMware
What's the purpose of those 17 virtual hard disks within VMware vCenter Server Appliance (VCSA) 8.0? - ESX Virtualization
VMDK 1 – 48Gb – /boot as mount point – Directory where the kernel images and boot loader configurations are stored. VMDK 2 – 5.5Gb – /tmp as mount point – Directory used to store temporary files generated or used by services from vCenter Server. VMDK 3 – 25Gb – SWAP – Directory used when the system is out of memory to swap to disk. VMDK 4 – 25Gb – /storage/core – Directory where core dumps from VPXD process from the vCenter Server are stored. VMDK 5 – 10Gb – /storage/log – Directory where vCenter Server and Platform Services Controller store all logs for the environment. VMDK 6 – 10Gb – /storage/db – VMware Postgres database storage location. VMDK 7 – 15Gb – /storage/dblog – VMware Postgres database logging location. VMDK 8 – 10Gb – /storage/seat – Stats, Events, Alarms and Tasks (SEAT) directory for VMware Postgres. VMDK 9 – 1Gb – /storage/netdump – VMware Netdump collector repository that stores ESXi dumps. VMDK 10 – 10Gb – /storage/autodeploy –VMware Auto Deploy repository that stores the thin packages used for stateless booting of ESXi hosts. VMDK 11 – 10Gb – /storage/imagebuilder – VMware Image Builder repository that stores the vSphere image profiles, software depots and VIB packages, such as driver VIBs and update VIBs. VMDK 12 – 100Gb – /storage/updatemgr – VMware Update Manager repository where patches and updates are stored for Virtual Machine and ESXi hosts. VMDK 13 – 50Gb – /storage/archive – VMware Postgres database’s Write-Ahead Logging (WAL) location. VMDK 14 – 10Gb – /storage/vtsdb – VMware vTSDB Service Repository that stores the stats. VMDK 15 – 5Gb – /storage/vtsdblog – VMware vTSDB Service Repository that stores the logs of the service. VMDK 16 – 100Gb – /storage/lifecycle – Workload Control Plane service stage directory or software depot, this stores the binaries for install and update/upgrade. VMDK 17 – 150Gb – /storage/lvm_snapshot – Directory used to store temporary system root.
Pi autoRIP
Bare metal provisioning (PXE boot) - Khue's Homelab
Gluten Free on a Shoestring - Gluten free recipes that really work
How to Create a Ramdisk in Linux
mount -t tmpfs -o size=2g tmpfs /mnt/tmp
Hackgreenville - A Developer Community in the Greenville SC Area
Learning Resources for WGU Alumni
We Need Wide News | Doc Searls Weblog
Practical Tips to protect your Veeam Backup Repositories - ESX Virtualization
3-2-1-1-0 rule: Three different copies of data, two different media, one of which is off-site. That’s where the rule starts, have comprehensive ransomware protection with at least one copy being immutable and zero surprises with recovery verification.
On Infrastructure as Code and Bit Rot :: packetmischief.ca
The Power of PowerShell: Calculating Azure VMware Solution (AVS) Costs | davidstamen
Managing Windows Firewall Rules with PowerShell | Windows OS Hub
Lessons I've Learned Leading a Platform Engineering Team - Wahl Network
What's the difference - Platform Engineers and DevOps Engineers?
VMware vSphere 8.x Advanced Design Exam (3V0-21.23) Study Links – vcdx133.com
Understanding Immutability Periods for GFS Backups | rhyshammond.com
The key takeaways from the forum discussion are as follows: Standalone Repositories: In the case of standalone repositories, data remains immutable throughout the GFS retention period. This means the backup data is secure and unchangeable throughout the entire GFS retention timeline. Performance Tier without Capacity Tier: When using the Performance Tier without the Capacity Tier, data immutability holds for the complete GFS retention period. Performance Tier with Move Policy Disabled: Similar to the previous scenario, if the ‘Move Policy’ is disabled within the capacity tier, the data will be immutable for the entire GFS retention period. Performance Tier with Move Policy Enabled: When the Move Policy is enabled within the Capacity Tier, unlike the previous example, immutability is applied as per the repository’s immutable retention period. On Capacity Tier: For backup data stored on capacity tier, the immutability aligns with the repository’s settings. On Archive Tier: Within the Archive Tier, data immutability is for the entire GFS retention period.
Surprise Firmware update & BitLocker | Virtually Fun
Hook, Line, and Sinker: The Fallacies of Phishing Simulations – Mikail's Blog
Western Digital Drive Update Guide Without Windows/WD Dashboard - Framework Laptop 13 - Framework Community
Securing PostgreSQL client connections in VMware Data Services Manager using TLS - CormacHogan.com
Terraform and vSphere – Part 3: Import Resources – Adventures in a Virtual World
Microsoft Azure Strategic Migration Assessment & Readiness Tool  - Thomas Maurer
Prepare your Azure Cloud Environment with the Cloud Adoption Framework - Thomas Maurer
Download the Active Directory Security Playbook for 2023 (Free) - The things that are better left unspoken
Chess Board « The Realm of the Verbal Processor
A Technique To Monitor Kubernetes Controller Latency – Povilas Versockas
Start with Cloud Adoption Framework enterprise-scale landing zones #CAF #Azure #Cloud #MVPBuzz – Robert Smit MVP Blog
NFS4.1 datastore disconnected after the Netapp storage upgrade\failover. | Techbrainblog
Blocking ISO mounting :: malicious.link — welcome
Layer 2 VPN from Mikrotik to linux – Proxmox PVE | blog.erben.sk
New – Amazon EC2 Hpc7a Instances Powered by 4th Gen AMD EPYC Processors Optimized for High Performance Computing | AWS News Blog
Join AWS Hybrid Cloud & Edge Day to Learn How to Deploy Your Applications in the Everywhere Cloud | AWS News Blog
Welcome to AWS Storage Day 2023 | AWS News Blog
Prime Day 2023 Powered by AWS – All the Numbers | AWS News Blog
Introducing the first AWS Security Heroes | AWS News Blog
New – AWS Public IPv4 Address Charge + Public IP Insights | AWS News Blog
How to use multiple Docker registry mirrors
Docker is deleting Open Source organisations - what you need to know
Blazing fast CI with MicroVMs
Fixing the UX for one-time tasks on Kubernetes
Optimize your Cloud Storage Bill – Cody Hosterman
Deciding Between an Attorney or Online Forms for Estate Planning - FindLaw
DIY perfectly coiled cable guide
Kubernetes for vSphere Admins - part of the June 2023 VMware User Group Global Virtual Event series - CormacHogan.com
Chaos Engineering Stories – Laurent Domb
VMware Ransomware Recovery - How it works? - ESX Virtualization
A Multi-Cloud Strategy, Design Frameworks, and Day 2 Operational Thoughts
The Value of Infrastructure Agnosticism and Multi-Cloud Design
Using the AWS CLI to Collect Amazon S3 Bucket Object Information | davidstamen
Using the AWS CLI to Collect Amazon Elastic Block Store (EBS) Information | davidstamen
Detecting Secrets in Container Images - VMware Security Blog - VMware
Findlargedir: Find all "blackhole" directories with a huge amount of filesystem entries - Help Net Security
“One of my roles in the previous team was Head of Storage Department and we had many storage clusters totaling in 300 PB of raw disk space. One of the frequent issues for our customers was accumulating many files in a single flat directory, typically caused by cache files or object storage emulation, that would eventually cause visible performance degradation. The exact moment of directory lookups being heavily performance impacted depends on several factors such as storage performance, filesystem in use as well etc. Still, we typically observe issues when there are above 1M of files in a single directory. We have been identifying such issues initially by regular BSD and Linux system tools. However, it was painfully obvious that many core tools were never designed to cope with modern high IOPS and high IOdepth systems,” Dinko Korunic, the author of the tool, told Help Net Security.
How to Find Files That Have Been Changed in Last 24 Hours
$ find ~/Downloads -type f -newermt "24 hours ago"
Machine Learning in Linux: Ollama - self-hosted Llama 2 - LinuxLinks
Veilid
Importing updates into WSUS | >_
Elo Touch – 5Ghz Wireless (Channel Support?)
Let’s Encrypt SSL Wildcard Certificate
Oracle Certified Master's - Blogs: ORACLEASM: Instantiating disk: failed
Quickly switch between two custom screen resolutions from the Linux command line – 0xf8.org
Monitoring my home's air quality (CO2, PM2.5, Temp/Humidity) with AirGradient's DIY sensor | Jeff Geerling
How to safely store passwords on a Linux server | TechRepublic
gnupg2 pass pinentry-tty
How to Flush Local DNS Cache on Linux - Putorius
resolvectl statistics | grep -i cache resolvectl flush-caches
How To Connect to SSH Without Typing a Password - ByteXD
Ansible Debug Module - OSTechNix
How to Install Vaultwarden Password Manager with Docker
VMware Finds Linux Malware on the Rise - The New Stack
Alas, VMware has found that because we haven’t focused on detecting these threats our existing Linux malware detection and prevention tools aren’t up to the job. It also doesn’t help us that there are no fewer than nine major ransomware families targeting Linux systems. These include a Linux version of REvil; DarkSide; BlackMatter; and Defray777. Several of them are available as Ransomware as a Service for people without much of a technical clue but who want to make some quick cash. The cryptojackers’ cryptocurrency of choice is Monero cryptocurrency (XMR). Eighty-nine percent of Linux cryptominers used XMRig-related libraries. VMware’s research team discovered more than 14,000 active Cobalt Strike team servers on the internet since the end of February 2020. VMware TAU explains you need many bricks in your wall. VMware, of course, recommends its own Endpoint Detection and Response (EDR) solution and Network Detection and Response (NDR). These are good tools, but there are other programs that can help. And of course, simply practicing good Linux and container security is a must.
Excellent Utilities: croc - securely transfer files and folders - LinuxLinks
How to install YubiKey Manager GUI on Linux - nixCraft
Securing open-source software won't come cheap • The Register
How To Reuse SSH Connection With Multiplexing To Speed Up - nixCraft
Building and operating a pretty big storage system called S3 | All Things Distributed
Beginner's Guide to Syslogs in Linux [Real World Examples]
FinOps: Optimizing Financial Infrastructure With DevOps
IDLC - Investment Development Life Cycle Concept and Plan Documentation and Feasibility Analysis Financial Investment Sandbox Execution Project Execution Team Feedback FDLC - Financial Development Life Cycle Concept Plan: Revisiting the set of ideas to further optimize the source of income. Documentation & Feasibility Analysis: This is when the financial model is further improved, especially based on community feedback. Feasibility is always re-assessed in this stage. Financial Investment: Based on revised feasibility and potential of the ongoing project, investments for sandbox level testing and actual project execution is reallocated to the core team. Sandbox Execution: The revised sandbox is retested for financial potential. Project Execution: The revised project is now agreed upon as client-ready and a further improved self-sustainable financial model. Team Feedback: At this stage, the project is now ready for the community as well, that is the public domain. Community Feedback: When the project is ready for release to the public, a mixed community of founders, investors and clients can come together and make a final update to the project. Whitepaper Publication: The relevant business whitepaper for the project can now be finally published. Productivity Reviews: Treating a business whitepaper as a product can be an effective approach towards enhancing its value in the area it was made for. Honest public product reviews make sure, the project is at par with everyone's interests and always future ready.
How to Manage Terraform State in an AWS S3 Bucket
Communicating a Team Philosophy Using Books - Unadulterated Nerdery
OpenSSH Security Hardening Guide for Linux
Ansible Variables - OSTechNix
How to Install vyOS RouterOS with KVM
Access Proxmox Virtual Machine With SPICE Client - OSTechNix
SPICE, short for Simple Protocol for Independent Computing Environments, is an opensource remote desktop application to access virtual machines.
Protecting Against the Spring4Shell Vulnerability | eSecurityPlanet
Getting Started with Docker Semi-Self-Hosting on Linode | Linux Journal
VCP-VMC training & exam free for a limited time – vcdx133.com
My adventures with 6 GHz and my Pixel 6a phone | The Packetologist
PODCAST: MODEM.show, DHCP option 108 - The ForwardingPlane
The mess of IPv6 Unique Local Addressing - The ForwardingPlane
NSA shares tips on blocking BlackLotus UEFI malware attacks
In today's advisory, the U.S. intelligence agency recommended the following measures as additional mitigations: Apply the latest security updates, update recovery media, and activate optional mitigation Harden defensive policies by configuring endpoint security software to block BlackLotus malware installation attempts Use endpoint security products and firmware monitoring tools to monitor device integrity measurements and boot configuration Customize UEFI Secure Boot to block older (pre-January 2022), signed Windows boot loaders
Helpdesk Skills Fit the Bill | The Networking Nerd
Documenting All the Things
From the Canyon Edge: My Walk on the Portuguese Camino de Santiago, 2023
The value of the hyperscaler + hypervisor model | CloudXC
[Short Tip] Plot live-data in Linux terminal – /home/liquidat
2023-07: UNIX Philosophy, Dev Containers | KWLUG - Kitchener-Waterloo Linux User Group
Using clap to build nice command line interfaces
Expired VMware vCenter certificates · vNinja.net
Check for Open (Listening) Ports with PowerShell | Windows OS Hub
TNC ny-msg01 -Port 25
Passkeys are great but are they suitable for the enterprise? – Mikail's Blog
Managing infrastructure with Terraform, CDKTF, and NixOS
Sysadmin ramblings: Linux - what's using my swap?
for file in /proc/*/status ; do awk '/VmSwap|Name/{printf $2 " " $3}END{ print ""}' $file; done | sort -k 2 -n | tail
Vanguard’s Special Tax-Efficient ETF and Mutual Fund Combo — My Money Blog
Experimenting With ZFS | Murray's Blog
ZFS Without Tears
ZFS < CF < TWiki
Why I do not use ZFS as a file system for my NAS
zfs_overview.pdf
OpenZFS - The Final Word in File Systems
A Closer Look at ZFS, Vdevs and Performance · Constant Thinking
ZFS 101—Understanding ZFS storage and performance | Ars Technica
ZFS Pool Import Fails After Power Outage | SolutionOriented Blog
Turbocharging ZFS Data Recovery | Delphix
Fixing the Proxmox VE Cannot Import rpool ZFS Boot Issue
ZFS Corruption: Postmortem :: Daemon Security, Inc.
zfs: cannot import : I/O error Destroy and re-create the pool from a backup source - Systems Administration Problem Solvers
Your FreeNAS, or FreeBSD, ZFS zpool lost power and can’t be accessed. Boot the machine and enter the boot loader menu and set these: set vfs.zfs.debug=1 set vfs.zfs.recover=1 set debug.bootverbose=1 boot -s <enter> to start the machine in single user mode. Once booted: zpool import -fFX -o readonly=on -R /mnt tank (or whatever the name of your zpool is). This should work in most all cases and allow you to rsync/scp/copy your data off of the zpool. Don’t deviate from the above. I know you are super smart and believe you don’t need to set the flags, don’t need single user mode, or don’t need to mount in read only. You do. Don’t waste time and risk screwing up the pool permanently.
software raid - ZFS I/O Error, Kernel Panic during import - Server Fault
zpool import -fFX <poolname>
ZFS - cannot import '' I/O error | The FreeBSD Forums
quite a bit of messages like this when running -FX
12 Commands to Find User Account and Login Info in Linux
1. id Command – Show User and Group IDs 2. groups Command – View User Group Memberships 3. finger Command – Show User Information 4. getent Command – Fetch User Info from System Database 5. grep Command – Search for Patterns or Specific Text in Files 6. lslogins Command – Display User Information in Linux 7. users Command – List Current Logged-In Users on Linux 8. who Command – Show Information Of Currently Logged-In Users 9. w Command – Show Currently Logged-In User Activity 10. last Command – Show Most Recent Login Session 11. lastb Command – Show Failed Login Attempts 12. lastlog Command – List User Login Information
InkBox
AI pioneer Geoffrey Hinton isn't convinced good AI will triumph over bad AI | Engadget
How to Reset the Group Policy Settings on Windows | Windows OS Hub
The computer settings (Computer Configuration section) are stored in %SystemRoot%\System32\GroupPolicy\Machine\registry.pol The user settings (User Configuration section) are stored in %SystemRoot%\System32\GroupPolicy\User\registry.pol
Find Inactive (Unused) Distribution Lists in Exchange/Microsoft 365 | Windows OS Hub
The trajectory of "AI" features - SysAdmin1138 Explains
How to Get a List of Local Administrators on Computers? | Windows OS Hub
Using Bicep to Deploy a Microsoft SQL on Azure VM with Cloud Block Store Volumes | davidstamen
A new whitepaper: Veeam Backup & Replication V12 enhanced security and scalability with object storage Secure Mode - Virtual to the Core
Perform an Azure Virtual Machine (VM) inventory with PowerShell - ivobeerens.nl
3 Ways to Minimize Cloud Costs | APMdigest - Application Performance Management
1. Start with Strategy ■ Do we have the proper processes in place for maximum efficiency? ■ Are we getting the most out of this application? ■ Could we execute in a more efficient way by building a custom application or investing in application integration? 2. Customize Your Cloud Environment The cloud's adaptability and flexibility are two of its biggest advantages. You may consider embracing strategies like "just-in-time" services: an approach to reducing waste by ensuring you're investing in just what you need, when you need it, and nothing more. Starting small and scaling as needed is possible, so long as you're willing to evaluate alternative options to your legacy systems. Reducing redundant applications and resources, offloading to different storage buckets, and leveraging on-demand tools and APIs are all practical strategies for increasing value and reducing waste when it comes to cloud spend. 3. Consider Adopting a Hybrid Approach A hybrid approach is useful for less regulated industries as well. It's not practical for businesses that work with large amounts of data every day to pull information into the cloud, process it, then bring it back down — keeping high-touch data stored on-premises may lead to more efficient processes.
How to Move Files with PowerShell - Thomas Maurer
Move-Item -Path C:\Temp\* -Destination C:\Backup -Recurse
IT Professionals Experiencing Substantial Shift in Responsibilities | APMdigest - Application Performance Management
DataOps uses a combination of technologies and methods with a focus on quality for consistent and continuous delivery of data value, combining integrated and process-oriented perspectives on data with automation and methods analogous to agile software engineering. DevOps uses collaborative, agile approaches paired with extensive automation development pipelines, testing, infrastructure configuration, provisioning, security controls, and life-cycle continuous integration (CI) for continuous development and continuous delivery (CD). DevSecOps uses a methodology that asserts that security needs to be prioritized at the beginning of the DevOps delivery pipeline. It enables DevOps teams, collaborating with security, to act as key stakeholders in defining and implementing security policies. ITOps uses technology and methods to provide routine, scheduled tasks and unscheduled support activities related to IT systems. ITOps professionals may spend as much as 50% of their time engaged with business users in support, the elicitation of requirements, and performing contingent or secondary business tasks. MLOps uses technology and processes to streamline and automate the entire machine learning (ML) life cycle. The key capabilities include managing and automating ML data and pipelines, ML code, and ML models from data ingestion to model deployment, tracking, and monitoring. MLOps uses similar principles to DevOps practices, applied to machine learning processes. Platform engineering is a discipline of designing and building toolchains and workflows that enable self-service capabilities focused on managing and optimizing the software delivery process to deploy applications and services to cloud platforms. Site reliability engineering (SRE) includes software engineers who build scripts to automate IT operations tasks such as maintenance and support. To enable efficiency and reliability, SRE teams fix operational bugs and remove manual work in rote tasks. Systems administrators configure, maintain, and support computer systems and systems of systems using a variety of tools and methods appropriate to the system or systems of systems in use. They may spend as much as 50% of their time engaged with business users in defining key requirements, business goals, and adaptations needed to maintain fit for use and fit for purpose.
Speedata Launches Workload Analyzer | APMdigest - Application Performance Management
"Our team is committed to providing enterprises with the tools needed to accelerate their big data analytics workloads," said Jonathan Friedmann, Co-Founder & CEO of Speedata. "The Workload Analyzer is one of those tools, helping businesses focus on what's working and how to improve what's not. It's designed to help data engineers optimize their analytics with available infrastructure, set realistic goals, maximize their data, and maintain their competitive edge."
Data Downtime Nearly Doubled Year Over Year | APMdigest - Application Performance Management
The Wakefield Research survey, which was commissioned by Monte Carlo and polled 200 data professionals in March 2023, found that three critical factors contributed to this increase in data downtime. These factors included: ■ A rise in monthly data incidents, from 59 in 2022 to 67 in 2023. ■ 68% of respondents reported an average time of detection for data incidents of four hours or more, up from 62% of respondents in 2022. ■ A 166% increase in average time to resolution, rising to an average of 15 hours per incident across respondents.
"Have you ever seen a culture recover?" - SysAdmin1138 Explains
Blog
Brad Whitehead
Linux DataOps: a career path with endless potential - Linux Careers
I consider myself a patient person, but 'The Password Game' might break me | Engadget
Canonical Unveils Landscape 23.03:  Streamlining Ubuntu Linux Management
Generating Test Data With ChatGPT
Five Years at Microsoft and Next Adventures
10 things you should know about Incident Response and Forensics in 2023 | CQURE Academy
What if your Pods need to trust self-signed certificates?
Building a 100% virtual SNA network on your desk! | Virtually Fun
I booted Linux 292,612 times | Richard WM Jones
Lithium-ion battery creator John Goodenough dies at 100 | Engadget
...it was Goodenough who achieved a major breakthrough in 1980 while at the University of Oxford. He made a cathode with layers of lithium and cobalt oxide that produced a stronger voltage while greatly improving safety. It had much more capacity than previous batteries, such as lead acid (used in cars) and nickel-cadmium (found in many portable electronics). He received the Nobel Prize in Chemistry in 2019 and the US National Medal of science in 2011, among other accolades.
Ansible Collections Tutorial For Beginners - OSTechNix
OSV-Scanner: A free vulnerability scanner for open-source software - Help Net Security
First steps with Mermaid, a diagramming and charting tool - RS1 Linux Tools
Proposed NIST Updates and Data Incident Response Planning - Lawfare
Homemade Cheap Granola Cereal Recipe -- Vegan and Allergy Friendly | Penniless Parenting
Watchtower: Automatically Update Docker Container Images
10 open-source recon tools worth your time - Help Net Security
Altdns Amass Aquatone Assetfinder Gobuster Gotator HTTPX Naabu MASSCAN: Mass IP port scanner WhatWeb – Next generation web scanner
How to Install Jupyter Notebook on Linux, Windows, and Mac
KubeCon Database Trends | Redis Enterprise
The Cyberlaw Podcast: Cryptopocalypse - Lawfare
Two Visions of Digital Sovereignty - Lawfare
The Cyberlaw Podcast: When AI Poses an Existential Risk to Your Law License - Lawfare
Microsoft confirms June Outlook and OneDrive outages were caused by DDoS attacks | Engadget
Configuring Event Viewer Log Size on Windows | Windows OS Hub
To increase the maximum size of the log, you can use the wevtutul command line tool (the new size is set in KB): wevtutil sl "Application" /ms:200000
ITSM Academy Ends ITIL Training | APMdigest - Application Performance Management
By a letter dated June 13, 2023, ITSM Academy informed PeopleCert, the owners of ITIL, ITSM Academy will be terminating their ITIL accreditation agreement effective December 31, 2023. As of that date, ITSM Academy will no longer hold accreditation to deliver ITIL 4 framework training, correlating mandatory examinations, or have ITIL classes available for learners needing to meet the requirements to maintain PeopleCert Continuing Professional Development validation. ITSM Academy will continue delivering DevOps courses as a PeopleCert Authorized Training Organization (ATO). ITSM Academy's 20-year history of ITIL® education ends 12.31.23, so the Academy can focus on other portfolio classes. "From the start, we have defined our role in the industry by providing the most current, meaningful education available. The recent turbulence in the service and experience management markets has triggered a strategic evaluation of our future," stated Lisa Schwartz, ITSM Academy founder and CXO. Over the years, ITSM Academy has remained at the core of new industry developments, translating those trends into effective courseware allowing organizations to grow, improve, and better deliver IT services. These same classes are also thoughtfully designed to deliver an exceptional learner experience. "Making this decision was incredibly hard. Walking away from one of our flagship lines is sad, a little scary, but also exhilarating. PeopleCert has a direction of travel for their ITIL products that no longer feels compatible with our core mission and goal. We wish them continued success with their plans for the ITIL 4 framework," continued Schwartz. "We are proud that hundreds-of-thousands of enthusiastic professionals have trusted ITSM Academy to deliver the positive training experience they deserve. We appreciate your loyalty. You can count on us to never waver in our commitment to enable learners to return to work with tangible, practical ideas for incremental improvements. My team and I are delighted to continue to educate and inspire you and yours," finished Schwartz.
Querying Windows Event Logs with PowerShell | Windows OS Hub
Illuminating Your Console: Enhancing Your Linux Command Line Experience with ccat | Linux Journal
Harness the Power of the Command Line: Searching Files and Google from Linux | Linux Journal
Hacking and Cybersecurity: Class 1, Practical Cybersecurity - Lawfare
The Lawfare Podcast: The Dark History of the Information Age - Lawfare
8 Mysterious Ways to Use the (!) Operator in Linux Commands
The National Cybersecurity Strategy: Breaking a 50-Year Losing Streak - Lawfare
Software companies should no longer be incentivized, for example, to rush insecure products to market, maximizing their profit but inflicting insecurity on everyone else.
The Cyberlaw Podcast: Debating AI Regulation - Lawfare
Machine Learning in Linux: BackgroundRemover - remove backgrounds from images and video - LinuxLinks
How to Generate Random Passwords in Linux
20 cybersecurity projects on GitHub you should check out - Help Net Security
Wolfgang Ziegler - Migrating a Linux system to a larger SSD
pv < /dev/sda > /dev/sdc
How to Test Ansible Roles with Molecule and Docker
Map of the AWS Well-Architected Framework
Moog celebrates 70th anniversary with musical web app | Engadget
Managing Partitions with sgdisk - Fedora Magazine
Multiboot USB drive - ArchWiki
The cyber gulag: How Russia tracks, censors and controls its citizens - Japan Today
G7 officials to hold first meeting on AI regulation next week - Japan Today
GitHub - ndeineko/grub2-bios-uefi-usb: Create a usb boot drive with support for legacy BIOS and 32/64bit UEFI in a single partition on Linux
New York State AG proposes broad regulations for the cryptocurrency industry
Scientists observe elusive missing step in photosynthesis’ final stage
The Supreme Court’s Warhol decision could have huge copyright implications for ‘fair use’ | Engadget
How to Choose Your Career: Venn Diagram — My Money Blog
Grub2/ISOBoot - Community Help Wiki
2023 Berkshire Hathaway Annual Shareholder Meeting Video, Transcript, and Notes — My Money Blog
you should write your obituary and then try and figure out how to live up to it.
mikas blog » Blog Archive » Boot an ISO via Grub2
GNU GRUB Manual 2.06: Making a GRUB bootable CD-ROM
How 80,000 Hours has changed some of our advice after the collapse of FTX - 80,000 Hours
Fidelity Money Transfer Lockdown: Block Fraudulent ACAT Transfer Brokerage Scams — My Money Blog
Public using ACAT, and Public did not send me a single email, text, or phone call. My Public account was simply zero one day. Now, I did request this transfer, but what if I didn’t?!?
Aer Travel Pack 3 Review: Two Steps Forward But One Back - foXnoMad
Aer Travel Pack 3
The Japanese Philosophy You'll Love, Based On Your Myers-Briggs® Personality Type - Psychology Junkie
joeware – never stop exploring… :) » Blog Archive » And we are back…
Java 17 vs Java 11
How to setup SonarQube
The Developers guide to remote work
Trust, Risk, and Opportunity: Overseeing a Comprehensive Data and Privacy Strategy
What does a CISO chief information security officer do?
Security operations: This function involves real-time analysis of threats, including watching the tools that monitor a company’s firewalls, entry points, databases and other internal environments. When something goes wrong, these folks are supposed to discover and triage the problem. Cyberrisk and cyber intelligence: Corporate boards often ask CISOs to get out ahead of new types of attacks that could be harmful, business deals that could introduce risk of a breach or new products that might weaken security. Data loss and fraud prevention: People emailing out sensitive information, or insiders stealing intellectual property when they quit, are two examples of what these professionals handle. They use tools that monitor the flow of information in an organization, to spot when large amounts of data are leaving the company. When Elon Musk said an engineer at Tesla was flagged for sending source code outside the firm, that type of problem is usually handled by this team. Security architecture: This person builds the security backbone of a company, sometimes from the ground up, in part by deciding where, how and why firewalls are used. These pros may also make decisions like how to separate or segment certain networks. They may also rely on penetration testers or ethical hackers to test the defenses they create for the company. If you wondered how the WannaCry or NotPetya ransomware moved so rapidly between different parts of some affected companies, that’s because many companies had “flat” networks with no way to quarantine the attack between business units. A security architect could help build a more resilient network. Identity and access management: These employees deal with credentials. When you get your username and password at a new company, it likely went through the hands of somebody in this field. These professionals maintain who has access to which tools, who gets which email addresses and how rapidly those credentials are taken away when somebody gets fired. That last point is key and if mishandled can lead to a lot of data loss. In one famous case involving an engineering firm in Tennessee, an ex-employee was able to access valuable information for several years after leaving for a competitor because his credentials were never retired. Program management: Once a company has measured its risks, gathered intelligence and mapped where its data is going, it may find some gaps. To fill those gaps, companies create projects and programs. Cybersecurity program managers don’t always have a deep technical background, but they know how to build and manage new initiatives meant to keep the company safer. One example of a common program: patching systems on a regular basis. When program management is poorly handled, you can have missed patches -- like the one that led to the massive data breach at Equifax and cost CEO Richard Smith his job. Investigations and forensics: These pros are the “cops” of the cybersecurity organization, and many of them do indeed come from a background in law enforcement. When an incident occurs, they may work with outside law enforcement agencies, consulting firms, government agencies or sometimes on their own to conduct forensics. If an employee got caught emailing source code, these are the cybersecurity employees who will both prove that it happened and then may sit him or her down for a conversation about it. When the Democratic National Committee brought in Crowdstrike and worked with the FBI on suspected email attacks during the 2016 campaign, those were two teams of investigative professionals who, in part, tried to determine who perpetrated the attack. The forensic results are what you can read in the indictment of 12 Russian nationals released last week by Rod Rosenstein. Governance: All of this can cost a lot of money, and these employees can help mind the budget and provide other types of oversight. Security programs have to keep running smoothly or else they may never get finished. Regulations bubble up and change frequently, and employees need to be hired to staff these jobs. Good governance can involve setting up a framework based on factors important to the business, and making sure the entire cybersecurity organization is functioning well. A lack of governance can lead to big problems, such as CEOs never getting a clear picture of significant cyber problems in their organization, or senior officials never getting properly trained on how to spot phishing attempts.
Are you Prepared For 100% Turnover?
A Getting Started Guide to Kubernetes Namespaces
Chris's Wiki :: blog/sysadmin/IPv6OurPassiveExposure
Robert Milkowski's blog: NFSv4 + Kerberos: 4 minutes of slowness
Galactic Civilizations IV: Supernova Supernova uses AI to write lore
Delta Dental uses Feedly to cut threat intelligence gathering time in half – Feedly Blog
Both/And Thinking - Vicious Cycles (Chapter 2) ! even the horse knew
Both/And Thinking - Last 2 Paradox Types ! even the horse knew
Both/And Thinking - First 2 Paradox Types ! even the horse knew
Both/And Thinking - Introduction ! even the horse knew
The crux of Both/And thinking is to “think about our dilemmas differently? What if, instead of trying to choose between the mutually exclusive options, we start by surfacing the paradoxes that lurk beneath our dilemmas and recognize that those paradoxes cannot be solved? Instead of choosing between alternative poles of a paradox, what if we ask a different question: how might we engage both poles simultaneously? How might we accommodate competing demands over time? Doing so invites us into both/and thinking, embracing tensions to enable more creative, effective, and sustainable solutions.”
Is the Cloud actually greener? - Tekhead.it
Google Professional Cloud Security Engineer Exam Prep notes - Part 4 ~ The Technology Chronicle
Tech basics series : Containers , Microservices & Kubernetes - Part 3 ~ The Technology Chronicle
Tech basics series : Containers , Microservices & Kubernetes - Part 2 ~ The Technology Chronicle
Tech basics series : Containers , Microservices & Kubernetes - Part 1 ~ The Technology Chronicle
Google Professional Cloud Security Engineer Exam Prep notes - Part 3 ~ The Technology Chronicle
Google Professional Cloud Security Engineer Exam Prep notes - Part 2 ~ The Technology Chronicle
Google Professional Cloud Security Engineer Exam Prep notes - Part 1 ~ The Technology Chronicle
Listening Between the Lines
Three Ways to Listen Between the Lines 1. Ask open-ended questions. Remove the blame from the attendees. “What could I explain better to make this clear?” makes it the trainer’s fault if some listeners don’t understand. 2. Check for understanding with a prompt such as “In one sentence, tell me the most important way this impacts your job.” A reply phrased as a question suggests uncertainty and perhaps the need to reinforce learning. 3. Listen for clues. Was there a hesitation before responses? Were answers to your questions confidently given? Did all attendees chime in? Tone and delivery help you discover what the words may be hiding.
MFA is NOT Bulletproof | Sensei Enterprises, Inc.
Azure Well Architected framework - An Introduction ~ The Technology Chronicle
DCOM Hardening | >_
Sysadmin Stories: A Quick Look At Terraform Provider for Ansible
5 Tips for Getting the Most Value from Logs | APMdigest - Application Performance Management
1. Choose carefully what to log 2. Establish a baseline for comparison 3. Choose messages that support decisions 4. Keep log messages concise and relevant 5. Make sure log messages are clear
The April 2023 Updates provide further urgency to Netlogon RPC Sealing - The things that are better left unspoken
My Sovol SV06 - Can It Match My Prusa MK3S? - Patshead.com Blog
GPT on Arch Linux - Jeremy's Programming Blog
IT That Should Just Work: Start All Exchange Services Automatically
Get-Service -DisplayName "Microsoft Exchange*" | Where-Object {$_.Starttype -eq "Automatic" -and $_.Status -ne "Running"} | Start-Service
Linux – Bash script for initiating time sync with NTP server | geekdudes
Computers Are Bad
Logz.io Adds Security Scanning to Kubernetes 360 | APMdigest - Application Performance Management
Mastering the journalctl Command: A Comprehensive Guide | Linux Journal
Recommendations for Oracle 19c Patches in Azure
Oracle Workloads on Azure- IO is King!
Infrastructure Cost Optimization MUST Include the Relational Database – No Matter the RDBMS
Azure IO Performance for the RDBMS DBA- Part II
Backup Scenarios for Oracle on Azure IaaS
Estimate Tool for Sizing Oracle Workloads to Azure IaaS VMs
Oracle workloads - Microsoft Azure Well-Architected Framework | Microsoft Learn
Demystifying Kubernetes Operators: Creation, Benefits, and Use Cases | Linux Journal
Kubernetes vs. Docker: Exploring the Synergy in Containerization | Linux Journal
Stabilizing Migrations to the Cloud with SQL Baselines
Running Simple HTTP Web Server Using PowerShell | Windows OS Hub
Sysadmin Stories: Moving Backups to Hardened Linux Repositories
Terence Luk: Automating the creation of Azure Calculator estimates with Selenium and Python
Remove expired root certificates from a vCenter Server the easy way - ivobeerens.nl
Install-Module VMware.PowerCLI -Scope CurrentUser -Force -SkipPublisherCheck -AllowClobber Connect-VIServer "VCENTER-FQDN" Get-VITrustedCertificate -vCenterOnly | Where-Object { $_.NotValidAfter -lt (Get-Date) } Get-VITrustedCertificate -vCenterOnly | Where-Object { $_.NotValidAfter -lt (Get-Date) } | Remove-VITrustedCertificate
The best way to compost your food scraps | Engadget
The early days of Linux [LWN.net]
Cybersecurity Seminar Series · UCSF-Stanford Center of Excellence in Regulatory Science and Innovation (CERSI)
How to compost in Greenville, SC - GVLtoday
Atlas Organics | Creating Compost and Reducing Waste
Composting At Home | US EPA
Home Composting Basics – Institute for Local Self-Reliance
Backyard Composting | New Mexico State University - BE BOLD. Shape the Future.
JG-Complete-Guide-to-Home-Composting.pdf
Comixology’s Marvel Comics app is shutting down in June | Engadget
Although Marvel has apparently gone out of its way to make this transition relatively smooth, it still illustrates the potential for chaos when digital content shifts platforms. We don’t own any of this stuff, so when parent companies mismanage apps, lay off workers and shuffle priorities, we’re left to hope mega-corporations want to do right by their customers — a trust factor worth bearing in mind any time you buy a comic, game or any other digital media.
Baked Ziti Recipe
Principles and Practices for Software Bill of Materials for Medical Device Cybersecurity | International Medical Device Regulators Forum
Remembering Virginia Norwood, the ‘mother’ of NASA’s Landsat program
She reportedly had no issue with the “the mother of Landsat” moniker her peers gave her. “Yes, I like it, and it’s apt,” she said. “I created it, I birthed it, and I fought for it.”
The Italian Data Protection Agency gives OpenAI a chance to avoid being banned | Engadget
Supercharge Your Cloud Native App Development with Kubernetes
Enhanced Resource Management: Kubernetes orchestrates the deployment, scaling, and operation of application containers across clusters of machines with great efficiency. This efficient management of resources ensures optimal usage of computing power, leading to cost reductions and improved productivity for developers and businesses alike. Kubernetes also provides an intelligent scheduler that places containers based on resource availability and constraints, further optimizing resource management. Effortless Scaling Capabilities: Kubernetes simplifies the process of scaling applications by offering both horizontal and vertical scaling options. Horizontal scaling involves adding or removing instances of your application based on demand, while vertical scaling adjusts the resources allocated to each instance. With auto-scaling features, Kubernetes automatically scales your applications according to real-time metrics and pre-defined thresholds, improving performance and a superior user experience. Simplified Deployment and Updates with Rolling Updates: Kubernetes leverages declarative configuration to define your application’s desired state, streamlining deployment and updates. It supports rolling updates, which incrementally update application instances with minimal disruption to users. This approach allows you to concentrate on writing code while Kubernetes oversees the deployment and updating of your applications, resulting in hassle-free rollouts, rollbacks, and feature implementations with minimal downtime. Resilient Self-Healing Features and Load Balancing: Kubernetes has self-healing mechanisms that autonomously detect and resolve issues, such as container failures, network congestion, and resource depletion. It automatically restarts failed containers, reschedules containers on unresponsive nodes, and ensures optimal load distribution across available resources. Kubernetes also provides built-in load balancing for services, distributing network traffic efficiently and enhancing application performance. Vibrant Ecosystem and Collaborative Community: Kubernetes is supported by a diverse ecosystem of tools, plugins, and services that can augment your application’s capabilities. From monitoring and logging solutions to CI/CD pipelines and security tools, the Kubernetes ecosystem has many offerings to meet your specific needs. Additionally, the platform boasts an engaged community of developers and users eager to exchange knowledge and expertise, fostering a collaborative environment. Seamless Integration with Cloud Providers and On-Premise Infrastructure: Kubernetes is designed to be infrastructure-agnostic, making it easy to deploy and manage your applications on various cloud platforms, including AWS, Google Cloud, and Azure, as well as on-premise infrastructure. This flexibility enables organizations to adopt a multi-cloud or hybrid cloud strategy, providing increased agility and avoiding vendor lock-in.
Automated Data Visualizations in Python « Oralytics
4 Trends in Cloud Infrastructure | APMdigest - Application Performance Management
1. Kubernetes Security and Observability 2. MLOps/LLMOps 3. Confidential Computing 4. WebAssembly
PowerShell Measure-Object: A Complete Guide with Examples
A Beginner Guide to Using PowerShell Hashtable
How to Craft a Modern PowerShell Message Box
10 Japanese Concepts That Will Fire Your Self-Motivation For Certification Study | by Dave On Cyber | Medium
(21) Using the principles of the Japanese Martial Arts to better handle your next audit. | LinkedIn
questions
Protecting your business with Wazuh: The open source security platform
Ransomware hackers leak second batch of city data from Oakland attack | Engadget
Matt Ventura's blog » Blog Archive » Restoring eBay’s Sale History Link
// ==UserScript== // @name Restore eBay sold items link // @version 1 // @grant none // @match *://*.ebay.com/itm/* // ==/UserScript== element = document.querySelector("div.d-quantity__availability span:last-child") text = element.textContent re = /(.*)\/itm\/([0-9]+).*/ url = document.location.href.replace(re, '$1/bin/purchaseHistory?item=$2') element.innerHTML = '<a href="' + url + '">' + text + '</a>'
World Backup Day March 31, 2023 | Born's Tech and Windows World
Review of the VMware ESXi server cyberdebacle (Feb. 2023) | Born's Tech and Windows World
WINDOWS-OPTIMIZATIONS/W10ANDW11-NETWORK-TCP-DESUBOPTIMIZATION.ps1 at main · MysticFoxDE/WINDOWS-OPTIMIZATIONS · GitHub
The Quiet Collaboration between Canadians and Jimmy Carter - Open Canada
48 years and counting @ AskWoody
April 4, 1975.
Do you know the easy way to get into the boot menu? @ AskWoody
On Windows 10 and 11, Click the Windows Start menu, then the Power button. While pressing down the Shift key, click the Restart button. This will take you to the Windows Troubleshooting options, where you can reboot to BIOS.
Smart Pot® Fabric Planters
New – Self-Service Provisioning of Terraform Open-Source Configurations with AWS Service Catalog | AWS News Blog
My portable Lab – Retouw.nl
2 8
Does CVE-2022-38023 have any impact to ONTAP 9 - NetApp Knowledge Base
GitHub - otoriocyber/DCOM-HardeningTool: Powershell script for Windows to retrieve the authentication hardening status of DCOM applications
Microsoft Defender Antivirus compatibility with other security products – Microsoft Systems, Cloud and azure professionals
How to monitor Kubernetes Controllers – Povilas Versockas
So to apply the Four Golden Signals method, I propose that you monitor the internal work queues. For example, you can watch the following metrics: Latency – How long does it take to process an event from the work queue? Errors – How often does the Controller retry an item due to an error? Requests – How much work does the Controller get in its queue? Saturation – How many items are in the queue? Or how long an item sits in the queue?
Newsletters I Like Outside of Learning & Development
e. I’m sure there’s a way to link the pages to the
KB5021130: How to manage the Netlogon protocol changes related to CVE-2022-38023 - Microsoft Support
Matt Ventura's blog » Blog Archive » Broadcom 9400 – Should You Buy One for a Homelab?
How to Increase Virtual Machine Disk Size in VMware? | Windows OS Hub
Import-CSV: Reading CSV Files with PowerShell | Windows OS Hub
Misir Wot Recipe -- Ethiopian Red Lentil Stew -- Gluten Free, Vegan, and Delicious | Penniless Parenting
berbere powder
Best Buy’s new recycling program will let you mail in your old electronics | Engadget
pickup
Biden says it 'remains to be seen' if AI is dangerous | Engadget
The dos and don’ts of location sharing | Engadget
Catan creator Klaus Teuber has passed away at 70 | Engadget
40-Gigabit Infiniband: An Inexpensive Performance Boost For Your Home Network - Patshead.com Blog
n’t relevant to the 40-gigabit or 56-gigabit hardware, but I think it is worth clearing up. All the cards in Mellanox’s 25000-series lineup follow the PCIe 2.0 spec, but half of the cards only support 2.5
Twitter designates NPR as 'US state-affiliated media' | Engadget
Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles | eSecurityPlanet
Monitoring Oracle Servers With Checkmk | Linux Journal
Employee and patient files from Montgomery General Hospital leaked by ransomware group
How AWS uses eBPF to identify security risks
A Complete Guide to Security Automation & Reporting Using Open Sour...
Can You Crack a KeePass Database if You Forgot Your Password? - Davis Tech Media
Using Hashcat Rules to Create Custom Wordlists | Infinite Logins
Machine Learning in Linux: Dalai - LLaMA and Alpaca - LinuxLinks
GitHub - vantzs/msptools: Free & Paid Tools for any Startup MSP - We offer consulting, contact vantz @ elitepconline (dot) com.
Ansible Roles Tutorial For Beginners - OSTechNix
Vulnerability in DJI drones may reveal pilot's location - Help Net Security
3 Things to Know About the 5-Step Risk Management Process – Business
The four essential steps of the process include: Risk identification: The process basically entails determining the events that can affect your project or organization. Risks can be identified by analyzing existing documents, conducting a brainstorming process, and leveraging standard methodologies like FMECA (Failure Mode Effects and Criticality Analysis). Risk assessment: You can assess risks either using qualitative or quantitative analysis. The quantitative analysis assesses the financial effects of a risk event. Meanwhile, qualitative analysis assesses the criticality of risk based on its probability of occurring and its implications. Risk treatment: Risk treatment aims to reduce the likelihood of a risk occurring or minimize its impact if it does occur. Risk monitoring and reporting: Risk monitoring and reporting ensures that there are sound forums for reducing risk escalation. It also ensures that the appropriate responses are being taken to mitigate risks.
Debian 12 Bookworm: Best New Features
Debian 12 now detects Windows 11 while using in a dual-boot setup. Screen reader support is enabled by default for the Cinnamon desktop in Debian Automatic launching of speech synthesis after 30 seconds timeout Easier detection of multipath devices Support for multiple initrd paths Support for new ARM and RISC-V devices Experimental DMRAID support is dropped
Signs & Symptoms Indicating RAM Failure | Here's How To Identify Them
The Best Way to Transplant Supermarket “Living Herbs” – Garden Betty
Error Handling In Ansible Playbooks - OSTechNix
Updating Micron 1100 Series SSD firmware on Linux - LIEBERBIBER
M0MU03
Chris's Wiki :: blog/tech/DiskErasingWhoAreYouStopping
Chris's Wiki :: blog/linux/SoftwareRaidDiskCountEffects
Microsoft's new Security Copilot will help network admins respond to threats in minutes, not days | Engadget
Steam will drop support for Windows 7 and Windows 8 on January 1st, 2024 | Engadget
Just under 1.9 percent of the software's audience is using one of the relevant Windows versions, according to Valve's latest survey. That still affects a significant number of people, though, and may leave them no choice but to either upgrade their OS or buy a PC with a supported platform. The end of support could be particularly troublesome if you need an older version of Windows for work or a retro gaming system.
Sweet and Salty Cucumber Salad with Dill Recipe -- Gluten Free, Vegan, Allergy Friendly | Penniless Parenting
Chris's Wiki :: blog/programming/BackportsAreHard
Chris's Wiki :: blog/sysadmin/LetsEncryptSharedAccountEffects
Chris's Wiki :: blog/sysadmin/BMCsCanNeedRebooting
Create Windows VMs in Azure with Terraform - ivobeerens.nl
Azure VMware Solution Syslog Forwarder – vcdx133.com
Restore the Windows 11 Right Click Menu | PeteNetLive
Chris's Wiki :: blog/sysadmin/AlertOnWhatYouCareAbout
Chris's Wiki :: blog/linux/FindingPython2UsesWithAudit
Chris's Wiki :: blog/sysadmin/AlwaysMakeAChecklist
How to Migrate VMs to New vCenter using PowerCLI - Notes of a scripter
Monitor your AWS bill · Major Hayden
Was I Serious? How to Install GnuCOBOL on Debian 11 - LowEndBox
My experience replacing the Steam Deck SSD | Logan Marchione
New module for Malware Bazaar API | >_
Powershell – Get file audit reports from Event Viewer | geekdudes
$EventId = 4663 $results = Get-WinEvent -FilterHashtable @{logname='Security'; id=$EventId; StartTime = "03/24/2023 09:30:00" } |` Where-Object { $_.message -match "C:\\folder1\\" -or $_.message -match "D:\folder2" -or $_.message -match "D:\folder3" -and $_.message -notmatch "Account Name:\s*account1*" -and $_.message -notmatch "Account Name:\s*machine$*"}` | Select-Object -Property TimeCreated, @{Label='Account'; Expression={$_.properties[1].Value}}, @{Label='ObjectNAme'; Expression={$_.properties[6].Value}} $results | Export-Csv "C:\1.csv" -NoTypeInformation -Encoding UTF8
Hybrid Cloud - Shared Responsibility Model » cyberfella_btc
Chris's Wiki :: blog/linux/LinuxBlockDiscardInPractice
Chris's Wiki :: blog/web/WebServerMTLSHazards
Chris's Wiki :: blog/tech/SSDBlockDiscardHowSecure
Systemd Hardening — Peter's IT Docs
Logging of interactive user sessions to rsyslog – Running Systems
Explore the Command and Ensure the Efficiency - tommymaynard.com
Use Let's Encrypt certificates with Cockpit :: TODO: Document — typealias Writer = Developer
Cmdlets 101: What They Are and How to Use Them in PowerShell
SSSD and SUDOers – Stuff I'm Up To
IP Address RegEx – Stuff I'm Up To
grep -oE '((1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])\.){3}(1?[0-9][0-9]?|2[0-4][0-9]|25[0-5])' file
AWS Clean Rooms Now Generally Available — Collaborate with Your Partners without Sharing Raw Data | AWS News Blog
How to Detect PoshC2 PowerShell Implants - VMware Security Blog - VMware
PoshC2
Reduce costs with Azure Spot virtual machines - MARKSWINKELS.NL
Which database to choose from cloud? | Cloud System Automation and configuration management
Sending an E-mail to a Microsoft Teams Channel | Windows OS Hub
CISA director urges top business leaders, board members to take cyber risk ownership | Cybersecurity Dive
Internet Archive violated publisher copyrights by lending ebooks, court rules | Engadget
Enforcement of Cybersecurity Regulations: Part 1 - Lawfare
Building From the 2023 National Cybersecurity Strategy: Reshaping the Terrain of Cyberspace - Lawfare
IAPP - EU Data Initiatives in Context
CTG_Case Study_Agfa HealthCare_SAFe Implementation Consultancy and Training Reference.pdf
OpenAI says a bug leaked sensitive ChatGPT user data | Engadget
The NIS 2 Directive: what does it mean for my organization? | Centre for Cyber security Belgium
Windows 11 security flaw exposes cropped-out screenshot data | Engadget
aCropalypse
Hacks Weekly #48 Introduction to Stackwalking | CQURE Academy
Can TikTok convince the US it’s not a national security threat? | Engadget
contagio: Malware Arsenal used by Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) in attacks targeting Ukraine (samples)
ODA and Dbvisit : Create a SNAPSHOT database?
A generic jdbc tester (part II)
A generic jdbc tester (part II)
A generic jdbc tester (part III)
A generic jdbc tester (part III)
SEHA on ODA?
SEHA on ODA?
A generic jdbc tester (part I)
A generic jdbc tester (part I)
Log Rotation in JBoss-EAP
Log Rotation in JBoss-EAP
Uyuni, an open-source configuration and infrastructure management solution for software-defined infrastructure (2) – Adding a client
Uyuni, an open-source configuration and infrastructure management solution for software-defined infrastructure (1) – The server
Uyuni, an open-source configuration and infrastructure management solution for software-defined infrastructure (1) – The server
Create and manage Ansible Execution Environments
Secure your SQL scripts with an Oracle wallet
Overcome jboss-cli Limitations with Ansible
Overcome jboss-cli Limitations with Ansible
Apache JMeter Playground
Oracle TDE part II : Encrypting Data
Oracle TDE part II : Encrypting Data
Why you should consider keeping your ODA more than 5 years
Oracle TDE part I : Configuring the Encryption
Oracle Database Backup Cloud Service
Assess security risks in your open source project with Scorecard | Opensource.com
Homemade Chocolate Bars - Just 3 Ingredients!
One Sheet Plywood Bookshelf | Kreg Tool
Five Estate Planning Moves to Make After Divorce - FindLaw
Kali Linux: What's next for the popular pentesting distro? - Help Net Security
Two questions drive Kali’s development: 1. What needs to be done to ensure that Kali Linux is the best possible platform for professional and hobbyist information security work? 2. What needs to be done to ensure that Kali is the best possible platform for information security training?
Controversy of 'init' and 'systemd' in Linux
How to Install Cortex Observable Analysis Tool on Ubuntu 22.04
Getting Started With Proxmox Backup Server - OSTechNix
How to Create Your Own Self-Hosted Office 365 with Cryptpad - Make Tech Easier
Use Ansible To Automate Logical Volume Manager (LVM) - OSTechNix
How to Install and Use Vuls Vulnerability Scanner on Ubuntu 22.04
Automating Role Assignment Cleanup in Azure with PowerShell - Cloud for the win!
Just one more esxi-guy: Esxi Boot Disk Information
Why CISOs Should Prioritize Extended Detection & Response (XDR) - VMware Security Blog - VMware
Reducing risk. CISOs continue to face significant challenges in reducing the risk and limiting the scope of disruption to critical business functions that result from cyberattacks. The adversaries that target them are relentless, skilled, persistent, adaptive, and have at their disposal an ever-growing array of increasingly sophisticated, off-the-shelf tools and techniques to deploy. Adversaries hold few, if any, qualms as to who they attack and what information they steal, and they consider the brand damage and financial losses their victims suffer as chips to be wagered as they negotiate ransomware payments. The level of sophistication and persistence that was previously characteristic of attack campaigns conducted by nation-state attackers for the purpose of espionage against the few has become the norm for financially motivated attacks against the many. Reducing operational costs. CISOs operate under budget constraints while external compliance and reporting requirements ratchet up the pressure. They are focused on the need to optimize operational spending across two domains. First, the costs associated with implementing and operationalizing new security controls, along with the staffing costs associated with running those controls. Second, the costs related to both the increasing premium costs and scope of policy exclusions in the cyber insurance market. CISOs report a materially increased level of additional scrutiny by cyber insurers over their security controls and capabilities, which is driving them to prioritize additional security controls to improve their insurability and reduce the costs of premiums. Attracting and retaining talent. There is continued concern among CISOs regarding the need for skilled security professionals to fill open roles, along with the challenge of retaining valuable team members they already have on staff. Even in this contracting job market, cyber expertise is a valued and highly fought-over commodity. CISOs have an urgent requirement to improve the Security Operations Center (SOC) analyst experience in order to attract and retain talent.
AWS Application Composer Now Generally Available – Visually Build Serverless Applications Quickly | AWS News Blog
How To Destroy Your Wealth — My Money Blog
German Apple Pancake Recipe {Apple Oven Pancake} | Girl Vs Dough
LastPass Publishes More Details about Its Data Breaches - TidBITS
6 Types of Screws Every Maker Should Know About – Cool Tools
”My tip is simple, but I use it every day. If you take a Retractable Badge Holder 10 Pack, and clip the top to the wall or bench, and the bottom to a wire(soldering iron, glue gun, power supply, .etc), it keeps the cable out of the way while keeping it accessible. I use them every day and the tension is just enough so the wire rises without being too uncomfortable.”
We Know Security Is A Concern, But What Is Actually Going On? - IT Jungle
VCP-DCV on vSphere 8.x Objective 1.8 – Describe the role of Virtual Machine Encryption in a data center - ESX Virtualization
The Art of Managing Threat Feeds - VMware Security Blog - VMware
LVHN: Ransomware hackers put cancer patient photos on dark web
Balancing the Rising Costs of Public Cloud | APMdigest - Application Performance Management
Hitting the Books: AI is making people think faster, not smarter | Engadget
(22) The "CIA Triad"​ Is Insufficient In The Age of AI/OT/IoT | LinkedIn
The security of systems, applications and services must include controls to offset possible threats, as well as controls to ensure Confidentiality, Integrity, Availability and Safety (CIAS): CONFIDENTIALITY – This addresses preserving authorized restrictions on access and disclosure to authorized users and services, including means for protecting personal privacy and proprietary information. INTEGRITY – This addresses protecting against improper modification or destruction, including ensuring non-repudiation and authenticity. AVAILABILITY – This addresses timely, reliable access to data, systems and services for authorized users, services and processes. SAFETY – This addresses reducing risk associated with technologies that could fail or be manipulated by nefarious actors to cause death, injury, illness, damage to or loss of equipment.
Are Your (old) ESXi Hosts Publicly Available? — They won't be for long. · vNinja.net
Lessons to be learned here? # Don’t expose vCenter or ESXi hosts to the internet. No exceptions (except Honeypots of course) Ensure admin access (vCenter, ESXi and other management interfaces/APIs) is limited to clients that need it and is properly secured (think Zero Trust, MultiFactor Authentication etc.) Patch your stuff. To quote myself from two years ago: To be blunt; there is simply no valid reason why your VMware vCenter, or ESXi hosts, should be available over the internet, none what so ever. In fact, it shouldn’t even be available from non-admin clients in your local network, let alone via the internet. If that is the case in your environment, odds are that there are probably other big issues present in your infrastructure as well.
Building and deploying your first app on Tanzu Application Platform (2/3) | viktorious.nl – All things cloud-native
Update on vSphere version adoption – Welcome to vSphere-land!
40 Useful Concepts You Should Know - by Gurwinder
Mighty-Tuff™ Series
How To Show Your Love With a Complete Estate Plan - FindLaw
Managing Legacy Technology Security – Health Sector Council
Health Industry Publishes “Health Industry Cybersecurity-Managing Legacy Technology Security”
How a Thief with Your iPhone Passcode Can Ruin Your Digital Life - TidBITS
FDA reportedly denied Neuralink's request to begin human trials of its brain implant | Engadget
Unlock Your Leadership Potential: 12 Must-Read Books to Take Your Skills to the Next Level | by Mofrad Muntasir | Writers’ Blokke | Jan, 2023 | Medium
“Leadership is the capacity to translate vision into reality.” -Warren Bennis “The key is not to prioritize what’s on your schedule, but to schedule your priorities.” “Autonomy is the power to steer our own lives. It is the feeling that we are in control of our own destiny.” “The only way to win is to learn faster than anyone else.” “The greatest day in your life and mine is when we take total responsibility for our attitudes. That’s the day we truly grow up.” “Leadership is not about being in charge. It’s about taking care of those in your charge.” “Good is the enemy of great. And that is one of the key reasons why we have so little that becomes great.” “Leadership is the capacity to translate vision into reality.” “People don’t buy what you do, they buy why you do it.” “Vulnerability is the core of all emotions and feelings. It’s the glue that holds relationships together.” “The true test of leadership is how well you function in a crisis.” “The most dangerous words in business are, ‘We’ve always done it this way’.” “Leadership is not about being in charge. It’s about taking care of those in your charge.”
Beware of the fine print @ AskWoody
Amazon officially becomes a health care provider after closing purchase of One Medical | Engadget
How to Write an Essay or Article in Just 10 Minutes – Careers
Then, when you’re ready to write your essay, use the tricks below. They will help you to finish your work in just 10 minutes: Pick a general topic that interests you and brainstorm any ideas related to it. For example, your topic could be about your favorite books, or movies, or anything else. Take a break for five minutes and drink some water. After the break, list all your ideas on paper. Choose the idea that suits best for the essay or article you need to write. Organize your thoughts so they are easy to read and clear. Write the introduction for your essay first. Write down all the points with examples as well.
FBI says it has 'contained' a cybersecurity incident on its network | Engadget
CyBOK – The Cyber Security Body of Knowledge
Azure Active Directory – Security Overview | Marius Sandbu
Managing Multiple Python Installs and Packages with Pyenv and Pipenv | HumairAhmed.com
New – Deployment Pipelines Reference Architecture and Reference Implementations | AWS News Blog
How to use terraform to quickly deploy a decent Azure network - Cloud for the win!
What If the way for fighting ransomware was to backup directly to Object storage with immutability On-Prem? - ESX Virtualization
Fedora now has frame pointers | Richard WM Jones
Sysadmin Stories: Five Reasons to Monitor Your Infrastructure with Veeam ONE
1. Backup repository connection failure 2. Backup job state 3. Suspicious incremental backup size 4. Job disabled 5. Immutability state
SNMP explained | Electric Monk
Malware Detection in Container Images - VMware Security Blog - VMware
Google Fi warns customers that their data has been compromised | Engadget
GitHub - romantomjak/packer-proxmox-template: Packer configuration for creating Debian 11 virtual machine templates for Proxmox VE
The Internet Archive's Calculator Drawer lets you relive high school math class | Engadget
Precision audio ripping with abcde – 0x 0f5f 912c
Ender3 Ikea Lack Table Printer Enclosure – CubicleNate's Techpad
Wearable ultrasound patch could offer real-time heart scans on the go | Engadget
Additional GoTo Data Stolen in the LastPass Breach - TidBITS
FDA clears Wandercraft's exoskeleton for stroke patient rehab | Engadget
DSHR's Blog: Internet Archive Storage
DSHR's Blog: Optical Media Durability Update
FAA Outage: System Downtime Puts an Entire Industry on Hold | APMdigest - Application Performance Management
Manage Your Project Deadlines. A good deadline keeps your customers… | by Ben Cotton | The Pragmatic Programmers | Dec, 2022 | Medium
Project deadlines should fall somewhere between two points: the earliest it could be done if everything goes well and the latest it can be done and still be useful.
Bulk Creating Users For Your Test Network | PeteNetLive
Tools for writing simpler English | Nelson's log
UPS battery replacements by size | Nelson's log
Red flags · Major Hayden
Automatic container updates with watchtower · Major Hayden
Requirements for Cyber Insurance are Changing…Fast!  - VMware Security Blog - VMware
. The following type of questions from insurers are becoming commonplace: Have you implemented endpoint security tools (such as EDR) with behavioral detection and exploit mitigation capabilities? Is there a team of analysts dedicated to monitoring the output of the EDR tool in place? Is that team internal or external? What % of endpoints is EDR fully operationalized on? Has the EDR solution been configured to actively “block” threats? Has the EDR solution been adequately tuned in your environment to detect and prevent ransomware?
Is the Portrait of J. Random Hacker Still Accurate? - LowEndBox
Have You See the Internet Archive's Stolen Truck? - LowEndBox
We Said Goodbye to These Technologies in 2022 - LowEndBox
The iPod: No, not the old classic one with the wheel. The iPod Touch. Apple announced there will be no more. By now, the universe of old iPhones that people can use as iPods is so enormous that a dedicated iPod isn’t needed any more. Blackberry OS: “As a reminder, the legacy services for BlackBerry 7.1 OS and earlier, BlackBerry 10 software, BlackBerry PlayBook OS 2.1 and earlier versions, will no longer be available after January 4, 2022”. So says the BlackBerry OS FAQ page. This OS goes back to 1999. Google Stadia: Google’s cloud gaming offering never really gained steam (ha!) with users, folding after less than 3 years in operation. Facebook Portal: Turns out consumers down want a Zuckerberg spy cam in their home. Who knew? CentOS 8: CentOS moved to a, uh, streaming platform and CentOS 8 went EOL 12/31/2021. Debian 9 (Stretch): End of long-term support was June 30.
The FAA grounded all US flights because contractors mistakenly deleted files | Engadget
Our Articles Are Written By Humans, Unlike ONE Site We Could Name. And We Do. - LowEndBox
SuperMicro is a Shaky House of Cards? - LowEndBox
Tailscale is Awesome! - Patshead.com Blog
Fail2ban with Gitea – Stuff I'm Up To
Pathfinding - Wahl Network
Speed Up tar with pigz – Stuff I'm Up To
Reduce Carbon FootPrint with the help of CO2 Scope software from EasyVirt - ESX Virtualization
IAM is the Perimeter :: packetmischief.ca
ESXi 7.x to 8.x upgrade scenarios - ESX Virtualization
vim-cmd hostsvc/firmware/sync_config vim-cmd hostsvc/firmware/backup_config esxcli software profile update -d https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml -p ESXi-8.0a-20842819-standard
Terraform and vSphere – Part 4: More Compute Cluster Resources – Adventures in a Virtual World
List of Special Parameters in Bash with Examples
FAA grounds US flights following NOTAM computer outage
Raspberry Pi's new 12-megapixel camera modules provide powered autofocus
What are the best dimensions for a Desk PC? – DIY Desk PC
Mobile Verification Toolkit
Searching for Susy Thunder
GitHub - PlankCipher/kabmat: TUI program for managing kanban boards with vim-like keybindings
GitHub - MycroftAI/mimic3: A fast local neural text to speech engine for Mycroft
GitHub - StamusNetworks/suricata-4-analysts: The Security Analyst’s Guide to Suricata
Monica: An Open-Source App for Personal Relationship Management
How to Backup and Restore Linux Commands History
Cleaning up Docker space · Igor Moiseev
A Career in Linux is What You Should Be Pursuing In 2023
Security measures to protect Kubernetes workloads - Help Net Security
CI Fuzz CLI: Open-source tool to test Java apps for unexpected behaviors - Help Net Security
A change in Oracle 12.2 and 19c with MV Refresh Stats Collection
Data Pump Bundle Patches: You may need to download again
Apply the Data Pump Bundle Patch - non-rolling but online?
Testing Your Weakest Links as a Chain | The Networking Nerd
Managing infrastructure with Terraform, CDKTF, and NixOS
How to Remove Hidden/Ghost Network Adapters in Windows? | Windows OS Hub
set devmgr_show_nonpresent_devices=1
Chris's Wiki :: blog/linux/SystemdCgroupsHierarchies
Thousands unpatched Citrix servers vulnerable via critical vulnerabilities | Born's Tech and Windows World
Is an Exchange ProxyNotShell disaster looming at the corner? | Born's Tech and Windows World
Real Time Speech to Text from Radio Speech via DragonOS, SDR4Space, Mosquitto and WhisperCPP
TikTok will be banned on most US federal government devices | Engadget
voidtools
Can you run your test suite successfully 1000 times in a row?
Book Review: Secure by Design – Adventures in the programming jungle
USENIX Security '22 - Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum ‘Caring About Sharing: User Perceptions Of Multiparty Data Sharing’ - Security Boulevard
Flipper Zero Hacker Tool Gets UI Editor For Custom Apps | Hackaday
All About USB-C: Introduction For Hackers | Hackaday
Hardware Store Chemicals Transform Sheets Into Waterproof Tarps | Hackaday
Board-DB: The Single Board Computer Database - Board-DB
Power Over Ethernet, Explained | Hackaday
How Compliance Automation Can Turn Your Risk Register into a Valuable Business Tool - Security Boulevard
Insurance and Regulations May Be the Biggest Security Drivers of 2023 | Lookout - Security Boulevard
vCenter CPU Usage reaches 3000 % in VIMTOP | Techbrainblog
How to check the DNS server IP being used (Ubuntu 18.04+) – ServerAdminBlog
Linked - The Perks of a High-Documentation, Low-Meeting Work Culture
All About USB-C: Cable Types | Hackaday
Getting started with OpenTelemetry for Python - DEV Community 👩‍💻👨‍💻
A Roadmap to Zero Trust Architecture
Users Establish a corporate identity Enforce MFA for all applications Endpoints and Devices Implement MDM/UEM to control corporate devices Implement endpoint protection Inventory all corporate devices, APIs and services Internet Traffic Block DNS requests to known threats Block threats behind SSL/TLS Networks Segment user network access Use Internet backbones for branch to branch connectivity Close all inbound ports open to the Internet for application delivery Applications Monitor inbound emails and filter out phishing attempts Inventory all corporate applications Zero Trust policy enforcement for Applications Publicly addressable Privately addressable SaaS applications Non-browser apps (SSH, RDP, SMB, thick clients) Protect applications from Layer 7 attacks (DDoS, injection, bots, etc) Enforce HTTPS and DNSsec Data Loss Prevention and Logging Establish a process to log and review traffic on sensitive applications Define what data is sensitive and where it exists Stop sensitive data from leaving your applications (e.g. PII, CCNs, SSNs, etc) Identify misconfigurations and publicly shared data in SaaS tools Establish a SOC for log review, policy updates and mitigation Stay up to date on known threat actors Steady State Employ a DevOps approach to ensure policy enforcement for all new resources Implement auto-scaling for on-ramp resources
Recap of AWS re:Invent 2022: An Honest Review | Resmo
25+ Vulnerable Websites To Practice Your Hacking Skills
writing one sentence per line | Derek Sivers
Learn the Many Ways in PowerShell to Get The Windows Version
Get-ComputerInfo | Select-Object WindowsProductName, WindowsVersion, OsHardwareAbstractionLayerVersion
100 Rules To Live By - Dru Riley
Digital Journalism Style Guide of Inclusive Language | Language Please
Visualize Value
What's That Charge?! Identify those mysterious charges on your credit card statement
Animated Knots by Grog | Learn how to tie knots with step-by-step animation
Find UUID of Storage Devices in Linux
blkid
Doc Searls Weblog · When Clouds Crash
Watch Duty: California Wildfire Watch Driven by RTL-SDRs
DEF CON 30 RF Talks: Biohacking, Designing Antennas, Tracking Military Ghost Helicopters and More
Discover Managed Data Visualizations With AWS Grafana
PowerCLI to check for Python Exploit in VMware - Notes of a scripter
A Terraform Learning Plan - buildVirtual
Chris's Wiki :: blog/web/CurlTestingAlternateServer
Chris's Wiki :: blog/sysadmin/GroundUpRecoveryPlanThinking
Installing a Windows Domain Certificate in Apache Tomcat – Michael Ellerbeck
Should you go to law school in the US to have a high-impact career? - Career review
Swift, Shells In The 1960s, And Some Swift Scripting Examples For Admins - krypted
The reason Ken Thompson wrote the Thompson Shell (/bin/sh) when he and the team at Bell Labs developed Unix was that they didn’t want to have to teach programming to people in the patent office, who funded the PDP they used to write Unix.
The Distributed Computing Manifesto | All Things Distributed
Amazon's Distributed Computing Manifesto - Marc's Blog
Perhaps the most interesting part of the manifesto for me is the description of the cultural change that needs to go along with the change in architecture.
Find windows OS version from command line
Friday Fun: PowerShell Scripting with ChatGPT • The Lonely Administrator
Think of the AI as a muse for inspiration.
Blocking control-mousewheel in browsers | Nelson's log
That's a Gorgeous Benchmark! - LowEndBox
Transparent encryption of node to node traffic on Amazon EKS using WireGuard and Cilium | Containers
How to Make a Late Software Project Later: RIP, Fred Brooks (1931-2022) - LowEndBox
US Government Releases Blueprint for an AI Bill of Rights - LowEndBox
The blueprint calls out five principles. Safe and effective systems: you should be protected against people unwilling to or incapable of protecting you. Algorithmic discrimination protections: I’m sure programmers will enjoy the recommended “proactive equity assessments”. Data privacy: What you’d expect. Notice and explanation: The description of this is…interesting. You should know how and why an outcome impacting you was determined by an automated system, including when the automated system is not the sole input determining the outcome. Automated systems should provide explanations that are technically valid, meaningful and useful to you and to any operators or others who need to understand the system, and calibrated to the level of risk based on the context. Reporting that includes summary information about these automated systems in plain language and assessments of the clarity and quality of the notice and explanations should be made public whenever possible. Human alternatives, consideration, and fallback: You should be able to get ahold of someone to fix problems if automated systems can’t.
Ransomware attack responsible for Rackspace Exchange instance outage in Dec. 2022 | Born's Tech and Windows World
Delivering True Storage-as-a-Service - Architecting IT
Firmware update fixes Jabra (e.g. Engage 75) headsets issues with MS Teams (Dec. 15, 2022) | Born's Tech and Windows World
Google, Apple and Mozilla team up to build a better browser benchmark | Engadget
A Basic(ish) Active Directory Look-Up Script - tommymaynard.com
Too Much Information Running Through My Brain | This is Hyper-Disaggregated
How to Enable SSH on All ESXi Hosts using PowerCLI - buildVirtual
ESXi Advanced & Kernel Settings Reference
Henry Ford's Balanced Approach to Cybersecurity
AWS Fault Injection Simulator Cross Account Experiments via AWS StepFunctions – Laurent Domb
ChatGPT and Creating For Yourself | The Networking Nerd
Creating a modifiable gzipped disk image | Richard WM Jones
Sysadmin Stories: What I've Learned From Using Instant Clones in vSphere
Memory Deduplication on ESXi with Transparent Page Sharing - The Tech Journal
Using Code Capture to decipher VMware APIs -
Building Confidence Through Chaos Engineering on AWS – Laurent Domb
Hitting the Books: AI is already reshaping air travel, will airports themselves be next? | Engadget
History of the Internet - RoseHosting
How to Disable or Enable IPv6 in RHEL, Rocky & AlmaLinux
GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX ipv6.disable=1"
Private-Sector Cyber Defense in Armed Conflict - Lawfare
Kubernetes etcd backup and restore - cheat sheet -
Performance Analysis Using PCP
How to Do a UDP Ping in Linux
sudo nmap -sU -p 161 itsfoss.com netcat -v -u -z itsfoss.com 161
10 Best Open Source Bots for Your Discord Server
How to enable timestamp in history command
$ vi ~/.bashrc ----------- export HISTTIMEFORMAT="%F %T " ----------
Conferenceware – Bruce Elgort
Conferenceware A demonstration of software or hardware specifically meant to work only at a trade show or conference and nowhere else.
ChatGPT: An AI That Can Build Human-Like Conversations
Firewalld in Examples: A Complete Beginner’s Guide
Security flaw in Florida tax website exposed filers' sensitive data | Engadget
AWS Security. A compilation of stories written about… | by Teri Radichel | Cloud Security | Nov, 2022 | Medium
Amazon Inspector Now Scans AWS Lambda Functions for Vulnerabilities | AWS News Blog
AWS Wickr – A Secure, End-to-End Encrypted Communication Service For Enterprises With Auditing And Regulatory Requirements | AWS News Blog
7 Important Estate Planning Documents To Put Your Affairs In Order | Penniless Parenting
Dealing with loss is tough, and you’ve probably lived long enough to experience the death of a loved one, so you probably know how difficult it is to navigate life while grieving. You can write down your funeral wishes to ensure that your surviving relatives don’t have to deal with the burden of planning a funeral while mourning your death. The most important reason you must write down your wishes is to avoid conflict in your family. With your funeral plans in writing, no one can contest each other, and they would have to follow your instructions. A funeral plan should cover topics like how you would like to be sent off, whether a traditional burial or cremation. It should also include the type of ceremony you want, the time, a
Do Employers Have to Tell You They Are Monitoring Your Computer? - FindLaw
Cumulative vs. Cyclical Knowledge · Collab Fund
(SM) Support Tip: How to simple test JGroups in Service Manager - Service Manager User Discussions - SMA-Service Manager Suite
Windows Incident Response: RegRipper Value Proposition
The Familiar Story of Stockholm Banco: Creating New Currency in 1661 — My Money Blog
The bank collapsed after only six years. During the cleanup, audits revealed tons of missing money. Palmstruch was sentenced first to execution (later reduced to jail), and died only a year after his eventual release.
Maryland Couple Indicted For Illegal Disclosure of American Health Information to Russia - Lawfare
How To Securely Transfer Files With SCP In Linux - OSTechNix
KDE Ltinerary: An Amazing Travel Assistant That Cares about Your Privacy
dbi Blog
A Retrospective Post-Quantum Policy Problem - Lawfare
Oracle Data Pump and Compression – Also Without a License – Databases Are Fun
GoDaddy Sucks - and Here's Why - FOSS Force
Installing Oracle Database 19c and All the Things to Put on Top – Databases Are Fun
Kubernetes CheatSheet – Devops Tutorials
Troubleshooting Kubernetes – Devops Tutorials
Ansible Tutorial Complete – Devops Tutorials
Terraform Tutorial – Devops Tutorials
Terraform best used for Infrastructure provisioning. Ansible best used for Application provisioning.
Kubernetes Security – Devops Tutorials
Patching all my environments with the October 2022 Bundle
Real World Experience, AI Reliable Screening for Abnormal in Chest X-Rays | Rady's Inspirations
Though this article provides the effectiveness of AI in, but there is more towards it, the role of a Radiology Workflow (RIS) and deconstructed PACS is very critical for results like these in real world scenario. Routing images from the Modality to a central Server Quickly decide which AI Model to be used (Dicom Tags / Clinical Data) Forward the studies to the Specific AI Gateway Wait for the results, once AI results received, Based on Diagnosis, draft a report and forward to a Radiologist.
Microsoft confirms Kerberos authentication issues after Nov. 2022 updates | Born's Tech and Windows World
7 Things I Wish Law School Taught About eDiscovery
1) That eDiscovery Exist 2) That eDiscovery Can Make or Break a Case 3) The Risks of Bumbling eDiscovery 4) Where to Find New Types of ESI 5) The eDiscovery Tools of the Trade 6) Strategic eDiscovery 7) Ethical Duty of Technical Competence
Disaster Planning: It’s Not Just for Hurricanes - Legal Talk Network
How to Upgrade from ESXi 7 to 8 – Al Rasheed – A personal Blog about IT related subjects.
Great Product Managers – Perspectives
Using KeyOxide · The Odd Bit
DIY USB Charging The Right Way | Hackaday
Exadata Database Machine Default Passwords – Talip Hakan Ozturk's ORACLE BLOG
How to Perform a Free Ubuntu Vulnerability Scan with OpenSCAP and Canonical’s Official OVAL Content | Alexander V. Leonov
The Art of Calculating the Cost of Risk
Illusive's Identity Threat Detection and Response (ITDR) Solution Protects Privileged Accounts
ITDR
Mark J. Wielaard » Blog Archive » Valgrind 3.20.0
11 Fun Linux Command-Line Programs You Should Try When Bored
Setting up a 'PXE Network Boot Server' for Multiple Linux Distribution Installations in RHEL/CentOS 7
Linux sdiff Command Tutorial for Beginners (8 Examples)
What is better then diff? sdiff. :)
How To Apply The 7 Zero Trust Pillars To Your Network (+ FREE Guide)
Pillar 1: All data sources and computing services are considered resources Pillar 2: All communication is secured regardless of network location Pillar 3: Access to individual enterprise resources is granted on a per-session basis Pillar 4: Access to resources is determined by dynamic policy Pillar 5: The enterprise monitors and measures the integrity and security posture of all owned and associated assets Pillar 6: All resource authentication and authorization are dynamic and strictly enforced before access is allowed Pillar 7: The enterprise collects as much information as possible about the current state of assets, network infrastructure, and communications and uses it to improve its security posture
Why it's time to review your Microsoft patch management options | CSO Online
Basic but Powerful – CISA’S Cybersecurity Performance Goals - Security Boulevard
6 Kubernetes Cost Control Strategies You Need in Place for 2023 - Security Boulevard
1. Workload cost allocation 2. Kubernetes cost optimization 3. Right-sizing advice 4. Kubernetes cost showback 5. Multi-cluster cost and usage 6. Cloud billing integration
Use Cloud Securely? What Does This Even Mean?! - Security Boulevard
REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis | eSecurityPlanet
12 Useful 'sed' Commands In Linux | LinuxTeck
joeware – never stop exploring… :) » Blog Archive » TLS 1.3 for LDAPS on Windows Server 2022
joeware – never stop exploring… :) » Blog Archive » Active Directory… 18 Years Old… But Do Your App Vendors and Developers Even Know How To Use It Properly?
The Securing Open Source Software Act Is Good, but Whatever Happened to Legal Liability? - Lawfare
Cybersecurity Regulation: It’s Not ‘Performance-Based’ If Outcomes Can’t Be Measured - Lawfare
Harvey Mudd College Learn SDR Course with RTL-SDR, PlutoSDR and GNU Radio on YouTube
Cybersecurity Certifications: To renew or not renew — that is the question | by Teri Radichel | Cloud Security | Medium
Teri Radichel
how to convert all text in text file to lower case | Jamal Ahmed's page
ggVGu
RP2040 firmware converts Raspberry Pi Pico into a an I2C to USB bridge - CNX Software
Chris's Wiki :: blog/linux/ZFSNoSnapshotOddError
NextCloud OCC on Kubernetes – ZenCoffee Blog – random notes, guides, and thoughts…
An In-Depth Getting Started Guide To Remote PowerShell
3 Tips for Flexible, Adaptive Incident Management | APMdigest - Application Performance Management
1. Where You Manage Incidents Matters 2. Never forget "Communication is key" 3. Treat incidents as opportunities
Simple PostgreSQL Backup Agent – UseIT | Roman Levchenko
My Struggles with Physical Wellness - Wahl Network
Continuity is Not Recovery | The Networking Nerd
Incentivizing High-Performing Cybersecurity Programs in the Banking Sector - Lawfare
Cyber Insurance and Cybersecurity Policy: An Interconnected History - Lawfare
Quantifying Cyber Conflict: Introducing the European Repository on Cyber Incidents - Lawfare
Chris's Wiki :: blog/sysadmin/SwapfileAndBackupsIssue
Introducing AWS Resource Explorer – Quickly Find Resources in Your AWS Account | AWS News Blog
Ansible: Collection | panticz.de
Getting Scans From 18.171.7.246 and 35.177.10.231? It's the UK Government - LowEndBox
Review of the GLiNet AX1800 Flint Router - Daniel Lautenbacher
vCenter 8 upgrade and vami_config_net » boche.net – VMware vEvangelist
IIS Crypto 3.3 released | Born's Tech and Windows World
However, this can be done conveniently via a GUI as shown above. Moreover, the tool allows you to rearrange the SSL/TLS cipher suites offered by IIS, change advanced settings, implement best practices with a single click, create custom templates and thus test websites.
IT tools to support Windows 10 version 22H2 | Born's Tech and Windows World
Security baseline for Windows 10, version 22H2 – download the Microsoft Security Compliance Toolkit the to access Microsoft recommended security configuration baselines. Windows 10 Enterprise Evaluation –a free 90-day evaluation of Windows 10, version 22H2 Administrative templates (.admx) for Windows 10, version 22H2 are natively accessible from the C:\Windows\PolicyDefinitions\ folder in Windows. These files and the Group Policy Settings Reference Table can also be downloaded from the Microsoft Download Center: ADMX for Windows 10, version 22H2 Group Policy settings reference spreadsheet for Windows 10, version 22H2 The Remote Server Administration Tools (RSAT) for Windows 10 are included in the operating system as a set of "Features on Demand". More tools are mentioned in the Techcommunity article as updated.
Is Your Organization "Well-being Washing"?
Good employers will find ways to improve the lives of their workers in ways that create a positive relationship and engagement. Bad employers will do the bare minimum. When they struggle with retention and attracting talent they will roll out programs and do what they need to do. At the first sign of an economic downturn or a looser labor market, they will forget all about that and do very little to take care of their employees.
What Security Professionals Need to Know About Data Privacy - Red Clover Advisors
This oversight resulted in new definitions for data security and data privacy. Here’s a highly simplified breakdown: Data security is concerned with securing data against bad actors, exposure, and threats. Data privacy is about how and why you’re collecting data, what you’re doing with it, who you're sharing it with, and how long you’re storing it. At its core, data privacy is about responsible data governance.
James Webb Space Telescope captures a spooky view of the Pillars of Creation | Engadget
Best Free and Open Source Alternatives to Microsoft Whiteboard - LinuxLinks
1. OpenBoard 2. Excalidraw
IBM upgrades Linux mainframe, boosting availability and AI performance | VentureBeat
vnStat - Monitor Network Bandwidth In Linux and BSD - OSTechNix
Tricking our brains into passing that Technical Certification - mwpreston dot net
Collectl: An Advanced Linux Performance Reporting Tool
Collectl
A quick look at S3 Object Lock - mwpreston dot net
Identify VMs that have VMware Tools with the OpenSSL v3 vulnerability - ivobeerens.nl
1 $vcserver = 'the FQDN of the vCenter Serbver name' 2 Connect-VIServer $vcserver 3 Get-VM | Where-Object {$_.Guest.ToolsVersion -ge '12.0.0'} | Select -property Name,PowerState,@{Name='Toolsversion';Expression={$_.Guest.Toolsversion}} | Sort Toolsversion 4 Disconnect-VIServer * -Confirm:$false
Endpoint Protection is Key When it Comes to Cyber Insurance - VMware Security Blog - VMware
ESXi-Targeting Ransomware: Tactics and Techniques (Part 2) - VMware Security Blog - VMware
Terraform and vSphere – Part 2: DSC – Adventures in a Virtual World
Cilium CNCF Graduation Application
How to Transcode FLAC Files With flac2all in Linux - Make Tech Easier
How to Install AWS CLI on Linux Step-by-Step
How to Install OpenProject on Ubuntu 22.04 - RoseHosting
Silent ORA-918 behavior change in RU 19.17.0 and newer
Patching News: RURs are gone - long live MRPs
Intel uses AutoUpgrade to upgrade from Oracle 11.2.0.4 to 19c
Why you simply can't upgrade from Oracle 11g or 12c to Oracle 23c
How to speed up datapatch - and much more information
Binary patching is slow because of the inventory
Three Choices for Data Mobility - Architecting IT
We see three options for maintaining data mobility, whether to optimise usage or to place data next to wherever compute will be run. Build an abstraction layer. In this instance, a distributed file system or object store provides access to data across many locations and with either eventual or strong consistency. Strong consistency is generally preferred but comes at the cost of additional complexity and performance challenges. Implement efficient migrations. Move entire data sets between physical storage resources using tools that can execute the copy process in the background and minimise downtime. Migration solutions can also be used to copy data, as long as strict controls on distribution are maintained. Move data tactically. Perform individual file migrations, leaving a pointer behind (stubs or links) to track the new physical location of the data.
Site Reliability Engineering (SRE) is the Force Multiplier of Digital Experiences | APMdigest - Application Performance Management
Enabling WiFi Fast Transition Between Access Points with OpenWRT - Patshead.com Blog
Why you can't stay on Oracle Database 11g forever
How to speed up your database and GI patching
Can I cleanup the previous Patch Bundles with opatch?
package-cleanup --oldkernels --count=1
How to get access to download older Oracle versions?
High severity vulnerabilities found in Harbor open-source artifact registry - Help Net Security
The Difference Between Su, Sudo Su, Sudo -i, and Sudo -s - TREND OCEANS
Ansible Register Variable - OSTechNix
GitHub - bartobri/no-more-secrets: A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
Fixing Battery Drain in Kwikset Locks – Scott Gruby's Blog
Learning VMware PowerCLI For The Absolute Beginner
5 Most Used Touch Commands in Linux With Examples | LinuxHostSupport
1. Create a File 2. Change only the access time 3. Use the timestamp of another file 4. Create a file with a specific timestamp 5. Creating Multiple files
How to Install Apache Guacamole as Docker Container on Ubuntu
Run Linux Servers Without Reboots Using Kernel Live Patching Tools - OSTechNix
Installing macOS 13 Ventura on Proxmox 7.2 – Nicholas Sherlock
Constellation: Open-source, runtime-encrypted Kubernetes - Help Net Security
Security+ Keep your cert up to date... for Free | UNCOMN
CISA releases RedEye open-source analytic tool - Help Net Security
Linked - Remote workers are feeling pressure to prove their productivity
Are your company's cybersecurity protocols doing more harm than good? | Employee Benefit News
Linked - Fired admin cripples former employer's network using old credentials
Dawani’s Law | Seth's Blog
“The number of people who say that Moore’s Law can’t continue doubles every 24 months.”
Linked - How Learning And Development Can Quell Quiet Quitting
Linked - More U.S. companies charging employees for job training if they quit
Cisco Full Interface Configuration Compliance Checking With Ansible | Greg Sowell Saves The World
HCL Domino and Security
Sysinternals released Zoomit 6.1 | Born's Tech and Windows World
Microsoft back ports brute force protection of administrator accounts for Windows | Born's Tech and Windows World
Windows 11 strengthens SMB traffic protection | Born's Tech and Windows World
The Best Answers to the Most Common Oracle on Azure Questions
AntiVirus for my Database Server? – Part 2 | Late Night Oracle Blog
Writing a zero findings pentest report – DiabloHorn
Firewall analysis: A portable graph based approach – DiabloHorn
Domain Controller Monitoring: Why, What, How? - The things that are better left unspoken
The Emerging Cyber Threat to the American Rail Industry - Lawfare
Customizing Taskbar and Start in Windows 11 22h2 with PowerShell - CCMEXEC.COM - Enterprise Mobility
Sustainability in IT - Architecting IT
Is the Public Cloud Becoming More Reliable? - Architecting IT
A WPF Countdown Timer • The Lonely Administrator
Update PowerShell To the Latest Version | PeteNetLive
Invoke-Expression "& { $(Invoke-Restmethod https://aka.ms/Install-PowerShell.ps1) } -UseMSI"
Terence Luk: Troubleshooting traffic blocked by Azure Front Door WAF Policy in Prevention mode
How to Find Duplicate Files Using PowerShell? | Windows OS Hub
How to Manage Windows File Shares Using PowerShell? | Windows OS Hub
Background incentives of build instead of buy - SysAdmin1138 Explains
It turns out these 1000 - 9999 engineer companies are where another dynamic emerges to push the decision needle towards build before it's a really great idea to do that: the speed of adding headcount versus the speed of paying a vendor. That's the nice thing about headcount: you can use it for more than what you initially bought it for, something a vendor solution rarely provides.
Hierarchy and the workplace - SysAdmin1138 Explains
Datastore with NFS4 slowness issue and Netapp\VMware findings. | Techbrainblog
MicroSD card speeds simplified: V30 A2 | Nelson's log
OpenWRT, Two GL.Inet Routers, and Tailscale: Successes and Failures - Patshead.com Blog
Give Your Tail a Nudge - Marc's Blog
FRnOG #36: Akvorado
Akvorado
Supporters Look to Make Oregon's Hospital Capacity Technology a National Tool | HealthLeaders Media
White House Sets Sights on New Healthcare Cybersecurity Standards
Battle with Bots Prompts Mass Purge of Amazon, Apple Employee Accounts on LinkedIn – Krebs on Security
Adopting FDA’s medical device cybersecurity draft to minimize security risks at healthcare organizations - Industrial Cyber
Elon Musk reportedly wants to lay off most of Twitter's employees | Engadget
Dutch court rules that being forced to keep a webcam on while working is illegal | Engadget
Hitting the Books: The women who made ENIAC more than a weapon
How Do I Pick a Guardian For My Children If I Die? - FindLaw
Networked DVD Ripping with Raspberry Pi and iSCSI :: apalrd's adventures
A simple solution for getting Automated Ripping Machine (ARM) to work in a Proxmox / LXC environment : homelab
USB Simplifies Branding but Reintroduces Active Cables - TidBITS
How to mount a Samba shared directory at boot - Linux Tutorials - Learn Linux Configuration
Five SAP application security trends
1 -- Detection of Anomalies within the SAP Log-Stack 2 -- SAP Threat Modeling 3 -- SAP Can’t Exist Without Compliance Management 4 -- Application Security-as-a-Service Models 5 -- Aggregated Vulnerability Information Will Become a Must-Have
Preventing USB Baiting |Baiting | EC-Council – Aware
White glove service | Seth's Blog
Windows 11 Inbox VMware drivers. | VMware
Locking down Azure AD, a closer look at the value proposition | House of Windows Blog
BRING YOUR OWN JOKE: Uber Has Many Openings in IT Security - LowEndBox
Bloodhound – AD Attack Resilience Methodology | House of Windows Blog
Chris's Wiki :: blog/solaris/ZFSZILSafeDirectWrites
Encrypting Sensitive Data for Transit or Rest with PowerShell
The OpenWRT Routers from GL.iNet Are Even Cooler Than I Thought! - Patshead.com Blog
Ventoy
How Much RAM Do You Need in 2022? - Patshead.com Blog
How to set Windows Date and Time formats to the internationally recognized ISO 8601 standard – jasoncoltrin.com
Doc Searls Weblog · Because We Still Have Net 1.0
The salon will open with an interview of yours truly by Dr. Angie Raymond, Program Director of Data Management and Information Governance at the Ostrom Workshop, and Associate Professor of Business Law and Ethics in the Kelley School of Business (among too much else to list here), and quickly move forward into a discussion. Our purpose is to introduce and talk about these ideas: That free customers are more valuable—to themselves, to businesses, and to the marketplace—than captive ones. That the Internet’s original promises of personal empowerment, peer-to-peer communication, free and open markets, and other utopian ideals, can actually happen without surveillance, algorithmic nudging, and capture by giants, all of which have all become norms in these early years of our digital world. That, since the admittedly utopian ambitions behind 1 and 2 require boiling oceans, it’s a good idea to try first proving them locally, in one community, guided by Ostrom’s principles for governing a commons. Which we are doing with a new project called the Byway.
Problems with Overprovisioning VMs - ESX Virtualization
“Overprovisioned/overprovisioning” has two meanings. The first and simplest is when a VM is given more resources than it should have. Too many vCPUs or too much RAM, generally speaking. On a host with few VMs and lots of capacity, overprovisioning a VM this way might not have a big impact, but on a host with many VMs, all in contention for its shared resources, overprovisioning can lead to serious performance problems across VMs. In either case, overprovisioning a VM is considered wasteful. The second meaning for overprovisioning is the concept of giving the VMs on a host collectively more resources than the host has. This is very common with vCPU, somewhat less common with datastore space, and less common still with RAM.
Stop Credential Stuffing Attacks with Cloudflare Bot Management | HumairAhmed.com
Threat Report: Illuminating Volume Shadow Deletion - VMware Security Blog - VMware
Three Categories of VSC Deletion Techniques Use of native Windows binaries (Living Off the Land binaries or LOLbins) Scripting which uses objects available in the language (WQL, PowerShell, VBS) COM object interactions
Emerging Trends Weekly-ish – September 22nd 2022 – Job Search Blues and the Beast Needs Skittles | This is Hyper-Disaggregated
Rust training for FOSS programmers
Estate Planning for the Single Parent - FindLaw
Easy Chocolate Crinkle Cookies Recipe -- Dairy Free, With Oil | Penniless Parenting
Steven Levitt's advice for making big life decisions — Quartz at Work
“The data from my experiment suggests we would all be better off if we did more quitting,” Levitt said in a press release. “A good rule of thumb in decision making is, whenever you cannot decide what you should do, choose the action that represents a change, rather than continuing the status quo.”
The Retire Early Home Page.
PXE boot netboot.xyz on a Mikrotik router · 🤠 Major Hayden
BMC Helix Achieves FedRAMP Certification | APMdigest - Application Performance Management
Automated Kubernetes Deployment with Ansible – Virtual Elephant
Automate a Daily Activity Log Audit Report for an Azure Subscription
Stealing From Product Design
1. Look for unmet needs 2. Push the prototype 3. Become a design ethnographer 4. Leverage cross-functional teams 5. Determine where to get feedback 6. Release a Minimum Awesome Product 7. Don’t separate the product from the experience
How to Create a AWS RDS Snapshot
Why Everyone’s talking about Hybrid Cloud Trust - The things that are better left unspoken
PowerShell – disk cleanup script | geekdudes
How to Build a Hybrid Cloud Storage Strategy - Architecting IT
How to Show Warning Message to SSH Unauthorized Users
How to Obtain, Share, and Display Medical Images as Evidence in Court
Create Jaw-Dropping Dashboards Using Grafana (on a Raspberry Pi!) - LowEndBox
Using PowerShell Remoting Over SSH | Windows OS Hub
New – Direct VPC Routing Between On-Premises Networks and AWS Outposts Rack | AWS News Blog
AWS S3 for VMware SDDC Backups – Virtual Elephant
Audit Events in Your Azure Subscription with PowerShell
Facebook Accounts As Memorials - Proactively and Reactively - krypted
The #1 rule | It's full of stars!
A Picture Is Worth a Thousand Words | by Ben Cotton | The Pragmatic Programmers | Medium
GPU or vGPU Passthrough with 16GB+ of video memory
Protect your backups with Wasabi Immutable Storage Buckets - ESX Virtualization
Histogram vs eCDF - Marc's Blog
Histograms are a rightfully popular way to present data like latency, throughput, object size, and so on. Histograms avoid some of the difficulties of picking a summary statistic, or group of statistics, which is hard to do right. I think, though, that there's nearly always a better choice than histograms: the empirical cumulative distribution function (eCDF).
Scrivano: Fascinating Whiteboard App For Handwritten Notes
Scrivano
Using a Raspberry Pi as a Bluetooth speaker with PipeWire
Meowfetch - A Customizable Linux System Information Tool
The ultimate guide to Kubernetes microservice deployments - Octopus Deploy
Should Uncle Sam Worry About ‘Foreign’ Open-Source Software? Geographic Known Unknowns and Open-Source Software Security - Lawfare
GitHub - d4rckh/vaf: Vaf is a cross-platform very advanced and fast web fuzzer written in nim
GitHub - google/tsunami-security-scanner: Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
GitHub - quay/clair: Vulnerability Static Analysis for Containers
GitHub - aquasecurity/trivy: Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues and hard-coded secrets
vSphere 8 DR and ransomware recovery possibilities - ESX Virtualization
Best Practices: How to Design a Database - ServerWatch
1. Determine your database goals 2. Keep it simple 3. Choose the right database type 4. Build transparent structures 5. Security by design 6. Keep compliance primary 7. Breakdown silos 8. Documentation is key 9. Optimize for speed 10. Use a separate server
Top Challenges for Today's Network Engineers - RouterFreak
A Lawfare Hacking and Cybersecurity Course - Lawfare
Passings: Peter Eckersley, a Founder of Let's Encrypt, Dies at 43 - FOSS Force
You Can Now License Windows Server on a Per-Virtual-Core Basis - LowEndBox
Designing my life, part one: Building a compass
Lead PlayStation architect Masayasu Ito is retiring after 36 years | Engadget
Sonatype Nexus IQ in Azure DevOps - Illegal Reflective Access Operation
Windows Server 2022 Second Domain Controller Install
Merriam-Webster just yeeted a bunch of internet slang into the dictionary
Speed up Ansible SSH with Multiplexing | Lisenet.com :: Linux | Security | Networking
How to Download View-Only Teams Meeting Recording Video from SharePoint | Lisenet.com :: Linux | Security | Networking
How To Manage Windows Server - Thomas Maurer
Azure Arc Windows Admin Center System Center Windows Server on Azure
Learn Everything About PowerShell Start-Transcript
Money Magic: 5 Levers To Boost Your Safe Retirement Income By $50k+ a Year — My Money Blog
An open letter to a fresh cybersecurity hire | LinkedIn
1. Never say "that isn't my job". 2. Make friends throughout the company. 3. Ask for forgiveness a lot. 4. Live in a big world. 5. Be humble 6. Question everything. 7. It isn't China. 8. Never hoard. 9. Treat people as you want them to be. 10. Finally, just be nice.
Balsamic Green Beans and Tofu Recipe -- Gluten Free, Vegan, Allergy Friendly | Penniless Parenting
Scrumptious Restaurant Style Potato Wedges Recipe | Penniless Parenting
Chris's Wiki :: blog/linux/SystemdFastTimersEarlyNotes
How to Use the Internet Securely: A Guide for Seniors | Cyber.gov.au
How to Get Started With Software-Defined Radio on Linux
DIY Windows Provisioning – a Solution Example
ffmpeg and hevc_qsv Intel Quick Sync settings | Nelson's log
Use Arc Forum Or Anarki To Make Your Own Hacker News! - LowEndBox
The Ransomware Task Force’s advice needs work @ AskWoody
Susan Bradley By Susan Bradley A few weeks ago, the Ransomware Task Force (RTF) released the Blueprint for Ransomware Defense. The RTF was created by the Institute for Security and Technology (IST) in April 2021 in response to the emerging national and economic security risk posed by ransomware. Unfortunately, I find the advice and information contained in the Blueprint centered too much on large enterprises and not enough on the broader audience it was supposedly targeting. Unquestionably, outages and stolen data for large enterprises can have a huge effect on large groups of people, but the Small Business Administration points out that there are 32 million small businesses — and we all can agree they have fewer resources to fend off attacks. From my perspective, something very big is missing: detection.
Configure SysInternals EULA Acceptance • The Lonely Administrator
#set global EULA acceptance for SysInternals tools [CmdletBinding(SupportsShouldProcess)] Param([switch]$Passthru) $regPath = "HKCU:\Software\Sysinternals" Set-ItemProperty -Path $regPath -Name "EulaAccepted" -Value 1 -Force if ($Passthru) { Get-ItemProperty -Path $regPath -Name EulaAccepted }
NFSv3 datastore is much faster than NFSv4 | Techbrainblog
More On Installing And Configuring Certbun For Use With Apache - LowEndBox
Will Microsoft provide ESU support for Windows 7/8.1 and Server beyond January 2023? | Born's Tech and Windows World
Configure PowerShell Remoting (WinRM) for Non-Domain (Workgroup) Computers | Windows OS Hub
Extending the Zero Trust Architecture Concept to APIs - VMware Security Blog - VMware
Happy 10th Anniversary, Amazon S3 Glacier – A Decade of Cold Storage in the Cloud | AWS News Blog
Preemption of State Cybersecurity Laws: It’s Complicated - Lawfare
Fewer Ransomware Victims Pay, as Median Ransom Falls in Q2 2022
How Small or Big is Off-Premises/Public Cloud, According to Gartner — EtherealMind
How Big is Cloud If you take Gartner’s numbers, what’s the percentage of global total IT spend is off-premises/public cloud : 500 Billion / 4400 Billion = 11.3% (best case)
Make Sure You Juggle The Right Way in IT | The Networking Nerd
The Tyranny of Technical Debt, Numerically | The Networking Nerd
Practice Until You Can’t Get It Wrong | The Networking Nerd
Twitter whistleblower to testify about company's 'widespread security failures' at Senate hearing | Engadget
Designing your life
How to Live on 24 Hours a Day: Published 100+ Years Ago, Still Practical Advice Today — My Money Blog
Windows Event Logs for Red Teams - Black Hills Information Security
What is Zero Trust? - VMware Security Blog - VMware
Security update for HPE Integrated Lights-Out (iLO) | Born's Tech and Windows World
Install Oh My Zsh on Ubuntu for a Next Level Command Line
Using A Comic Book Style For Learning
Raspberry Pi 3+ and Joy-IT 7" touchscreen on Debian 11 - Rule of Tech
A week of playing with Wilco (trywilco.com) #trywilco – Michael Ellerbeck
Getting Started With GitBook: How to Add Content Blocks
Hitting the Books: How can privacy survive in a world that never forgets? | Engadget
You understand that by providing any sample, having your Genetic Information processed, accessing your Genetic Information, or providing Self-Reported Information, you acquire no rights in any research or commercial products that may be developed by 23andMe or its collaborating partners. You specifically understand that you will not receive compensation for any research or commercial products that include or result from your Genetic Information or Self-Reported Information.
Introduction - Nuclei - Community Powered Vulnerability Scanner
Code Dark: Children’s Hospital Strives to Minimize Impact of Hacks - WSJ
Chris's Wiki :: blog/linux/Ubuntu2204InstallerScrubDisks
How Organizations are Evolving to Support Remote Work (Forever!) | APMdigest - Application Performance Management
Dictionary : Face Mute — EtherealMind
Useful SSH Cheat Sheet for Linux System Administrators
$ [Enter], ~, .
Authority and Responsibility | The Networking Nerd
Authority is “power to influence or command thought, opinion, or behavior”. It means you have the ability to tell people what to do. Responsibility is “the quality of being responsible,” where responsible means “liable to be called on to answer”. Responsibility is being the one to discuss what happens with the people under your charge.
How to manage the intersection of Java, security and DevOps at a low complexity cost - Help Net Security
Saying “Yes” the Right Way | The Networking Nerd
New Linux Exploit 'Dirty Cred' Revealed at Black Hat | eSecurityPlanet
Guide to Retirement | J.P. Morgan Asset Management
The Biggest Benefits of Cloud Migration for Businesses – Business
Speed Cost Reduction Scalability Innovation Stability
The 3 Most Important Cloud Computing Success Factors – Business
#1 Flexibility In evaluationg your system, ask: Does it enable your employees to work flexibly? Can they access the service from anywhere in the world, anytime? Or must they work only during certain times of the day? #2 Reliability Uptime with any cloud computing solution should be within 99.9% or higher to be worth the paper it’s printed on. Remember, even 99% is almost four days of downtime a year. When you put it like that, even 99.9% is too low #3 Cost Efficiency Cloud computing became a hit when small businesses could use the same caliber of computing infrastructure as the large enterprises without the cost of running it all themselves. There was no maintenance, no electricity costs, and no expensive kit sitting in a room gathering dust. So if your cloud computing solutions are costing you the earth, you’re doing it wrong! Cost is arguably the most essential factor in this process. The pandemic rushed many people into purchasing cloud solutions that maybe weren’t the right fit for them. Now that we’re out of the worst of the pandemic, the time has come to reassess your options. It’s time to ensure your cloud computing solutions provide for you, not the other way around.
Chris's Wiki :: blog/web/GrafanaReverseProxyAndURLs
Chris's Wiki :: blog/sysadmin/JqFormattingTextNotes
Car safety: Kia Challenge and Hyundai Key found on the web | Born's Tech and Windows World
Backup vendor guarantees - are they worth anything? - Architecting IT
Five Benefits of a NetApp Hybrid Cloud Storage Strategy - Architecting IT
NetApp offers cloud storage across all major public cloud providers, including FSx for NetApp ONTAP, a cloud-native storage solution on Amazon Web Services. In our discussion we examined five areas. Technology – a look at how NetApp implements storage in the public cloud, including CVO and CVS. Supply Chain Mitigation – how a hybrid strategy can smooth the ups and downs of supply chain challenges. Business Alignment – aligning storage with the needs of the business, including production and developers. Financial – controlling costs and managing operational expenditure with hybrid storage. Innovation – using a hybrid model to drive innovation within the business.
ESXi 7.x and beyond , SD cards & system storage layout | eknori.de
ChinaTalk: CHIPS Act + The Future of Microelectronics - Lawfare
Efficient Immutable Snapshots - Architecting IT
How to Encrypt and Decrypt a Partition in Linux
Incrementals Forever or Synthetic Fulls? - Architecting IT
A Decade of Ever-Increasing Provisioned IOPS for Amazon EBS | AWS News Blog
Grub, recordfail, 30 seconds | Nelson's log
New Ubuntu 22.04 homelab server notes | Nelson's log
MailChimp Security Breach. Yes, Again. - LowEndBox
Windows: "Service host: Local system" runs with high CPU/disk load after boot since update | Born's Tech and Windows World
vCenter Server Is Your Heart And Soul. Learn To Backup & Restore
Vulnerability management metrics - The Silicon Underground
How to read a Qualys scan report - The Silicon Underground
Organizing Chaos with PSWorkItems and PowerShell • The Lonely Administrator
Keeping Your Law Firm Safe in the Cloud: Internal Factors | CosmoLex
Five Great Reads on Cyber, Data, and Legal Discovery for July 2022
Networking for Lawyers Made Simple
OP-ED: Cybersecurity training is key to cybersecurity resiliency - Marine Log
creating live draw.io diagrams with grafana and FlowCharting – Michael Ellerbeck
Minimal Container Images: Towards a More Secure Future
Kubernetes 101 - Blog | luminousmen
Installing Docker, and Docker-Compose, in WSL2/Ubuntu on Windows – Michael Ellerbeck
Linked: Why Repeating Yourself Is a Good Thing
ong ago, I learned the basics of doing a presentation, and one of the most important things was to tell people things three times. Start by telling people what you’re going to explain to them, explain it to them, and then tell them what you just explained to them. When you put it that way, that seems repetitive, doesn’t it? It’s not. Most of the time, it takes three times for it to sink in.
Researchers reveal Kubernetes security holes, prevention
Back Up Encrypted ZFS Data Without Decrypting It, Even If TrueNAS Doesn’t Approve | Hackaday
Portable Computer Pre-History: Portable Before Laptops
Chris's Wiki :: blog/sysadmin/OurServerAges2022
Managing Microsoft Teams with PowerShell | Windows OS Hub
Introduction to Red Hat OpenShift Container Platform | Jan Egil Ring powershell.no
Power BI guidance documentation | James Serra's Blog
I, The Braggart – A Network Fable | Ethan Banks
Configure SSL Connection Encryption in MS SQL Server | Windows OS Hub
ESP32 board with rotary encoder gets 2-key keypad shield - CNX Software
What Is Virtual Memory on Linux? How to Manage It
How to Use Sar (System Activity Reporter) | Linux Journal
Hitting the Books: What goes on at a summer camp for YouTube Gaming kidfluencers | Engadget
Medical Debt Will Be Surgically Removed from Your Credit Score | The Motley Fool
Research Paper: Securing Linux Containers · 🤠 Major Hayden
SunFounder TS7-Pro Touch Screen Review: Building a Portable RTL-SDR Pi 4 System
WiFi Grid RTL-SDR Radio Telescopes featured in SARA2022 Conference Talks
WARNING: PikaPods are Addictive! - LowEndBox
Randomizator Sunflower-CISSP.com
How to Get a Part 107 License - Jeremy Morgan's Tech Blog
‘Ring Nation’ is what happens when America's Funniest Home Videos meets Black Mirror | Engadget
Greenfields are a Myth - Wahl Network
New – AWS Private 5G – Build Your Own Private Mobile Network | AWS News Blog
Welcome to AWS Storage Day 2022 | AWS News Blog
How I Migrated from MediaWiki to Notion :: packetmischief.ca
SSH from RHEL 9 to RHEL 5 or RHEL 6 | Richard WM Jones
Vdbench | Electric Monk
VMware Explore 2022 US - The Security Mindset: Changing the Way You Think About Enterprise Security - VMware Security Blog - VMware
We will delve into: How changing the way you think about security can drastically change your own personal career journey Examples and perspectives from people who have successfully transitioned to security from typical IT roles or other non-standard paths A Day in the Life of a Cross-Functional Security War Room – where you’ll take a front row seat as a fictional company gets breached, and how a cross-functional infrastructure team pulls together to break down the anatomy of the attack in a search to analyze the impact and determine root cause.
The 10 Sessions at VMware Explore 2022 You Can’t Miss - VMware Security Blog - VMware
Extending Server Lifespans With Fungible DPU | This is Hyper-Disaggregated
So these are all big issues on their own, but when combined, require organizations to modernize their infrastructure in order to keep up with the demands of modern applications and services. Couple this with supply chain challenges, and many organizations are searching for how they can increase the lifespan of their currently deployed server systems. Exactly to this point, Microsoft announced that they were increasing their server life cycle from 4 to 6 years for their cloud infrastructure. The move is expected to save Microsoft 3.7 Billion USD. Google announced they would increase their server lifecycle from 3 to 4 years, and Amazon Web Services stated that they would increase their own server infrastructure to 5 years. So we see the big 3 public cloud providers making big shifts to increase server lifespans, resulting in huge savings to their bottom line.
SonarQube – Stuff I'm Up To
Code quality and code security https://www.sonarqube.org I found this very useful in scanning my code and pointing out some basic quality and security improvements I could make. It helps you learn best practices and teaches you what not to do.
Removing ANSI Colours from Log Output – Stuff I'm Up To
docker-compose logs --no-color keycloak | sed -r "s/\x1B\[([0-9]{1,2}(;[0-9]{1,2})?)?[m|K]//g" > output.log
Reboot issue MCE error on Dell PowerEdge R6525 running ESXi 7.0 Update 3c | Techbrainblog
Display auditd messages with journalctl · 🤠 Major Hayden
sudo journalctl -af _TRANSPORT=audit
Ubuntu, ffmpeg, and Intel GPU acceleration | Nelson's log
UEFI, ESP, secure boot, and GRUB | Nelson's log
Takeaways from The Obesity Code · 🤠 Major Hayden
Secure Tailscale networks with firewalld · 🤠 Major Hayden
Time Warner Road Runner, Linux, and large IPv6 subnets · 🤠 Major Hayden
Cybersecurity Becomes a Semiconductor Selling Point | The Motley Fool
Persuasion engineering · 🤠 Major Hayden
Rootless container management with docker-compose and podman · 🤠 Major Hayden
Free resources for the stock market · 🤠 Major Hayden
Options trading introduction · 🤠 Major Hayden
The Dark Side: Selling Options · 🤠 Major Hayden
The Wheel # The strategy shown here is called the wheel strategy. It involves these steps: Sell puts and collect premium If unassigned, go back to step 1 If assigned, sell calls and collect premium If unassigned, go back to step 3 If assigned, go back to step 1
Defending losing options trades · 🤠 Major Hayden
Lessons learned from selling puts · 🤠 Major Hayden
Choosing options to sell · 🤠 Major Hayden
Monitor a UPS with a Raspberry Pi Zero W · 🤠 Major Hayden
Selling options made simpler · 🤠 Major Hayden
Chasing Your Tail With a Raspberry Pi - Black Hat USA 2022 | Briefings Schedule
GitHub - the-markup/vehicle-data-collection: This contains the data for our story "Who Is Collecting Data from Your Car?".
Maxing Out the 401k Company Match: How Many Actually Do It? — My Money Blog
The man who built his own ISP to avoid huge fees is expanding his service | Engadget
AT&T is using amphibious vehicles, drones and more to restore its network during disasters | Engadget
Setting up ARM manually (Ubuntu) · automatic-ripping-machine/automatic-ripping-machine Wiki · GitHub
Build community engagement by serving up Lean Coffee | Opensource.com
It’s never a DNS issue right?
Hitting the Books: How much that insurance monitoring discount might really be costing you | Engadget
While the motives for surveillance vary, digital technology supports all of them. One need not even buy telematics insurance. Modern cars have built-in internet connections, and — without it being made transparent inthe owner’s manual — most send their car manufacturer all the data they can collect every couple of minutes, including where the driver currently is, whether harsh braking occurred, how often the position of the driver seat was changed, which gas or battery-charging stations were visited, and how many CDs and DVDs were inserted. Moreover, as soon as you plug in your smartphone, the car may copy your personal information, including contacts’ addresses, emails, text messages, and even photos. Car manufacturers are remarkably silent about this activity, and when asked with whom they share this data, they typically do not reply. That information helps to find out many other things of interest, such as how often drivers visited McDonald’s, how healthily they live, and whom they occasionally visit at night. Connected cars can support justice and improve safety but also spy on you. Telematics insurance embodies the double face of digital technology: surveillance in exchange for convenience.
Track your nutrition with this amazing free Android app: Energize
Cyberespionage Group Targeting M&A, Corporate Transactions Personnel | SecurityWeek.Com
"For their long-haul remote access, UNC3524 opted to deploy QUIETEXIT on opaque network appliances within the victim environment; think backdoors on SAN arrays, load balancers, and wireless access point controllers. These kinds of devices don’t support antivirus or endpoint detection and response tools (EDRs), subsequently leaving the underlying operating systems to vendors to manage," Mandiant added.
Ansible Default Forks = 5
Network Admin Stuff: Cisco Is Easy - Main
Jinja2 HTML Templates For Reporting With Ansible Automation Platform The Easy Way | Greg Sowell Saves The World
Config As Code With The Ansible Automation Platform Controller | Greg Sowell Saves The World
Demystifying a (mysterious) Philips OQ0702P Double Balanced Mixer – Matt's Tech Pages
Attackers Use Event Logs to Hide Malware | Threatpost
Chris's Wiki :: blog/unix/HostLookupHistory
Estimating indoor CO2 levels using tinyML and computer vision | Arduino Blog
The transition to IPv6: Are we there yet? | APNIC Blog
Developing your Security Program: Part 2 — Developing your Security Program | by CPF Coaching | Jul, 2022 | Medium
Stage 1 — Strategic Framework Stage 2 — Current State Analysis Stage 3 — Future State Vision Stage 4 — Strategic Roadmap Stage 5 — Mobilization Stage 6 — Implementation
Developing your Security Program: Part 1 — Meeting the Stakeholders | by CPF Coaching | Medium
Let’s start with dissecting a potential approach the CISO can use. Understanding the key stakeholders (people), the processes that drive and support the organization, and the technology needed to deliver that mission. Understanding the key stakeholders goes beyond just those responsible for the security program; it also includes those that a CISO will support to ensure that she can help enable the business mission. In collaborating with those stakeholders, she will understand the parts of the business mission they support, the current pain points each might have, and the critical technologies that unlay those processes that serve that group. Each group will potentially have risk tolerances and threats, which might be separate from the organization’s approach. Combining this information should give you a business unit’s view of the organization. Understanding the approach from the bottom up and then the top down will be next.
Securing Containers With Zero-Trust Tools - Container Journal
Zero-trust network access (ZTNA) is considered a basic building block of a zero-trust architecture. In the context of containers, ZTNA is a way to control and enforce secure access within and between container networks. Organizations can use a zero-trust security model to ensure secure communication between containers and microservices. In a containerized environment, the zero-trust model has several key principles: There is no implicit, mutual trust between containers. Instead, mandatory authentication is required to prevent cyberattackers from laterally moving from an infected container to another. Attackers should not be able to discover or easily connect to other containers in a cluster or network. Code and infrastructure are hosted with local server certificates. Logs provide a record to help troubleshoot when a network security incident occurs. Identity and access management (IAM) and other security policies identify users and service accounts and implement time-based, context-based and role-based controls to prevent intrusion by internal and external attackers. ZTNA allows organizations to enforce secure communication between containers and microservices with flexible, centralized security policies that are not dependent on the container environment itself. SASE allows organizations to embed security measures into the network fabric itself, ensuring that wherever containers run, they are inherently secure when they connect to the network.
How do you add comments on UFW firewall rule? - nixCraft
EncroPi - A Raspberry Pi RP2040 USB key to read, encrypt & store data (Crowdfunding) - CNX Software
Install Malcolm Network Traffic Analysis Tool on Ubuntu 22.04 - kifarunix.com
How a WAF Could Improve the Security of Your Linux Web Applications
DDoS Attacks SQL Injection Attacks Cross-Site Scripting (XSS) Attacks Cookie Poisoning
Difference between Containerization and Orchestration: A Layman's Outlook
Containerization Containerization is the isolation of applications for deployment inside individual OS based environments inside virtual machines or physical servers, also referred to as nodes in general. An example of such a containerization tool is Docker. Orchestration Orchestration is the method of synchronizing multiple containers running on multiple nodes and also the nodes themselves. These nodes can be virtual machines or physical servers. An example of such an orchestration tool is Kubernetes.
Linux Botnet Targets Weak SSH Server Credentials | Decipher
US DoD funds Google and SkyWater to enable open-source chips • The Register
The Fathers of Kubernetes: Where Are They Now? - Container Journal
Joe Beda Brendan Burns Craig McLuckie Kelsey Hightower James Governor Brian Behlendorf The Future of K8s and Cloud-Native Kubernetes has become an essential utility for enterprise software development—undoubtedly, it’s one of the best ways to manage large container clusters at scale.
Solene'% : Solving a bad ARP behavior on a Linux router
There is simple solution, but it was very complicated to find as it's not obvious.
Books You Should Read: The Hardware Hacker’s Handbook | Hackaday
The new normal for IT starts with open source
Globally we saw nearly every industry go to 100% remote working overnight. Regardless of industry and size, organizations learned to operate virtually and on-demand. Companies needed to deliver goods and services to customers without a set brick-and-mortar footprint. We saw new tech hubs emerge in unlikely places because workers we no longer bound by needing to be based in specific cities. Newly-remote workers realized that they didn’t have to be tied to a physical office, and organizations focused on hiring new talent based on skill and not location. These are not insignificant achievements, and while this way of working was unfamiliar to those who were forced to adapt during the pandemic, to the open source world, it was just another day.
Oracle's Java Losing Out To Amazon's
Notabase is your open-source reliable personal knowledge base
How to Keep SSH Terminal Session Alive in Linux - TREND OCEANS
Secure Boot Disabled? GNOME Will Soon Warn You About it! - It's FOSS News
Using hosted image builder via its API
How OpenSSF Scorecards can help to evaluate open-source software risks | CSO Online
Migration to Containers, Microservices and Kubernetes - Container Journal
Thwarting Ransomware Attacks in Kubernetes Environments - Container Journal
Seeing the Dots, Connecting the Dots: How Government Can Unify Cybersecurity Efforts - Lawfare
The Subversive Trilemma in Cyber Conflict and Beyond - Lawfare
Doc Searls Weblog · The Empire Strikes On
In between the Internet user and the advertiser, the Journal identified more than 100 middlemen—tracking companies, data brokers and advertising networks—competing to meet the growing demand for data on individual behavior and interests.The data on Ms. Hayes-Beaty’s film-watching habits, for instance, is being offered to advertisers on BlueKai Inc., one of the new data exchanges. “It is a sea change in the way the industry works,” says Omar Tawakol, CEO of BlueKai. “Advertisers want to buy access to people, not Web pages.” The Journal examined the 50 most popular U.S. websites, which account for about 40% of the Web pages viewed by Americans. (The Journal also tested its own site, WSJ.com.) It then analyzed the tracking files and programs these sites downloaded onto a test computer. As a group, the top 50 sites placed 3,180 tracking files in total on the Journal’s test computer. Nearly a third of these were innocuous, deployed to remember the password to a favorite site or tally most-popular articles. But over two-thirds—2,224—were installed by 131 companies, many of which are in the business of tracking Web users to create rich databases of consumer profiles that can be sold.
System Administrator Job Description | ServerWatch
How to Protect Your Linux System Against Log4Shell | Unixmen
Transforming into next generation businesses: lessons from APAC service providers
The metrics can be broadly separated into two categories: Internal capabilities: domains that are fully determined by the service provider, for example, its 5G roll-out, implementation of telco cloud, changes in organization and operations, etc. External capabilities: domains that are influenced by how service provider engage partners and customers, for example, new services in the edge computing and private networks space.
4 tips to help retain IT talent | The Enterprisers Project
1. Prioritize communication 2. Build trust through DevOps culture 3. Practice servant leadership 4. Mentor
Two useful ways to easily run a single test using Jest
The Other Road Ahead
Brooks in Reverse
SaaS removed the dependency hell companies often found themselves in – old versions that customers refused to upgrade from that still needed to be maintained (often with backward compatibility). The downside, he said, was that you still needed to manage servers and infrastructure. Many of those concerns are no longer true. Hosting a static site on a cloud CDN requires nearly zero ops. Edge functions don't require a site reliability engineer to ensure the hardware and runtimes are up-to-date. Further down the stack, managed services don't require developers to keep an eye on them (well, not all the time). Observability tools allow engineers to be quickly reactive to problems – and sometimes even proactively prevent full outages. Web applications evolved to do more than solve the multiple versioning issues – new strategies emerged like A/B testing and rolling deployments.
SwissArmyPi Converts your Raspberry Pi into a Strong Hacking Tool
Docker and the OCI container ecosystem [LWN.net]
The Chief Information Security Officer (CISO) Workshop - Security documentation | Microsoft Docs
The power of non-monetary investments
The Morning After: Uber receipts are crashing Microsoft Outlook | Engadget
New Active Directory Integration features in Ubuntu 22.04 (part 2) – Group Policy Objects | Ubuntu
Hitting the Books: How Moderna dialed-in its vaccine to fight COVID's variants | Engadget
Understanding Linux Containers Before Changing the World | HackerNoon
Why use Linux containers? Let's look at some reasons why you should use Linux containers: Resource management: They are more effective at managing resources than hypervisors are. Pipeline Management: LXC keeps the consistency of the code pipeline as it progresses from development to testing and production, despite the differences between these environments. Modularity: Applications can be split into modules rather than being housed in a single container as a whole. We refer to this as the microservices strategy. Management is now easier thanks to this, and several tools are available to handle management for complex use cases. The landscape of tooling: Despite not being technically particular to containers, the ecosystem of orchestration, management, and debugging tools coexists well with containers. Kubernete, Sematext cloud, and Cloudify are a few examples. They support continuous deployment and integration. Because of how they operate, you can effectively deploy your applications in various environments. It prevents redundancy in your codes and deployments. Application Isolation: Without the need to restart the system or start the OS from scratch, containers package your apps with all the necessary dependencies. These apps can be set up in various environments, and updating them only requires changing the container image. A container image is a file that contains the code and configuration needed to create a container. Linux Container is open-source. It provides a user-friendly, intuitive user experience through its various tools, languages, templates, and libraries. For these reasons, Linux containers are great for development and production environments. Even Docker's earlier versions were built right on top of it. You can find the source code here.
How to check if Ansible collection is installed or not - nixCraft
3 reasons autonomy is more important than flexibility | The Enterprisers Project
3 benefits of an autonomous workstyle 1. Increased productivity 2. Better work/life balance 3. A feeling of empowerment and trust
Attack on German companies through NPM packages - LinuxStoney
A new portion of malicious NPM packages created for targeted attacks on the German companies Bertelsmann, Bosch, Stihl and DB Schenker have been uncovered. The attack uses the dependency mixing method, which manipulates the intersection of dependency names in public and internal repositories.
Modernizing AWK, a 45-year old language, by adding CSV support
An Ansible playbook for solving a new problem from scratch | Enable Sysadmin
IT hiring: Tackling the cybersecurity skills shortage | The Enterprisers Project
1. Look for soft skills 2. Remember that work is not a physical place 3. Focus on culture fit 4. Recruit strategically and broadly
Best Free and Open Source Alternatives to Atlassian Bamboo - LinuxLinks
1. Jenkins 2. Tekton 3. GoCD
Why You Can No Longer Buy Kindle Books via Amazon's Android App
Unattended Debian installation | LibreByte
Using the ping command to help determine the correct MTU setting for your network
How to check supported MTU value for destination system and/or intermediate network ? - Red Hat Customer Portal
Highly Effective Azure Monitoring with Azure Log Analytics
The Ins-and-Outs of PSReadline in PowerShell
It’s Happy Sysadmin Day! @ AskWoody
Motherboard plastic standoff removal tool - The Silicon Underground
To make your own motherboard plastic standoff removal tool, you need a Bic ballpoint pen. Yes, in this case the brand matters. For whatever reason they use a two-piece design for the part that holds the ink. Pull out the part that writes, while leaving the second piece that indicates what color the pen is in the tube. You will find the resulting opening is the perfect size to push down onto a motherboard standoff. Depending on the design of the standoff, it will either push the standoff all the way through, or at least hold the standoff in a position that makes it easy to pull from the other side with your other hand. I picked up this trick sometime in the early ’90s. I don’t remember if it’s something I discovered myself accidentally, or if it’s something that someone told me. But if you ever find the seemingly useless remains of a Bic pen in a toolbox with other parts useful for fixing computers, this would be why. Someone was using it to remove motherboard stand
How To Resolve .Net Framework 3.5 Installation Error 0x80D05001 | The Automation Blog
7 Reasons Why Childcare Apps Are Dangerous for Your Security
1. No Two-Factor Authentication 2. Security Vulnerabilities Unpatched 3. A Lack of Information for Data Privacy 4. Privacy-Compromising Features 5. Cloud Security 6. A Lack of Security Policies for Parents and Admins 7. A Lack of Concern
The History of Kali Linux [Penetration Testing] Distribution
Amazon Prime Day 2022 – AWS for the Win! | AWS News Blog
How We Sent an AWS Snowcone into Orbit | AWS News Blog
VM Appliance Monitoring and Inventory Dashboard updated | VMignite.com
Getting Performance Ready for Digital Transformation | APMdigest - Application Performance Management
4 Step Process to Set Up Performance Testing Performance testing can be executed through the below-mentioned steps: ■ Plan- Performance objectives, identify tools for testing, and create the test environment. ■ Design- Define workload, prepare test scripts and data, dry operation, and fix bugs. ■ Execute- Function according to test scripts, monitor, and gather results of the test. ■ Analyze- Locate the performance bottlenecks and loopholes, quantify improvements and generate reports.
Own a Network of Data Centers for Less than $150! - LowEndBox
LAPSUS$ exposes security vulnerabilities at tech companies | Born's Tech and Windows World
Chris's Wiki :: blog/solaris/ZFSIndividualVsAggregatedIOs
Chris's Wiki :: blog/linux/ZFSOnLinuxGettingPoolIostats
SysAdmin Day: The cloud, security and backup risks | Born's Tech and Windows World
Sundaram Lakshmanan, CTO for SASE solutions at Lookout, has two components to look for in cloud security: risk awareness and content awareness. Enterprises, or IT leaders, need to understand a few key concepts when considering cloud platforms: Risk awareness. You have to be aware of the risk level of your endpoints and users. Content awareness. This is the consideration of the sensitivity level of the data someone is trying to access. Risk-based access mitigates the threats posed by users and endpoints. However, to ensure that access decisions are made efficiently, one should also look at the data itself. Detailed actions. Understanding the data must also extend to granular policy enforcement to ensure productivity is not compromised. Zero-trust access decisions should not be based merely on binary numbers. Detailed measures such as watermarking, keyword highlighting, and restricting downloads are critical to ensure that any risk is avoided and data is protected at all times. Proactive encryption. Data protection must also extend beyond the personal sphere of influence. One should consider proactive encryption technologies that take into account the sensitivity of the data to ensure that the most sensitive data can only be viewed by authorized users, even if it is shared offline.
Back Up Encrypted ZFS Data without Unlocking It · mtlynch.io
Do You Need to Buy The Fastest NVMe? - Patshead.com Blog
I am Using Tailscale SSH and Maybe You Should Too! - Patshead.com Blog
Is lvmcache Effective on a Desktop or Workstation? - Patshead.com Blog
You Might Need A Macro Pad: The JC Pro Macro 2 Mechanical Keypad - Patshead.com Blog
Zram with lz4 compression in kernel
Jive Search is your private self-hosted search engine
When Your Smart ID Card Reader Comes With Malware – Krebs on Security
The very weird Hewlett Packard FreeDOS option – Interesting things
Response is an open-source responsiveness testing tool
How to create a Digitalocean Managed Database cluster using terraform
Kansas MSP shuts down cloud services to fend off cyberattack
According to an email sent to MyAppsAnywhere customers shared on Reddit, the company detected signs of a cyberattack on Tuesday morning and quickly shut down cloud services to prevent the attack's spread.
Zinc is a next generation search engine written in Go
Top 5 Best Open Source Passive OS Fingerprinting Tools in 2022
1. PRADS (Passive Real-time Asset Detection System) 2. Ettercap: Man in The Middle Network Security Tool 3. p0f: Scalable Passive OS Fingerprinter Tool 4. PacketFence: Passive OS Fingerprinting Tool 5. NetworkMiner: Web Crime Analysis Tool Most of the fingerprinting and network monitoring tools work perfectly on both LAN and wireless connections. You can run them on the application layer on the network and can connect on the DHCP connection. They also support SSH, FTP, HTTP, and other protocols. Monitoring some other systems or hacking the networking devices requires deep knowledge of hacking and networking. In the entire post, we have seen the 5 most used open-source passive OS fingerprinting tools.
How To Protect Your Backpack From Slash Attacks - foXnoMad
Canada Health-care Premiums & Upward Mobility | Tax Foundation
PostgreSQL: PostgreSQL Anonymizer 1.0: Privacy By Design For Postgres
Microsoft revises software licensing policy amid EU scrutiny • The Register
The first is five European Cloud Principles being adopted by Microsoft across Europe, including: We will ensure our public cloud meets Europe's needs and servesEurope's values. We will ensure our cloud provides a platform for the success of European software developers. We will partner with and support European cloud solution providers. We will ensure our cloud offerings meet European governments' sovereign needs, in partnership with local trusted technology providers. We will recognize that European governments are regulating technology, and we will adapt to and support these efforts.
Venezuelan cardiologist charged with designing ransomware • The Register
Gives a different perspective from quaddi and replicant
Doc Searls Weblog · Remembering Craig Burton
Auto Update Running Docker Containers With Watchtower - OSTechNix
Cyber Safety Report Outlines Software Security Best Practices
The report spells out 19 recommendations to help organizations deal with threats and improve overall security, including directives to: Maintain an accurate IT asset and application inventory Invest in capabilities to identify vulnerable systems Have a documented vulnerability response program as well as a documented disclosure process Improve SBOM tooling and adoptability Train developers in secure software development Increase investments in open source software security Specifically, the report says, software developers and maintainers should: Adopt standard practices and technologies to build secure software in accordance with ISO 27034:2011160 and NIST’s Secure Software Development Framework Establish a comprehensive approach to code maintenance that encompasses consistent secure development processes, security assessments, and vulnerability management operations Implement communication processes and mechanisms that provide consistent and relevant security messaging to users Use integrated development environment (IDE) tools to help secure software development Integrate source code scanning and tools OpenSSF, which offers security training, tools, auditing services, and other community resources Open Web Application Security Program (OWASP) Foundation, which tracks top security risks to web applications and provides resources for education, training, and community networking Open Source Software Security Mobilization Plan, which outlines steps to help address open source software supply chain security
5 lessons from 'The Hero's Journey' to empower your IT team | The Enterprisers Project
1. Practice active listening 2. Reciprocate trust and respect 3. Provide support, guidance, and coaching 4. Encourage growth 5. Step back when needed
What Is XDP (Express Data Path) in Linux - Make Tech Easier
How to Install ModSecurity 3 + OWASP with Nginx on Rocky Linux 9 - LinuxCapable
OWASP Rule Set with ModSecurity can almost instantly help protect your server. Bad user agents DDOS Cross website scripting SQL injection Session hijacking Other Threats
Thunderbird By The Numbers: Our 2021 Financial Report
78.1% on people 1% on technology
How to Create and Use Container Volumes within Portainer – The New Stack
10 Python In-Built Functions You Should Know - GeeksforGeeks
Picroscopy Turns your Raspberry Pi into a Digital Microscopy
Picroscopy
Jan-Piet Mens :: An Ansible reference sheet
Chris's Wiki :: blog/solaris/ZFSPoolIostatsPhysical
Watch The World as it Collapses From Your Linux Desktop
Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security
Phishing Engagements There are several types of phishing engagements often used for testing enterprises. Some types are: Click-rate tracking Who clicked? How many times? Credential harvesting Passwords Cookie theft Payload (attached or linked) Malicious Office Document (MalDoc) Executables Compressed files Many organizations have automated phishing training. Often, these programs require users to click a link in an email which tracks their “bad” behavior. These training scenarios are great to introduce users to the potential hazards of phishing attacks, however, they may miss the mark when modeling more advanced adversaries.
Tenet Health cyberattack, monthlong outage led to $100M in 'unfavorable impact'
While the outage was only felt by some of its hospitals and for less than a month, the $100 million impact aligns with the financial impacts reported by U.S. providers with similar outages. For context, the more than three-month outage experienced by the entirety of the Ireland Health Service Executive last summer caused $600 million in lost revenue and recovery costs. And the Ireland HSE is the country’s primary caregiver. On the other hand, the May 2021 cyberattack and monthlong outage at Scripps Health, with just five hospitals and 19 outpatient facilities, cost the California provider $112.7 million in lost revenue and remediation. The health system was “significantly impacted by lost revenue and incremental expense.” Scripps reported a similar insurance recovery to Tenet of $5.9 million. Vermont Health Network’s outage lasted more than a month, led to the deployment of the National Guard and cost more than $63 million, while the Universal Health Services attack with the same outage-period cost $67 million. On average, these attacks cost about $1.5 million for each day of network downtime. Tenet may not be out of the woods yet, either, as its affiliate Baptist Health System was hacked, which led to the theft of data tied to 1.2 million patients. Tenet is currently defending itself against the breach lawsuit.
Meta calls for the death of the leap second | Engadget
Climate change has Seville so hot it's started naming heat waves like hurricanes | Engadget
Impacket Defense Basics With an Azure Lab  - Black Hills Information Security
How to Become an Azure Administrator in 2022 | ServerWatch
Koodo is an All-in-one Open Source eBook Reader for Linux
A Review of the Anki Application
Protect Your Parent from Elder Financial Abuse with A Power of Attorney - FindLaw
Open-Source Security: How Digital Infrastructure Is Built on a House of Cards - Lawfare
How To Enable Versioning on the S3 Bucket Using Terraform
Virtio-net failover: An introduction
Why sudo is so important in Linux and how to use it | ZDNet
Hijacking webcams with Screencastify | Almost Secure
Obviously, there is Screencastify itself, running app.screencastify.com and a bunch of related subdomains. So the company itself or a rogue employee could plant malicious code here. But that’s not the end of it. The entities controlling subdomains of screencastify.com (not counting hosting companies) are at the very least: Webflow, running www.screencastify.com Teachable, running course.screencastify.com Atlassian, running status.screencastify.com Netlify, running quote.screencastify.com Marketo, running go.screencastify.com ZenDesk, running learn.screencastify.com That’s quite a few companies users are expected to trust.
Slurm Terraform | openSUSE for HPC
Secure your website with SSL sha2 certificate - LinuxTechLab
Can you trust a cloud provider for HA? - (Fabio Alessandro Locati|Fale)'s blog
Contextual Logging in Kubernetes 1.24 | Kubernetes
How to Change MAC Address in Linux - TREND OCEANS
macchanger
Upgrading probably the world's oldest running Linux install • The Register
Diziet
Managed cloud services: 4 things IT leaders should know | The Enterprisers Project
1. Managed cloud services vary quite a bit 2. A managed cloud services strategy must reflect your enterprise realities 3. Yes, you still need in-house skills 4. Managed cloud services and hybrid cloud pair well
Jarvis is your open-source personal assistant
Improve network performance with this open source framework | Opensource.com
IT leadership: 5 essential soft skills | The Enterprisers Project
1. Communicate value through active listening 2. Customize communication: What do your employees prefer? 3. Make the workplace more human 4. Roll with the punches 5. Step up and empower employees
Your cloud? My cloud now | Pen Test Partners
A decade of dotfiles
Digital transformation: 5 reality checks before you take the plunge | The Enterprisers Project
1. Define the context: Ask what is unique to your organization 2. Look outside-in: Holistically define your transformation goals 3. Assess the “to-be” organization fabric and technological architecture: Establish a roadmap to get there 4. Explore opportunities to become a platform company: Establish and implement platforms 5. Think big. Start small. Build and expand as you go. Be agile
How the Kaizen mindset fosters smart contrarians on your IT team | The Enterprisers Project
1. Reactive Kaizen 2. Proactive Kaizen 3. Innovative Kaizen "By infusing “there may be a better way” into corporate culture, IT leaders can inspire associates to challenge the status quo. The result is an IT organization that is proactive about making positive changes without fear of rubbing anyone the wrong way." "A key to success is ensuring that all employees have access to a standardized set of Kaizen processes, templates, tools, and metrics to simplify the process of implementing reactive, proactive, and innovative Kaizen models. It’s also important to track and measure the effect these discoveries have on overall effectiveness, reward associates for their findings, and recognize smart contrarians every quarter."
3 practical tips for agile transformation | Opensource.com
3 tips for achieving team agile 1. Workshop it 2. Make it incremental 3. Address benefit redistribution
Security and Human Behaviour 2022
How To Use Tags In Ansible Playbooks - OSTechNix
Returning to Hacker Summer Camp · System Overlord
Detectree: Open-source tool simplifies data analysis for blue teams, reduces alert fatigue - Help Net Security
Disable Windows Defender in powershell - a script to finally get rid of itBidouilleSecurity
Running the Steam Deck’s OS in a virtual machine using QEMU | The world won't listen
Install OpenLiteSpeed with PHP 8 on Rocky Linux 8 / AlmaLinux 8
Containers vulnerability risk assessment
his question, "Does it matter?", has two parts: How soon does it need to be fixed (a question for the software vendor)? How soon does it need to be applied (a question for the end user)?
Community metrics – Sri Ramkrishna
Kubernetes Operators: good security practices
Chris's Wiki :: blog/tech/PublicCryptoAlgorithmsMathWhy
Cybersecurity, the ECPA, Carpenter, and Government Transparency - Lawfare
A cautionary tale about locking Linux & FreeBSD user accounts - nixCraft
A locked or unlocked user account doesn’t matter on the remote machine if a session is already established on the OpenSSH server. It will directly connect using the ssh. Here is how to find out i
How To Set Up ModSecurity with Apache on Ubuntu 22.04 LTS - idroot
Ukraine's secret cyber-defense: Excellent backups • The Register
"The Russians are horrible at combined arms," Alperovitch said, noting this holds true for air and ground military invasion. "And that's what we've seen in cyber as well," he added. "Even though they've been able to achieve tactical successes on a number of occasions, including in the case of Viasat, they've not been able to leverage it to actually prosecute a campaign. The best tactics, even in cyber, don't compensate for a really, really bad plan."
Windows Follina zero-day exploited to infect PCs with Qbot • The Register
Yet More New HTTP Specs
What Is Oracle Linux? The Powerful, Free RHEL Alternative Explained
Chips Bill: Semiconductor Computer Chip Subsidies? | Tax Foundation
ChinaTalk: Elite Power Struggles in the CCP and USSR - Lawfare
Google fires researcher who claimed LaMDA AI was sentient | Engadget
Margaret Mitchell, who was fired from Google after calling out the lack of diversity within the organization, wrote on Twitter that systems like LaMDA don't develop intent, they instead are "modeling how people express communicative intent in the form of text strings." Less tactfully, Gary Marcus referred to Lemoine's assertions as "nonsense on stilts."
Ransomware is indiscriminatory – prepare for everything to fail, CIO News, ET CIO
Follow the 3-2-1-1-0 backup rule, which states there should always be at least three copies of data, on at least two different types of media, at least one off-site and one immutable or offline, with zero unverified backups or errors.
Cockpit 273 — Cockpit Project
IT talent: How upskilling can help boost digital transformation | The Enterprisers Project
3 automation trends happening right now | The Enterprisers Project
1. Edge computing scale depends on automation 2. Security automation, meet automation security 3. IT automation as a career booster – not a career killer
Is It Possible to Reconcile Encryption and Child Safety? - Lawfare
massCode: A Free and Open-Source Code Snippet Manager - It's FOSS
Proxmox VE - How to build an Ubuntu 22.04 Template (Updated Method) - Invidious
Getting started with automating and managing SSH server configuration with RHEL system roles
Pay the ransom and hope for the best... - rhyshammond.com
Confusion on containers - SysAdmin1138 Explains
Using Windows Update Delivery Optimization in Local Networks | Windows OS Hub
Create and Deploy Virtual Machines with vTPM on VMware vSphere ESXi - The Tech Journal
The History of Countering Violent Extremism Tends to Repeat. It Shouldn’t. - Lawfare
Statistical Analysis Software on Ubuntu (Free and Open Source SPSS Alternatives)
1. LibreOffice Calc 2. GNU PSPP 3. GNU R and RStudio 4. JASP 5. jamovi
12 Commands to Check Linux System & Hardware Information
5 Harvard Business Review articles CIOs should read this month | The Enterprisers Project
IT talent: 5 ways to better leverage remote teams | The Enterprisers Project
1. Create scrum and dev channels 2. Host daily standups 3. Use time zones to your advantage 4. Trust your teammates 5. Hours don't matter, results do
Chris's Wiki :: blog/programming/UnixLogTimestampsInThings
Log4J: SMEs not aware of, DHS see problems for a decade | Born's Tech and Windows World
Cybersecurity, ISA99, and 62443 | The Automation Blog
Remove Unicode and extended ASCII in Notepad++ - The Silicon Underground
Let's Encrypt for VMware ESXi standalone hosts - ESX Virtualization
Shoreline.io Announces Open Source Solutions Library | APMdigest - Application Performance Management
Become a Certified Datacenter Associate Online...for FREE! - LowEndBox
Chris's Wiki :: blog/sysadmin/IMAPIOTrafficImbalance
CalDavZAP: A Self-hosted Open-source CalDAV Server
CalDavZAP
How to Extract Text From PDFs and Images on Linux Using gImageReader
gImageReader
Ansible Server Provisioning - Unix / Linux the admins Tutorials
Scanning for security.txt files | Pen Test Partners
Understanding Memory Leaks in Java | Developer.com
One of the best ways to prevent memory leaks in Java is to use a tool like JProfiler, which can help you identify places where your code is allocating memory but not releasing it properly. JProfiler can also help you identify other potential causes of memory leaks, such as holding on to references to objects that are no longer needed. Once you have identified potential sources of memory leaks, you can then modify your code to make sure that resources are properly released when they’re no longer needed. This can help reduce the overall memory footprint of your application and improve its overall performance.
Retbleed: Arbitrary Speculative Code Execution with Return Instructions - Computer Security Group
Privilege: The Before and After of a Breach | Advanced Persistent Security
Cultivating Europe’s Data Garden - Lawfare
Tropy: An Open-Source App to Organize Your Research Photos - It's FOSS
The Hidden Cost of Fixing Your Kubernetes Clusters - Container Journal
Misconfigurations Matter Kubernetes Nodes Rightsizing Works
RHEL 9 networking: Say goodbye to ifcfg-files, and hello to keyfiles
Digital transformation: 3 things successful CIOs know | The Enterprisers Project
1. Spend time on strategy and always point it to your business 2. Measure twice, cut once, and iterate 3. Business first, then tech
Open Source Software FAQ
The Resiliency in the Web’s Layers - Jim Nielsen’s Blog
9 CIOs share the tips that shaped their leadership style | The Enterprisers Project
Be humble. Lead by example. Write a list of everything you see in other leaders and emulate the positives and avoid the negatives. This list should always be growing Revisit that list (#3) at least every 6 months to make sure that you are following it and potentially even recognizing that some things may have changed. Always be certain that your team’s benefits outweigh their costs and be able to deliver that message on a moment’s notice. Character matters Ethics are essential
The US military wants to understand the most important software on Earth | MIT Technology Review
Modernization: Why is it hard?
Alignment is necessary but hard Gatekeeping silos Busywork and excess middle management "Rockstars" don’t always save the day Attrition leading to lost knowledge Cost-cutting culture Unclear standards and policies Crowded marketplace
4 reasons to invest in leadership training for everyone | The Enterprisers Project
1. Leadership isn't born, it's nurtured 2. Leadership training induces loyalty 3. Leadership training can align your employees with your brand promise 4. Leadership training can demonstrate equity and inclusion
CP/M's open-source status clarified after 21 years • The Register
GUEST BLOG: My CISSP Success Story | Advanced Persistent Security
UNK
How to Record and Replay Linux Terminal Sessions
The First Cyber Safety Review Board Report is Out - Lawfare
Reworking our Visual Metrics Processing System – Mozilla Performance
5 Tricky Container Security Challenges - Container Journal
Container abstraction makes visibility a challenge Kubernetes itself is an attack surface Developers must play an increasingly crucial security role Security automation is the number-one DevOps challenge Container and Kubernetes security require a new security model Developers, DevOps and security teams must shift left and lead security automation together
How to Install FreetuxTV on Ubuntu 20.04 | 22.04 LTS -
What to Make of Microsoft’s Year in Cybersecurity - Lawfare
Stratum 1 Grandmaster Time Server On A Budget | Hackaday
The Story of CP/M
yt-dlp - fork of youtube-dl - LinuxLinks
An Incredibly Amazing Co-Incidence Of Doubled, Double Disk Failures! - LowEndBox
Apparently a software bug caused all four SSDs to self-destruct at approximately 40,000 hours of operation. It seems obvious that redundant equipment would provide additional safety. It formerly seemed much less obvious, at least to me, that two similarly manufactured items might fail simultaneously. I always imagined there was a very high degree of security added by a second set of equipment.
Chris's Wiki :: blog/spam/DKIMSignatureTypes-2022-07
GitHub - paradux/paradux: Paradux: recover from maximum data disaster
I’ve locked myself out of my digital life – Terence Eden’s Blog
Linked: Succession planning isn't only about executives
shot-scraper
Integrating Security and Compliance Teams to Curb Modern Risks | APMdigest - Application Performance Management
Patch Standalone VMware ESXi 7 to 7u3e latest version - ESX Virtualization
How To Create VMware ESXi ISO With Latest Patches - ESX Virtualization
Bash Scripting - If, Else If, Else Tutorial - buildVirtual
Vulnerability Management news and publications #1 | Alexander V. Leonov
Both Google and Mandiant tracked a record number of zero-days last year. More zero-days are being discovered because security companies are getting better at finding them — not necessarily because hackers are coming up with new vulnerabilities. Not all zero-days are created equal. Some require sophisticated and novel techniques, like the attack on SolarWinds, and others exploit simple vulnerabilities in commonly used programs like Windows. Thankfully, there’s some basic cyber hygiene strategies that can keep your organization sufficiently prepared to mitigate zero-day exploits. Ensure that the technology your organization has is sufficient for protecting from the unknown. Many zero-days may never hit a hard drive, so pointing threat detection tools there could be fruitless. Patching is integral to protection against exploits. Staying on top of guidance from industry organizations like International Information System Security Certification Consortium (ISC)2 or federal authorities like the Cybersecurity and Infrastructure Security Agency is a good way to prioritize the exploit. Zero-day exploits are those that the vendor doesn’t know exist, and therefore no patch is available. In some cases, protection technologies can use behavioral detections to block certain activities, while in other cases, using detection technologies or human expertise in a security operations center is the only defense. Investing in the human element of security will place an organization in the best position to limit the financial and data losses zero-days can incur. While patching is proper preparation, the investment in trained security professionals, in-house or outsourced, is the best defense against zero-days.
Cloud Vulnerabilities & Security Issues Database
When Should You Start Estate Planning? - FindLaw
How To Talk to Your Loved Ones About Estate Planning - FindLaw
family
Cyber Command’s Annual Legal Conference - Lawfare
Lt. Gen. Charles Moore, who serves as Nakasone’s deputy, explained that combining information operations with cyber measures could give the U.S. a strategic advantage against adversaries in the future. “Without a doubt, what we have learned is that cyber-effects operations in conjunction—in more of a combined arms approach—with what we call traditionally information operations, is an extremely powerful tool.” He said that the U.S. should adopt “a strategy that’s focused on affecting adversaries’ perceptions.”
How Can One Know When To Trust Hardware and Software? - Lawfare
Add-MpPreference (Defender) | Microsoft Docs
Add-MpPreference -ExclusionPath "C:\Temp"
New Podcast: "Life During Cyberwartime" | DennisKennedy.Blog
Not Receiving SMS Text Message 2FA Codes? Call Your Carrier - TidBITS
All’s well that ends well, but the moral of the story is that if you aren’t receiving SMS text messages, particularly those that carry 2FA codes, call your cellular carrier and ask if they’re being blocked.
Defense: Windows task scheduling as an attack vector | Born's Tech and Windows World
Monkeypox outbreak was avoidable and we ignored the warning signs, expert says : NPR
"If we do want to get in front of emerging infectious diseases, we are going to have to prioritize dealing with emerging global disease threats at the site where they are spreading early on," Rimoin said. "We are totally interconnected by trade and travel, population growth, population movement, and we cannot make the mistake again of thinking that an infection that's happening somewhere in a remote area of the world isn't going to affect us right at home."
The Cyberlaw Podcast: “The First Thing We Do, Let’s Hack All the Lawyers” - Lawfare
Oh Canada: A Canadian Risk Assessment of the United States - Lawfare
The Lawfare Podcast: Aaron Friedberg on "Getting China Wrong" - Lawfare
Infiltrate, Exploit, Manipulate: Why the Subversive Nature of Cyber Conflict Explains Both Its Strategic Promise and Its Limitations - Lawfare
How to Work with Ansible When and Other Conditionals
Drag soldering through-hole pins – LinuxJedi's /dev/null
Kali Linux in Linode's Cloud | Kali Linux Blog
How to Install Ansible on RHEL 9 (Step by Step)
LC Channel Scan For USB TV Tuner ... Simplified
Brick by brick: why Docusaurus is a powerful documentation framework - DEV Community
7 CNCF Projects For Building Cloud-Native Networks - Container Journal
Antrea - Kubernetes networking based on Open vSwitch Cilium - eBPF-based networking, security, and observability Container Network Interface (CNI) - Interface specification for container networking CNI-Genie - A tool that allows multiple CNI plugins to co-exist at runtime Kube-OVN - A Kubernetes network fabric for enterprises Network Service Mesh (NSM) - A hybrid multi-cloud IP service mesh Submariner - Direct, multi-cluster networking for hybrid and multi-cloud
How to Create a JAR File
What Is the US Cyber Command?
Purple Knight - Evaluate the security of your Active Directory
ping-castle
Raspberry Pi Imager 1.7 Released with New Advanced Settings, Zstd Support, and More - 9to5Linux
Cloud OSINT. Finding Interesting Resources | Pen Test Partners
How to Create and Use MacVLAN Network in Docker
7 books that CIOs should read this summer | The Enterprisers Project
1. The Work of the Future Building Better Jobs in an Age of Intelligent Machines by Elisabeth B. Reynolds, David A. Mindell, and David Autor 2. Net Positive: How Courageous Companies Thrive by Giving More Than They Take by Paul Polman and Andrew Winston 3. Radically Human: How New Technology Is Transforming Business and Shaping Our Future by Paul Daugherty and H. James Wilson 4. Digital Trailblazer: Essential Lessons to Jumpstart Transformation and Accelerate your Technology Leadership By Isaac Sacolick 5. Stuck: How to Win at Work by Understanding Loss By Dr. Victoria M. Grady and Patrick McCreesh, PhD 6. The Future of Workplace Fear – How Human Reflex Stands in the Way of Digital Transformation By Steve Prentice 7. Leading with Heart: Five Conversations That Unlock Creativity, Passion and Purpose By John Baird and Edward Sullivan
COVID-19 Is Making Young Adults Think About Estate Planning - FindLaw
How to Capture Network Traffic in Linux With tcpdump
How to Use Restic to Backup and Restore Data in Linux - ByteXD
My 2022 Higher Education Finance Reading List – Robert Kelchen
What Is a Transistor and What Is It Used For?
Kubernetes API Server SLO Alerts: The Definitive Guide – Povilas Versockas
How to Create an ISO Image From a Folder Using the Windows Command Prompt
OSCDIMG -n -d -m PathToSource Destinationfile.ISO
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms | NIST
30+ Free and Open Source Kubernetes Monitoring Tools
Command and Shell Module in Ansible: Differences and practical usage
How to find UUID of Disk Storage with the simple command - TREND OCEANS
Linux Security Auditing with Lynis
Extracting Metadata from PcapNG files
How Cobalt Strike Became a Favorite Tool of Hackers | eSecurityPlanet
What’s the Cost for Not Having a CISO on Staff? $600 Million? | Alexander's Blog
Creating a Shortcut for Windows Update in Windows Server 2019 | Alexander's Blog
Vulners Linux Audit API: Security Bulletin Publication Dates in Results | Alexander V. Leonov
Identify Bird Sounds With BirdNET-Pi on Raspberry Pi
How to Check and Install Security Updates on RHEL 6/7/8 - ByteXD
Latest MITRE Endpoint Security Results Show Some Familiar Names on Top | eSecurityPlanet
Chainguard: It’s All About That Base Image – The New Stack
A Millennial Contemplates the Digital Life - Wahl Network
Chris's Wiki :: blog/sysadmin/ReproducibleMachinesWhy
Security for Kubernetes: Pitfalls and Solutions | Born's Tech and Windows World
Automate Tasks With Terraform Docker Integration
SQL Server on Linux: Scatter/Gather == Vectored I/O - Microsoft Tech Community
Five Great Reads on Cyber, Data, and Legal Discovery for June 2022
Kitchen Soap – Book Suggestion: “Dialogue: The Art Of Thinking Together”
Kitchen Soap – Architectural Folk Models
Kitchen Soap – Some Principles of Human-Centered Computing
Kitchen Soap – An Open Letter To Monitoring/Metrics/Alerting Companies
Bluejacking vs. Bluebugging vs. Bluesnarfing: What's the Difference?
The History of Ubuntu Linux Distribution System
Common Security Advisory Framework (CSAF) beta files now available
SAS2008 LBA, Seagate Ironwolfs and scary log messages « Ville-Pekka Vainio's blog
Unaligned partial completion ... tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE ... print_req_error: critical medium error ...
How to manage SSH keys on Cockpit for remote SSH key authentication | TechRepublic
SBOM - SB Doesn’t Stand for Silver Bullet - Linux Foundation
Rapid7 InsightIDR Testing & Review
TIC Guidance | CISA
How to Install Latest Linux Kernel in RHEL 8
SELinux is unmanageable; just turn it off if it gets in your way
Verizon 2022 DBIR: External attacks and ransomware reign - Help Net Security
For this latest edition, the company’s analysts have examined 23,896 security incidents (5,212 of which were confirmed breaches) between November 1, 2020 and October 31, 2021, and found that: External actors are 4 times more likely to cause breaches in an organization than internal ones Roughly 4 in 5 breaches can be attributed to organized crime “Financial gain” is the number one motive for the overwhelming majority of data breaches, “espionage” is in the second spot Over half of breaches involved the use of either remote access or web applications 62% of system intrusion incidents came through an organization’s partner (mostly due to single supply chain breaches) 82% of analyzed breaches over the past year involved a human element (human error, misuse of privilege, social engineering attacks, etc.) The vast majority of breaches include only a handful of steps, whith three actions being most common (Phishing, Downloader, and Ransomware)
Ansible Ad Hoc Commands - OSTechNix
FFmpeg Commands: 31 Must-Haves for Beginners in 2022 - VideoProc
1. FFmpeg Get Video Info 2. Preview or Test Video or Audio Files 3. FFmpeg MOV to MP4 (Convert Video/Audio to Another Format) 4. FFmpeg Extract Audio (Convert Video to Audio) 5. FFmpeg Remove Audio 6. Convert a Specific Portion of a Video 7. FFmpeg Trim Video 8. Cropping Videos 9. FFmpeg Resize Video 10. FFmpeg Combine Audio and Video 11. FFmpeg Concatenate Videos 12. FFmpeg Rotate Video 13. FFmpeg Speed Up Video 14. FFmpeg Compress Video 15. Zoom In and Zoom Out Videos 16. FFmpeg Loop 17. Set Frames Per Second (FPS) 18. Set Group of Pictures (GOP) 19. Copy Metadata 20. Add Subtitle to Video 21. Keep Original Encoding 22. Create Animated GIF 23. FFmpeg Resize Image 24. FFmpeg Images to Video 25. Convert a Single Image Into a Video 26. FFmpeg Extract Frames 27. Change the Volume of Audio Files 28. Compressing Audio Files 29. Increase/Decrease Audio Playback Speed 30. Add an Image to Audio 31. Getting Help
Potential threats to uninterruptible power supply (UPS) devices - Help Net Security
5 Keys to Optimizing Application Container Testing | ITPro Today: IT News, How-Tos, Trends, Case Studies, Career Tips, More
1. Start with a baseline scan using a third-party tool or service. 2. Automate container scanning. 3. Actually manage the test resources. 4. Decide where to run application container tests. 5. Get the most out of application containers.
KDDI says 70% of services restored after wide network troubles - Japan Today
Software Over Time - Jim Nielsen’s Blog
Cloud consultants: 4 questions to ask about your strategy | The Enterprisers Project
1. What can we do with this consultant that we couldn't do without? 2. No, really: What are they going to work on? 3. How do we know when to use a consultant? 4. How will we measure results?
CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF
Lorien: Infinite canvas drawing/whiteboarding tool for Linux - TREND OCEANS
How to Create a Data Backup and Recovery Strategy for Linux
A solid backup plan will allow you to: Quickly recover your core data for business continuity Secure your business, because data is one of the most valuable assets to any business Save money on expensive recovery solutions or professionals in case of data loss
Security features in Red Hat Enterprise Linux 9
In RHEL 9, the system-wide cryptographic policies have been adjusted to provide up-to-date security defaults: Disabled TLS 1.0, TLS 1.1, DTLS 1.0, RC4, CAMELLIA, DSA, 3DES, and FFDHE-1024 in all policies. Increased minimum RSA key size and minimum Diffie-Hellman parameter size in LEGACY. With the exception of Hash-based Message Authentication Codes (HMACs), SHA-1 is disabled in TLS and SSH algorithms.
Weave Cybersecurity into your product design | Ubuntu
Cybersecurity doesn’t directly contribute to revenue. Cybersecurity can potentially delay time to market. Designers and managers typically underestimate how severe the consequences of cybersecurity vulnerabilities can be.
The road to JBoss EAP 8 | Red Hat Developer
Irving Wladawsky-Berger: How to Build Organizational Resilience to Cyberattacks
Obsolescence of ATO Pathways
Zero Trust Security Is Here To Stay For Decades - LinuxTechLab
Codenotary introduces Software Bill of Materials service for Kubernetes | ZDNet
Debian and The History of Debian Linux Distribution
Why organizations need site reliability engineers | Opensource.com
By resembling production as much as possible, the pre-production environment improves confidence in releases.
Scanning container image vulnerabilities with Clair
Cortex XSOAR Tips & Tricks – Creating indicator relationships in automations – NVISO Labs
How to approach sustainability in IT operations
Using fwupdmgr to update NVME firmware – nullr0ute's blog
What tools can be used for stress test in JBoss EAP? - Red Hat Customer Portal
Gatling - Professional Load Testing Tool
Faban - Helping measure performance
Apache JMeter - Apache JMeter™
The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact | Securelist
eXaDrums is an open source, low-latency electronic drum system | Arduino Blog
dnf-automatic: Enable Automatic Updates for RHEL-based distributions - TREND OCEANS
The Cybersecurity Skills Gap is Another Instance of Late-stage Capitalism - Daniel Miessler
3 ways CIOs should approach IT team accountability | The Enterprisers Project
1. Expect the unexpected 2. Check in regularly 3. Aim for alignment
9 hiring trends for the most in-demand IT jobs of 2022 | The Enterprisers Project
1. IT Operations professionals are in demand 2. DevOps Engineer is still the top title being hired 3. There are barriers to skill development 4. Only 50 percent of enterprise IT organizations have a formal upskilling program 5. Skill development is on the rise 6. The application of new skills learned is mediocre 7. Certifications are very valuable 8. Happiness is relative 9. Technical skills are more in demand than human skills for today’s hiring managers
Notes on running containers with bubblewrap
Guide to Web Application Penetration Testing
A penetration test is an effective way to identify unknown vulnerabilities. The test helps validate the effectiveness of the overall security measures implemented. The Penetration Test is essential to augment the web application firewall from the web application security perspective. Penetration tests help businesses identify and prioritize resources to mitigate the risk. The test helps users discover the most vulnerable route for attack and its possible impact. The test helps you find security flaws and loopholes that can result in a breach and/or theft of sensitive data.
Digital transformation: 5 steps to boost your progress | The Enterprisers Project
Step 1: Evaluate where you are Step 2: Appoint a CDO–if only for the time being Step 3: Understand what data you have available, and how to leverage it Step 4: Focus on your people Step 5: Know when you’re done
Introducing A New Performance Comparison Tool – PerfCompare – Mozilla Performance
Translators and free software, a practical introduction to OmegaT — GNU MediaGoblin
OmegaT
Norway hit with cyberattack, temporarily suspending service | The Hill
Nessus false positives - The Silicon Underground
What Is Desoldering Wick and When Should You Use It?
When routine medical tests trigger a cascade of unnecessary care : Shots - Health News : NPR
Is HIPAA Privacy a Federal Law?
How to read a Nessus scan report - The Silicon Underground
SMBs are still making the same silly cybersecurity mistakes | TechRadar
Why cybersecurity is also a human issue, not just a technology one - TechNative
How to avoid costly medical bills and get out of medical debt : Shots - Health News : NPR
Composable tools for disk images | Richard WM Jones
The End-to-End Zero Trust Journey: How Did We Get Here? - VMware Security Blog - VMware
Updating A Free Udemy Bootstrap Course On Oracle Cloud Free Tier - LowEndBox
Windows Server 2022 Automated Active Directory Install
Using Free Dynamic DNS with afraid.org - LowEndBox
A New, Remarkably Sophisticated Malware Is Attacking Routers | WIRED
52 Things I Learned in 2021
Defending Ukraine: Early Lessons from the Cyber War - Microsoft On the Issues
Hitting the Books: Why lawyers will be essential to tomorrow's orbital economy | Engadget
Thai Coconut Rice Pudding with Jasmine Rice, a South Asian Dessert | Penniless Parenting
GitHub - dwmkerr/hacker-laws: 💻📖 Laws, Theories, Principles and Patterns that developers will find useful. #hackerlaws
Hofstadter’s Law: It always takes longer than you expect, even when you take into account Hofstadter’s Law. Amara’s Law: We tend to overestimate the effect of a technology in the short run and underestimate in the long run Putt’s Law: Technology is dominated by two types of people, those who understand what they do not manage and those who manage what they do not understand.
Eponymous Laws Part I: Laws of the Internet
How To Install DBeaver CE On Ubuntu / AlmaLinux & Fedora | Tips On UNIX
How to Install and Use Apache Guacamole Remote Desktop on Rocky Linux 8
Ansible Lab Setup With Vagrant And Virtualbox In Linux - OSTechNix
How to Install Apache Tomcat 10 on Ubuntu 20.04
Wazuh Vulnerability detection - Unix / Linux the admins Tutorials
Another Critical Active Directory Certificate Services NTLM Relay Vulnerability allows for Domain Takeover (DFSCoerce, Critical) - The things that are better left unspoken
DFSCoerce
Stop Pretending Your Company is Remote
Add ESXi Host to Cluster with Terraform - vGemba.net
Enhance Your IT Scripting with the Prettier VSCode Plugin
A Great Digital Employee Experience Keeps Employees
As an employee, my priorities have changed; I prefer flexibility and time management without compromising personal and family aspirations. Organizations are monitoring these newfound preferences of employees closely. They are fine-tuning policies about how employees leverage tools to set up digital employee-friendly practices in order to retain, promote talent, and remain competitive in the industry.
Robert Stephens, Founder of The Geek Squad – Cool Tools
Organizing Cables and Other Gear Using Hanging Storage Bags – Cool Tools
The Time Hack Everyone Should Know | The MIT Press Reader
GitHub - PaulJenkin/PS4RaspberryPi: PiZero to host a server and emulate USB loading when necessary
How to use loops in Terraform
20 Useful Security Features and Tools for Linux Admins
Linux History Command with Advance Examples - TREND OCEANS
Bolt-On vs Baked-In Cybersecurity - Lawfare
The programmer, like the poet, works only slightly removed from pure thought-stuff. He builds castles in the air, creating by the exertion of the imagination .... Yet the program construct, unlike the poet’s words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself .... The magic of myth and legend has come true in our time. One types the correct incantation on a keyboard, and a display screen comes to life, showing things that never were nor could be.
(125) Monica Setup on Portainer | A Personal Relationship Manager - YouTube
PCI Express 7 will be eight times faster than PCI Express 5 | Engadget
AWS IoT ExpressLink Now Generally Available – Quickly Develop Devices That Connect Securely to AWS Cloud | AWS News Blog
Starting Your Leadership Journey - Wahl Network
Chris's Wiki :: blog/tech/HDDsNowSomewhatBetter
It's not wget or curl, it's iwr in Windows - krypted
iwr -uri https://pathtothefile/myfile.txt -OutFile ./myfile.txt -UseBasicParsing -UseDefaultCredentials
Directing different ports to different containers with Traefik · The Odd Bit
Traefik
Linked: Bad news: The cybersecurity skills crisis is about to get even worse
Low Cost Shielding Idea for Plastic RTL-SDRs
Kitchen Soap – Multiple Perspectives On Technical Problems and Solutions
Dark hours – postincident recovery without procedures and documentation | CQURE Academy
CISO MindMap 2022 - RecommendationsRafeeq Rehman | Cyber | Automation | Digital
Powershell Log Archival Script - byronpate.com
Coveware's testimony to the HSGAC on Mandatory Reporting Laws
Top 11 Ransomware Prevention Best Practices | ServerWatch
Offline backups are isolated from the internet and cyberattacks, including ransomware. Spam filters can prevent the vast majority of email-based ransomware attacks before they even happen by blocking emails that potentially contain ransomware. Microsegmentation isolates data in different parts of a network, which helps to prevent the spread of ransomware to all data. Sandbox testing should be used when introducing new files to a network. It prevents files from accessing the network, meaning possible ransomware won’t be able to cause damage. Ad blocking is a simple measure that can be taken to help prevent ransomware, as many threats are distributed through malicious ads. Review port settings for ports 3389 and 445, which are popular targets for ransomware threats. If your business does not need these ports open, then consider closing them. If they do need to be open, then access should be limited to only trusted hosts. Training your team on the importance of ransomware prevention is especially crucial when it comes to recognizing, avoiding, and reporting suspicious email threats. Put an intrusion detection system (IDS) in place to look out for threats by scouring network logs for signatures of malicious activity. Remove unnecessary systems, hardware, software, and services that expose your business to unnecessary risks and attacks by being attached to the network. Have a layered security approach in place with measures such as antivirus software, firewalls, and multi-factor authentication. Encrypt important data so that, in the event your company does get breached, it won’t be able to be exfiltrated.
8 System Administration Tasks to Automate | ServerWatch
1. Patching 2. Password Resets 3. Freeing Up Server Disk Space 4. Disk Usage Scans 5. Restarting Services 6. Reboots 7. Malware Scans 8. Remote Shutdowns
Someone made a tombstone to mark Internet Explorer’s end-of-support date | Engadget
OpenSSF Protects Open Source Security as Cold War Turns Hot- FOSS Force
Linux command line presentation - Linux Tutorials - Learn Linux Configuration
Ansible Playbooks - OSTechNix
GitHub - showmewebcam/showmewebcam: Raspberry Pi + High Quality Camera = High-quality USB Webcam!
Report reveals half of Japan's businesses had yet to ditch Internet Explorer | Engadget
Backup Kubernetes Cluster Resources to AWS S3 with Velero | Lisenet.com :: Linux | Security | Networking
My CS50P Final Project Presentation – Bruce Elgort
How to customize crypto policies in RHEL 8.2
Chapter 4. Using system-wide cryptographic policies Red Hat Enterprise Linux 8 | Red Hat Customer Portal
3-Ingredient Double Chocolate Mousse (Low Carb) + VIDEO - Cafe Delites
How to Back Up and Restore Wireless Network Profiles Using Command Prompt on Windows
To export all the available profiles, enter the following command: netsh wlan export profile key=clear folder=[folder path]. Where you see [folder path], enter the path to the folder on your computer where you want the profiles saved, without the square brackets.
OpenValue | Blog | Observability 4 JVM Frameworks with Grafana in Java and Kotlin
Terraform Best Practices for Better Infrastructure Management | by Ioannis Moustakis | Spacelift | May, 2022 | Medium
5 RAM Myths and Misconceptions That Really Aren't True
1. "You Can't Mix RAM Sizes," or "You Can't Mix RAM Brands" 2. "I Don't Need More RAM," or "My System Has Enough RAM" 3. "RAM Size Is All That Matters" 4. "Clear Your RAM to Boost Its Speed" 5. "You Must Use an Equal Number of RAM Sticks" 6. "You Cannot Upgrade the RAM on a Laptop" You can do a lot with RAM: mismatched sticks, different speeds, different sizes, and so on. For the most part, you'll just end up with a slower computer. Still, it is always best to match your RAM sticks. That way, you'll receive the best performance available, and there is less chance of corruption or other issues arising from mismatched memory modules.
Check Wi-Fi Signal Strength on Windows with PowerShell | Windows OS Hub
Manage Playbooks and Inventories Easily with Ansible Tower
AWS Inspector : A Guide to Discover Your Security Holes
Linked: Most organizations that paid a ransom were hit with a second ransomware attack
Was GE CEO Jack Welch bad for business? : NPR
How to Troubleshoot Applications on Kubernetes
ESXi Host Uptime using PowerCLI - buildVirtual
Upgrade Kubernetes Cluster - Cheat sheet -
Why web3 supposedly isn’t a scam ! even the horse knew
Accounts Continued - Azure with PowerShell III - tommymaynard.com
What Is the Kakeibo Method, and How Does It Save You Money? – BeingFrugal.net
How Kakeibo Can Make You Rich Through Saving - Daybreak with Ray
Shields Health Care hack may have exposed data for 2 million people | Engadget
Tuning the OpenZFS write throttle | Delphix
Robert Milkowski's blog: TrueNAS Scale and ZFS Write Throttling
A Reply to Alex Danco: Revisiting MacLeod and the Three Ladders in the Wake of Trump – Michael O. Church
Terraform Hangs Solved – Michael Ellerbeck
What Is the Correct Soldering Temperature?
Invoke-VMScriptPlus v3 - LucD notes
At Your Fingertips - LucD notes
Cloud-init - Part 5 - Running Containers - LucD notes
Cloud-init - Part 4 - Running Scripts - LucD notes
Cloud-init - Part 3 - Photon OS - LucD notes
Cloud-init - Part 2 - Advanced Ubuntu - LucD notes
Cloud-init - Part 1 - The Basics - LucD notes
A Hitchhikers Guide to SRS 1.0.0 - LucD notes
Feeding ACARS Data to Airframes.io
aircraft
Starlink stats for a year | Nelson's log
Building a Budget Homelab NAS Server (2022 Edition) · mtlynch.io
Handy Frameworks for Life - Wahl Network
B – Begin the Planning – what do you want to do? A – Arrange for Reconnaissance – what information do you need to complete your plan? M – Make Reconnaissance – go get that information, repeat until 75%+ confident C – Complete the Planning – complete your plan I – Issue the Order – tell the people that need to know S – Supervise – make sure it happens
Beautiful Basics: Lesson 3 :: malicious.link — welcome
How to Set Up SSH Passwordless Login (Step-by-Step Tutorial)
Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete - Infosecurity Magazine
“Boards must make sure CISOs have the budget necessary to get short-term issues under control and then begin planning a long-term business-wide strategy. Such a strategy should be supported by a standard operating model with robust processes and policies for the company’s entire supply chain. Every month of delay leaves businesses open to potentially crippling cyber-attacks,” stated Stuart Jubb, Group Managing Director at Crossword Cybersecurity plc, in a press release. At present, cybersecurity pros believe companies are predominantly focused on short-term priorities, namely software verification and ransomware attacks. In the next 12 months, three-quarters of respondents stated that software verification would be a crucial focus, while 69% of those surveyed said they would transition to the cloud. Additionally, two-thirds (67%) of participants said they would focus on handling the threat of ransomware attacks. “Tackling ransomware is a huge area of focus in the world of research, so I’m not surprised this scored highly in the survey,” said Muttukrishnan Rajarajan, professor of security engineering and director, Institute for Cyber Security, City, University of London, in a press release. “We are often commissioned to work on projects that focus just on this – an attack on one SME can cause a complete supply chain to grind to a halt as we saw with vulnerabilities introduced via the Log4J code libraries recently.”
Booting cloud images with libvirt · The Odd Bit
Kerberos authenticated queries to Active Directory · The Odd Bit
Humble Bundle Download Links · GitHub
Route48.org - Free IPv4 To IPv6 Tunnel Broker Service Plus Much More! - LowEndBox
How To Monitor A Folder For Any Changes in PowerShell | KC's Blog
Chris's Wiki :: blog/tech/TLSNowLimitedIntermediates
Secure Your Secrets With Ansible Vault
5 Spring Cleaning Tasks That Will Save Money – BeingFrugal.net
How to Show Line Numbers in Vi - buildVirtual
set number
Accounts - Azure with PowerShell II - tommymaynard.com
It Begins - Azure with PowerShell I - tommymaynard.com
Gluten Free Egg Free Chicken Schnitzel Recipe - Allergy Friendly Fried Breaded Chicken Cutlets | Penniless Parenting
Royalty Free Images for Presentations – Philip Flint
Everything You Need to Know about Linux Input-Output Redirection | Linux Journal
Primer to Container Security | Linux Journal
Do you want a car with wheels, brake or throttle? The Software development paradox! « Only Software matters
Managers : Listen to your senior and experienced developers. Even prime-ministers have ministers and kings have consultants! (nobody is perfect) Developers : Fight for your right to achieve perfection. Fight for your right to write code you’re proud of and creates less bugs (nobody is perfect) Customers : Fight for your right to get high-quality software that meets your business requirements. It’s your money after all!
Chaos Engineering Stories – Laurent Domb
tmux – Stuff I'm Up To
The Conclusive Netsh : Ultimate Guide
Discovering the Ansible Hosts File
The Essential Guide to Grafana Docker Monitoring
Conquer Kubernetes Clusters with Ansible Kubespray
Linked: Ransomware recovery costs dwarf actual ransoms
A teaspoon of computing in every subject: Broadening participation in computer science - Raspberry Pi
'Blade Runner' composer and electronic music pioneer Vangelis dies at 79 | Engadget
A Security Review of Docker Official Images: Which Do You Trust?
Top 20 Dockerfile best practices for security – Sysdig
Documentation Guide — Write the Docs
Checklist Design - A collection of the best design practices.
Checklist Design - A collection of the best design practices.
A categorized list of all Java and JVM features since JDK 8 to 18 - Advanced Web Machinery
PowerShell and the Windows Event Log » cyberfellabtc
But where are the secret recipes? | Seth's Blog
Should we teach AI and ML differently to other areas of computer science? A challenge - Raspberry Pi
The control/responsibility matrix | Seth's Blog
So You Inherited an AWS Account. A 30-day security guide for engineers… | by Matt Fuller | The Startup | Medium
Best practices for securing Identity and Access Management on Amazon Web Services - Bridgecrew Blog
The True Meaning of Technical Debt 💸 - by Luca Rossi
GitHub - dwmkerr/hacker-laws: 💻📖 Laws, Theories, Principles and Patterns that developers will find useful. #hackerlaws
How to Run Java Web Apps with Docker Containers - Sematext
Top 10 CI/CD Security Risks
CICD-SEC-1 Insufficient Flow Control Mechanisms CICD-SEC-2 Inadequate Identity and Access Management CICD-SEC-3 Dependency Chain Abuse CICD-SEC-4 Poisoned Pipeline Execution (PPE) CICD-SEC-5 Insufficient PBAC (Pipeline-Based Access Controls) CICD-SEC-6 Insufficient Credential Hygiene CICD-SEC-7 Insecure System Configuration CICD-SEC-8 Ungoverned Usage of 3rd Party Services CICD-SEC-9 Improper Artifact Integrity Validation CICD-SEC-10 Insufficient Logging and Visibility
Constructing a Feedback Vault - Wahl Network
sysadvent: Day 12 - Terraform Refactoring
sysadvent: Day 9 - 3 things parenting taught me about system administration
Prioritize your health Leverage the community You can't eliminate all Snowflakes
sysadvent: Day 2 - Reliability as a Product Feature
sysadvent: Day 18 - Generating Compliance as Code for Terraform with InSpec-Iggy
DevSec Hardening Framework · GitHub
Doesn’t even need a plug on it any more… | The Angry Technician
It’s a common complaint in school IT support departments that they are treated as general dogs-bodies there to help with any electrical appliance at all. VCRs, kettles, microwaves, desk lamps… the saying goes that “if it has a plug on it, it must be IT”. Today set a new low for that sentiment, when I was asked to supply new AA batteries for an electric pencil sharpener.
The Technium: 103 Bits of Advice I Wish I Had Known
PowerShell Event Log Mining • The Lonely Administrator
Custom CSV Import with PowerShell • The Lonely Administrator
Get Windows Drivers Off Your Computer - The Grim Admin
Export-WindowsDriver -Online -Destination C:\Drivers | Out-File -FilePath C:\Drivers\Drivers.txt
8 Examples of Sharing AWS Managed AD with Multiple Accounts from CLI and Console
LDAPSearch Reference :: malicious.link — welcome
A US college is shutting down for good following a ransomware attack | Engadget
GitHub - pi-hole/pi-hole: A black hole for Internet advertisements
Matt Ventura's blog » Blog Archive » OpenWRT on SR-IOV: Good Idea?
Secure Your State With Terraform Backends
Master In-Depth Security Audits with OpenSCAP
Solarwinds Geek Speak - NetworkSherpa
Include the why - NetworkSherpa
….if you always tell people why, they’ll understand it better, they’ll consider it more important, and they’ll be more likely to comply. Even if they don’t understand your reason, they’ll be more likely to comply. So there’s an iron rule that just as you want to start getting worldly wisdom by asking why, why, why, in communicating with other people about everything, you want to include why, why, why. Even if it’s obvious, it’s wise to stick in the why.
Linked: E-Waste Is a Cybersecurity Problem, Too
“Shegerian: I once had a big, big bank call me up: “John, we’ve had a breach, but we don’t believe it’s phishing or software. We think it came from hardware.” I go out there and it turns out one of their bankers threw his laptop in the trash in Manhattan and someone fished it out. On that laptop was information from the many clients of the entire banking firm—and the bank’s multibillion-dollar enterprise. The liability, the data…God, just absolutely priceless.”
Linked: The shortage of tech workers is about to become an even bigger problem for everyone
Some Employers Have Not Figured Out The Job Market Changed
Upgrade Log Insight using Ansible and Azure DevOps – Adventures in a Virtual World
Encrypted gitops secrets with flux and age :: 🤠 Major Hayden
Chris's Wiki :: blog/sysadmin/MonitoringTooHard
WWoIT - Wayne's World of IT: More useful command-lines #4
WWoIT - Wayne's World of IT: Exchange PowerShell Commands #2
WWoIT - Wayne's World of IT: Useful PowerShell command-lines #2
WWoIT - Wayne's World of IT: Resizing a VM's Windows system OS with Set-HardDisk
Kubernetes best practices in Azure: AKS name space isolation and AAD integration
Family Mission Statement :: malicious.link — welcome
Beautiful Basics: Lesson 1 :: malicious.link — welcome
Introducing Azure Firewall
Security in the cloud - Disk encryption in Azure
The cloud has got your back(up): A primer on Azure Backup
Decoding Docker - Part 3 : Docker files
Decoding Docker - Part 2
Decoding Docker - Part 1
Troy Hunt: Breach Disclosure Blow-by-Blow: Here's Why It's so Hard
Install Elasticsearch on Ubuntu for Next Level Searching
4 Benefits of Sharing Your Parenting Experiences | Penniless Parenting
Yaki Onigiri Recipe -- Grilled Japanese Rice Balls -- Gluten Free, Vegan, Allergy Friendly, and Frugal | Penniless Parenting
How to Invest in Your Children’s Quality of Life | Penniless Parenting
Internal SSL Certs with Let's Encrypt
Installing TLS certificates on HP printers automatically – Peter Hicks' Blog
seems to change every two or three printer generations. If you have a modicum of developer / debugging expertise, you can quickly deduce what the right one is for you if the above (or below) doesn’t work. The magic incantation for some of the more modern HP printers is:
Installing a LetsEncrypt certificate on an HPE iLO 5 – Peter Hicks' Blog
Excellent LVM Tutorial for Beginners or Experts - A Random Walk Down Tech Street
Understanding Block Storage in Amazon Web Services | davidstamen
Chris's Wiki :: blog/linux/LibvirtHasBeenOkay
The All-Flash Backup Fallacy - Architecting IT
Looking forward to the future of modern backup storage - Architecting IT
Kubernetes Clusters – Pets or Cattle? - Architecting IT
Yubikey/Smartcard backed TLS servers
SSL For Free - Free SSL Certificates in Minutes
GitHub - djechelon/letsencrypthpeilo
Healthcare facilities prime target for ransomware attacks | Born's Tech and Windows World
Check_MK plugin: fail2ban « BenV's notes
https://blog.benjojo.co.uk/post/lto-tape-backups-for-linux-nerds
Going multipath without Multipath TCP
Teaching a cheap ethernet switch new tricks
Ghost in the ethernet optic
The true cost of cybersecurity incidents | Born's Tech and Windows World
Overview: TLS support in Windows | Born's Tech and Windows World
Microsoft license comparisons | Born's Tech and Windows World
Release notes: why and how?
Understanding Block Storage in Microsoft Azure | davidstamen
USENET Part 2: Spambots, Scientology Wars, and the Internet's First Deity - LowEndBox
Every September, a flood of new users joined – university students who’d just arrived at school and been provisioned accounts. They generally barged in, breached netiquette, were swiftly corrected, and then integrated into the community. People groaned about “September coming” but it was not a major event. However, once ISPs like AOL and Delphi and others opened up USENET to their users (circa 1993-94), there were a flood of users and they began coming in droves, regardless of the time of year. This was referred to as Eternal September and some feel it “blew up” the original USENET culture.
Windows 10 20H2: January 2022 Updates breaks AGPM-Server | Born's Tech and Windows World
Windows 11: A/B test shows watermark on unsupported systems | Born's Tech and Windows World
Linux vulnerabilities patched fastest (Feb. 2022) | Born's Tech and Windows World
The speed at which reported vulnerabilities were patched between 2019 and 2021 is interesting: Linux: 15 days Google: 44 days Mozilla; 46 days Apple: 69 days Microsoft: 83 days Oracle: 109 days
COBOL market: Three times larger than expected | Born's Tech and Windows World
The Technologies of War - with Part Numbers - LowEndBox
Chris's Wiki :: blog/linux/PAMFilesLongtermProblem
Windows 10 and 11: fTPM causes system stutter on AMD systems | Born's Tech and Windows World
VMware Tools 12: New Version released (March 1. 2022) | Born's Tech and Windows World
OpenSSH Suffered a "Near Miss" But is Now Post-Quantum - LowEndBox
As good as it gets
Hardened backup repository on Linux distro - Veeam setup - ESX Virtualization
VMware issues Updated ESXi SD card USB Boot Device Guidance · vNinja.net
Introducing Azure Hybrid Cloud Study Hall - Thomas Maurer
Chris's Wiki :: blog/linux/Ubuntu2204SlowServerBoot
PXE Boot RetroPie – Brian Brophy
From MSRC API to ZDI chart | >_
Modern Bank Heists 5.0: The Escalation from Dwell to Destruction - VMware Security Blog - VMware
Terence Luk: Infrastructure as Code in 15 Minutes PowerPoint Presentation
Sofabaton X1 Review - Is This The Harmony Killer We've Been Waiting For? | AV Gadgets
OpenWRT + RPi4: failover and load balancing | Nelson's log
OpenWRT on Raspberry Pi 4 | Nelson's log
I scanned the whole country of Austria and this is what I've found
Chris's Wiki :: blog/solaris/ZFSModernDiskPerformance
Chris's Wiki :: blog/linux/SSDSomeWriteVolumes
Chris's Wiki :: blog/sysadmin/NonHotswapDisksHassles
Chris's Wiki :: blog/tech/HostFirewallsLimits
Chris's Wiki :: blog/unix/PermissionsTwoMistakes
Computers Are Bad
Chris's Wiki :: blog/tech/TLSHasChangedALot
Chris's Wiki :: blog/sysadmin/OurYubikeyToMFAMove
Chris's Wiki :: blog/tech/TLSNoPlaceForOldThings
Using PowerCLI to update DNS settings on VMware hosts - Notes of a scripter
Doc Searls Weblog · Exitings
How Not to Build a SOC - VMware Security Blog - VMware
Mistake 1 – Start building your SOC before you know your ‘why’. Mistake 2 – Gold plated tooling. Mistake 3 – Build your SOC then hire your manager. Mistake 4 – Open the SOC without SOPs. Mistake 5 – Too much of the wrong data and not enough of the right data. Mistake 6 – Don’t tune your SIEM for false positives. Mistake 7 – Unclear escalations. Mistake 8 – Unclear handoffs.
An unattended installation of VMware Tools 12 generates a 2711 error - ivobeerens.nl
MS SQL General Instance Information – Luka Gros
VMware vSphere VM iPXE Boot without DHCP
PowerShell – Check if process is running on multiple machines | geekdudes
How Church & Dwight’s CISO used Feedly to track log4j in real time – Feedly Blog
Succeeding through Laziness and Open Source | Dan Tehranian's Blog
Career Advice I’d Give To 20, 30 and 40-Something Year Old Me | Ethan Banks
Your life is at least half over. Stop wasting time doing things other people think is important.
What is a Spoolbase? | enginoor
Use SSH keys with Terraform on Azure · Development and DevOps
Encrypting Login Credentials in Ansible Vault | Dan Tehranian's Blog
Managing Secrets with Ansible Vault – The Missing Guide (Part 1 of 2) | Dan Tehranian's Blog
Amazon EFS benchmarks | /contrib/famzah
A Cognitive Skills Assessment of Digital Forensic Analysts – My Doctoral Dissertation | Chris Sanders
From "War Games" to Network Policies
eBPF - The Future of Networking & Security
Debugging and Monitoring DNS issues in Kubernetes
Announcing Hubble - Network, Service & Security Observability for Kubernetes
Analyzing the CNI performance benchmark
Ramdisks: Why You Might Enjoy One, Plus a Performance Puzzler - LowEndBox
Stay Positive - VMware Security Blog - VMware
Why Vulnerability Management is Key to Your Container Security Strategy - VMware Security Blog - VMware
These challenges with container security include: A growth in attack surface: It is no secret that there has been an extreme rise in the use of containers in recent years. As with any newer technology, security is often playing catch up to the creative ways attackers exploit containers. Ephemeral nature of containers: Not only are containers themselves growing rapidly, but their average lifetime is less than 5 minutes. Development teams are constantly spinning up new containers and releasing them more frequently. This results in more entry points for attackers than ever before. The use of third-party image registries: Third-party image registries provide many advantages and benefits for developers. As a result, attackers are finding ways to insert malicious code into the images of these registries
How to hunt for Spring4Shell and Java Spring Vulnerabilities - VMware Security Blog - VMware
It’s Time for CISOs to Decipher the Threat Actor Strategy - VMware Security Blog - VMware
Creating Better Employee Experiences and Opportunities for Innovation | APMdigest - Application Performance Management
Backdoor Roth IRA Contribution 2022: Tips and Vanguard Example Screenshots — My Money Blog
How does data backup work? All you need to know to keep your data safe and sound - ITSMDaily.com
Shell One-liners and Quick and Dirty Loops | hobo.house
How to Make Aubergine Risotto | hobo.house
How to Make Aubergine Risotto | hobo.house
Quick and Dirty Remote Execution with Ansible | hobo.house
Vegetarian Zucchini Pasta | hobo.house
Hitting the Books: Raytheon, Yahoo Finance and the world's first 'cybersmear' lawsuit | Engadget
ServiceNow Secures US DOD Impact Level-5 Provisional Authorization | APMdigest - Application Performance Management
ServiceNow announced that the ServiceNow National Security Cloud (NSC) offering obtained a US Department of Defense (DOD) Impact Level 5 (IL5) Provisional Authorization.
Microsoft Cloud Adoption Framework for Azure | Microsoft Azure
StarWind Virtual Tape Library (VTL) - Another layer of protection against Ransomware - ESX Virtualization
OCI as attestations storage for your packages - Marco Franssen
Getting started with AWS from an Azure perspective | Jan Egil Ring powershell.no
IT Stuff I Learned Today: I'm Back, with my Master Inventory Database methodology
IT Stuff I Learned Today: Gathering Important NTP Settings with Powershell
A Visual Journey Through The History Of Computing - krypted
AWS EC2 vs Azure | Cloud Services Comparison | ServerWatch
Russia's invasion of Ukraine has destroyed a historic computer museum | Engadget
Your pocket-sized cloud with a Raspberry Pi
DaaS Planning: Choosing the Right Delivery Model - Ask the Architect
Defending Against Destructive Attacks Targeting Energy and Utilities - VMware Security Blog - VMware
How to Backup and Restore Websites and IIS configuration? | Windows OS Hub
Cloudflare CDN Reference Architecture | HumairAhmed.com
Powershell tips n’ tricks Pt2 – HTML – Luka Gros
Powershell tips n’ tricks Pt1 – Luka Gros
K3s single-node cluster for noobs | Logan Marchione
Check if Group Policy is Out of Date with PowerShell |
Extraordinary benefits of using pi-hole on your network
pfsense, suricata and RAM disk
Tweaks for NGINX web server
add_header X-Frame-Options SAMEORIGIN; add_header X-Content-Type-Options nosniff; add_header Strict-Transport-Security "max-age=31536000; includeSubDomains"; add_header Content-Security-Policy "child-src 'self'"; add_header Referrer-Policy same-origin; add_header Feature-Policy "vibrate 'self'; sync-xhr 'self' https://boratory.net";
Painless Removable Media Backups...to the Cloud! - LowEndBox
Ransomware Detection | How to Detect Ransomware Attacks
Here are some methods of detecting ransomware attacks. Use of privileged access management (PAM): PAM allows organizations to control, monitor, secure, and audit privileged identities and activities in an enterprise IT environment. Isolate data: Isolation helps protect sensitive data. By isolating data via backups, you both protect your files and make it easier to detect strange network traffic that wouldn’t normally be directed towards the isolated data. Make use of zero trust: Having zero trust policies in place makes it more difficult for hackers to escalate privileges that let them manipulate your network undetected. Adaptive monitoring: By carrying out threat hunting, you assume your network has already been compromised and try to seek out and eliminate any present threats. Use a cloud access security broker (CASB): CASBs allow organizations to set policies, manage risks, and monitor actions on their networks. This tool secures a full suite of cloud applications. Sandbox testing: When working with new or unrecognized files, it is useful to test them out in a sandbox environment first before they are exposed to your network. This can prevent threats from harming your broader network. Here are some ways to prevent ransomware that can be put into place even before the detection stage. Keep software packages up to date: Updated software packages usually include fixes to the very security vulnerabilities that leave your company open to attack. Implement measures in a user-friendly manner: If employees have to work too hard to follow security policies, the chances of them bypassing these measures increase. Use multi-factor authentication (MFA): MFA helps to reduce the chances of there being unauthorized access to a company’s network, ensuring network access is only gained through the provision of at least two pieces of information. Typically, one of these is a password and the other is a one-time authorization code. Educate employees on the importance of following security guidelines: By making sure staff is aware of the risks, they are more likely to follow security measures and stay vigilant for anomalies while using your network. Implement an email spam filter: Many ransomware attacks begin with a malicious email. However, an effective spam filter can greatly reduce the risk of getting attacked by ransomware. Backup critical data offline: Backing up in the cloud is convenient. However, having an isolated offline backup is a great way of ensuring potential ransomware attackers are unable to compromise your data. Restrict and secure personal devices: Personal devices have the potential to easily introduce threats to a network. They may not be subjected to the same careful scrutiny that office devices are, which can give attackers an easy pathway into your network.
AZ-800 Exam Study Guide Administering Windows Server Hybrid Core Infrastructure - Thomas Maurer
Learn More About ipv6 with Hurricane Electric's Free Certification Program - LowEndBox
VMconf 22: Blindspots in the Knowledge Bases of Vulnerability Scanners | Alexander V. Leonov
Yes, you can measure cybersecurity efficacy | CSO Online
“We show that knowledge-based challenges prevent as few as 10% of hijacking attempts rooted in phishing and 73% of automated hijacking attempts. Device-based challenges provide the best protection, blocking over 94% of hijacking attempts rooted in phishing and 100% of automated hijacking attempts.”
Product Update: Release 4.1
Cybersecurity researchers trace Lapsus$ attacks to a teenager from England | Engadget
Doc Searls Weblog · The frog of war
Deploy Elasticsearch and Kibana on Kubernetes with Helm | Lisenet.com :: Linux | Security | Networking
Upgrading Homelab Kubernetes Cluster from 1.22 to 1.23 | Lisenet.com :: Linux | Security | Networking
Book Review: Container Security – Adventures in the programming jungle
7 ways to build slimmer/lighter (Linux) containers – Adventures in the programming jungle
1. Use the lighter base image as possible 2. Use multi-stage build 3. Deactivate the package manager cache 4. Minimize the number of RUN, COPY, ADD instructions 5. Use the squash flag of docker/podman build 6. Use .dockerignore to filter the content of Docker build context 7. Use external tools
Building Qemu KVM Images with Packer | Lisenet.com :: Linux | Security | Networking
Best Microsoft Azure Certifications 2022 | ServerWatch
Law enforcement pressure forces ransomware groups to refine tactics in Q4 2021
Get Started With Monitoring in this Grafana Tutorial
An Important Elevation of Privilege Vulnerability was addressed in the Veeam Agent for Microsoft Windows - The things that are better left unspoken
Veeam addressed three remote code execution vulnerabilities in Veeam Backup & Replication (CVE-2022-26500, CVE-2022-26501, CVE-2022-26504) - The things that are better left unspoken
20 Things You Forgot About Giving Speeches In Person | The Notes Guy in Seattle
Fast recap: Always shake hands before leaving the stage Take your name tag off before going on stage Pause before you start speaking Get familiar with how the timing works Be prepared to take notes Stand up Use your whole body and dress appropriately from head to toe Use the whole stage As you use the stage, time should flow from Audience’s Left to Right Take advantage of Positional Reference Make eye contact naturally, deliberately, equally Front/back/left/right Hold eye contact for one sentence with any one person Don’t look at the ground Don’t turn your back There’s no screen to hide or share and no virtual backgrounds Project your voice so the person at the back can hear you without straining Take advantage of the dynamic possibilities of live voice Talk to the audience, not the PPT There is no forgetting to unmute the mic Know your speech. Applaud loudly!
CISA Tabletop Exercises Packages | CISA
Capture and Restore Active Power Configuration |
I wrote this script to run during an operating system upgrade, you can capture the current Power Config and store it to the system drive. # Capture Active Power Scheme GUID $currentPowerSettings = POWERCFG /GETACTIVESCHEME # Sanitize the variable to just the GUID $currentPowerSettings = $currentPowerSettings -replace "Power Scheme GUID: ","" $currentPowerSettings = $currentPowerSettings -replace " (.*)","" # Write GUID of Saved Power Config to File for Restore Script Set-Content -Path $env:SystemDrive\$env:COMPUTERNAME.PowerGUID.txt $currentPowerSettings # Export to the root of the System Drive with the active GUID. Start-Process "POWERCFG" -ArgumentList "/EXPORT $env:SystemDrive\$env:COMPUTERNAME.pow $currentPowerSettings" -Wait -WindowStyle Hidden Then after the system has upgraded, you can run the following command to restore the Power Config. # Retrieve saved GUID of Power Config $powerGUID = Get-Content "$env:SystemDrive\$env:COMPUTERNAME.PowerGUID.txt" # Import and Set the Power Config to Active Start-Process "POWERCFG" -ArgumentList "/IMPORT $env:SystemDrive\$env:COMPUTERNAME.pow" -Wait -WindowStyle Hidden Start-Process "POWERCFG" -ArgumentList "/SETACTIVE $powerGUID" -Wait -WindowStyle Hidden # Cleanup Power Config Remove-Item "$env:SystemDrive\$env:COMPUTERNAME.pow" -Force Remove-Item "$env:SystemDrive\$env:COMPUTERNAME.PowerGUID.txt" -Force
Asking the Oracle, "Is 'Always Free' the future of the Low End?" - LowEndBox
Getting Big Things Done - Marc's Blog
A Plea for Clarity in IT Writing | APMdigest - Application Performance Management
Incident Response Isn't Enough - Marc's Blog
Focus on the Good Parts - Marc's Blog
Reading Research: A Guide for Software Engineers - Marc's Blog
The Essential Barbara Liskov - Marc's Blog
Using VMware vSphere Update Manager with PowerCLI | 4sysops
1U Raspberry Pi Rack Mount Bracket – CubicleNate's Techpad
Security ratchet
Matt Ventura's blog » Blog Archive » Goodisory SR01: Almost-Perfect Router Case
Goodisory SR01
Run a UNIX command for a limited amount of time | ma.ttwagner.com
Force Replication of all Domain Controllers on all Sites – Mohammed Wasay
function Replicate-AllDomainControllers { (Get-ADDomainController -Filter *).Name | Foreach-Object {repadmin /syncall $_ (Get-ADDomain).DistinguishedName /e /A | Out-Null}; Start-Sleep 10; Get-ADReplicationPartnerMetadata -Target "$env:userdnsdomain" -Scope Domain | Select-Object Server, LastReplicationSuccess } Replicate-AllDomainControllers
ESXi Host Patching with PowerShell & Update Manager – Euro * Brew
IDC FutureScape: Top 10 Predictions for the Future of Digital Infrastructure | APMdigest - Application Performance Management
The top 10 predictions from the Worldwide Future of Digital Infrastructure 2022 report are: Prediction 1 By 2023, G2000 leaders will prioritize business objectives over infrastructure choice, deploying 50% of new strategic workloads using vendor-specific APIs that add value but reduce workload portability. Prediction 2 In 2023, over 80% of the G2000 will cite business resiliency to drive verifiable infrastructure supply chain integrity as a mandatory and non-negotiable vendor evaluation criterion. Prediction 3 By 2023, most C-suite leaders will implement business critical KPIs tied to data availability, recovery, and stewardship as rising levels of cyber-attacks expose the scale of data at risk. Prediction 4 By 2024, 75% of G2000 digital infrastructure RFPs will require vendors to prove progress on ESG/Sustainability initiatives with data, as CIOs rely on infrastructure vendors to help meet ESG goals. Prediction 5 By 2024, due to an explosion of edge data, 65% of the G2000 will embed edge-first data stewardship, security, and network practices into data protection plans to integrate edge data into relevant processes. Prediction 6 By 2025, a 6x explosion in high dependency workloads leads to 65% of G2000 firms using consistent architectural governance frameworks to ensure compliance reporting and audit of their infrastructure. Prediction 7 By 2025, 60% of enterprises will fund LOB and IT projects through OPEX budgets, matching how vendors provide their services with a focus on outcomes that are determined by SLAs and KPIs. Prediction 8 By 2025, 70% of companies will invest in alternative computing technologies to drive business differentiation by compressing time to value of insights from complex data sets. Prediction 9 By 2026, 90% of G2000 CIOs will use AIOps solutions to drive automated remediation and workload placement decisions that include cost and performance metrics, improving resiliency and agility. Prediction 10 By 2026, mid-market companies will shift 65% of infrastructure spending from traditional channels towards more app-centric trusted advisors.
iPod 5th gen SSD upgrade - My Wired House
Setting up a Used Tyan S7012 - My Wired House
Group policies update/refresh without gpupdate.exe | >_
Get-ScheduledTask -TaskPath '\Microsoft\Windows\GroupPolicy\' | Where-Object { $_.Actions.Arguments -match 'computer' } | Start-ScheduledTask
Get CISA vulnerabilities report | >_
Vertical Pod Autoscaling: The Definitive Guide - Povilas Versockas
Kubernetes Node Local DNS Cache - Povilas Versockas
Reliably rebooting Ubuntu using watchdogs - Philipp's Tech Blog
Using Let's Encrypt for internal servers - Philipp's Tech Blog
Can I Upgrade Veeam 10 to Veeam 11? | PeteNetLive
PowerCLI to list Template Info - Notes of a scripter
Ssh automate with public keys - Notes
1.Gen key on local box ssh-keygen -t rsa -C “youremail@example.com” 2.On the server create a user adduser newuser cd ~ mkdir .ssh chmod 700 .ssh touch .ssh/authorized_keys chmod 600 .ssh/authorized_keys vim .ssh/authorized_keys Add contents of id_rsa.pub in this file and save it 3.Run ssh-agent on local box eval `ssh-agent -s` ssh-add ~/.ssh/id_rsa 4.On localbox execute ssh user@servername
Shell file - create a timestamped name for a log... - Notes
NOW=$(date +“%F-%T”) MYFILE=$NOW’.txt’
VPS disk performance, Digital Ocean vs Linode part II
VMWare ESXi: Errno 28 — No space left on device | Windows OS Hub
How to Automatically Fill the Computer Description in Active Directory? | Windows OS Hub
Click the Show Files button and create a FillCompDesc.ps1 file with the following code: # write information about the computer hardware/model in the Description field in Active Directory $computer = $env:COMPUTERNAME $computerinfo= Get-WMIObject Win32_ComputerSystemProduct $Vendor = $computerinfo.vendor $Model = $computerinfo.Name $SerialNumber = $computerinfo.identifyingNumber $DNSDOMAIN= (Get-WmiObject -Namespace root\cimv2 -Class Win32_ComputerSystem).Domain $ComputerSearcher = New-Object DirectoryServices.DirectorySearcher $ComputerSearcher.SearchRoot = "LDAP://$("DC=$(($DNSDOMAIN).Replace(".",",DC="))")" $ComputerSearcher.Filter = "(&(objectCategory=Computer)(CN=$Computer))" $computerObj = [ADSI]$ComputerSearcher.FindOne().Path $computerObj.Put( "Description", "$vendor|$Model|$SerialNumber" ) $computerObj.SetInfo()
Enable SMB Compression for Fast File Transfers on Windows 11/ Windows Server 2022 | Windows OS Hub
What is SSPI – Security Support Provider Interface? | Electric Monk
GitHub - dvdstore/ds3: DVD Store version 3
Kali: Essential terminal commands | Networknet.nl
readlink -f xxd <filename> | head
Effective Open vSwitch Benchmarking Using the Open Source MoonGen Traffic Generator - Netronome
Freelancers Are 50% Better at This One Skill Than Full-Time Employees | The Motley Fool
people who are freelance workers, people who are self, that are basically consulting and working on a temporary basis with companies, actually upskill themselves 50% more than full-time employees.
Creating a DICOM Router in 15 minutes using Mirth Platform | Rady's Inspirations
New – Customer Carbon Footprint Tool | AWS News Blog
Zero Trust: Encrypt all communication - Ask the Architect
Zero Trust Network Access (ZTNA) solution
Notes on Berkshire Hathaway 2021 Annual Letter to Shareholders by Warren Buffett — My Money Blog
Operating System Containers vs. Application Containers - RisingStack Engineering
Does a Container Image Have an OS Inside
Cyberattack forces Toyota to suspend vehicle production in Japan | Engadget
Ethernet co-inventor David Boggs dies at 71 | Engadget
How to Use Debug Module in Ansible Playbook
Stop Using Production Data For Development - Thomas LaRock
My Fourth Year as a Bootstrapped Founder · mtlynch.io
Backup Azure Firewall with virtual wan #Azure #SDWAN #Backup #Runbook – Robert Smit MVP Blog
The Top Technical Skills You Need to Be an SRE in 2022 | DEVOPSdigest
""There are two: firstly, being able to instrument and teach others to instrument observability into digital products and services along with the ability to leverage multiple monitoring streams to discover problems and reduce MTTR quickly. Second, being able to automate onerous and wasteful tasks out of the value stream's processes."" "It may not be a technical skill per se, as I'd say it's a shift in how we look at software development where we no longer pass our work to the production environment and let somebody else maintain it. The shift encompasses looking at software development as a one-off fire-and-forget type of work to continuous work on one service or product where people who develop a product also need to think about how THEY will maintain the product or service at hand. It is a different paradigm in my opinion." "An SRE understands the entire process, from idea to delivery, and can work at any stage. They also support the culture through learning, and leading teams to find their own problems early. " "Site reliability engineer (SRE) is someone who is constantly analyzing every change for its risk and what its impact could be down the road, not just today. " ""There isn't just one technology/tool that SRE needs to know to perform his responsibilities properly. He needs to be proficient in one or more areas mentioned below: a. Utility development: SREs are responsible for development's utilities. Hence they need to know at least one programming language. Automation testing is also a part of it. b. Infrastructure: Varied tools in DevOps area, e.g., GitHub, API gateway, CI/CD tools c. Security: security-related tools. d. APM: Application performance management process tools."" "While there are a number of technical skills that are needed to be developed for a site reliability engineer, I would insist on picking up the aspect of knowing about Containers and Microservices that would be more impactful to organizations."
How to Upgrade VM Hardware Version in VMware ESXi? | Windows OS Hub
Charlie Munger Daily Journal Annual Meeting 2022 Full Video, Full Transcript, and Highlights — My Money Blog
What's the Great Upgrade and How Could It Affect Your Company? – Ideas
Detecting Log4Shell with Wazuh - Unix / Linux the admins Tutorials
Biden Signs Memo on Cybersecurity - Lawfare
Ask the Readers: Resources for Writing a Will?
University of the People: Tuition-Free, Accredited Online Degrees in Computer Science, Business Administration (MBA), Education (M.Ed.) — My Money Blog
The Four Core Types of Regrets + Thoughts on Financial Regrets — My Money Blog
In the book, Pink identifies these four core types of regret: Foundation regrets involves an irresponsible choice that changed the course of your life. This includes not saving enough money for retirement, not taking care of your health by eating well and exercising, or not putting in proper effort at school or work. Boldness regrets come from being too cautious, and not taking certain risks. This includes staying in a “safe” job instead of going for a career changes more suited to you, or not asking out someone you liked on a date. Moral regrets are when you don’t live up to your own values. You cheated, bullied, lost your temper, or didn’t stand up for something. Connection regrets deal with lost relationships with family members, friends or colleagues. Too often, this happens due to neglect and passivity.
8 Cybersecurity Tips to Stay Protected in 2022
Use Strong Passwords and a Password Manager Use Two-Factor Authentication (2FA) Double-Check That Link Before You Click Use a VPN When On Public Wi-Fi Keeps Apps and Devices Up-to-Date Don’t Jailbreak Your iPhone Don’t Store Sensitive Info on Your Phone (and Always Use a Passcode Lock) Use Privacy-Focused Apps
PowerShell - How to Copy a File if it Exists - buildVirtual
What is ZTNA? Start at the Beginning with Zero Trust - Ask the Architect
here are 7 principles of Zero Trust. Everything is considered a resource: Within my house, I applied these principles to food, water, toilets, beds, computers, TV, people… All communication must be encrypted: Everything we say must be in code. Unfortunately, Alexa no longer understands me and I feel like an idiot talking to my toilet. No one is trusted: Let’s just say that dinner time has become a tense situation. Access to resources are enforced with dynamic identification policies: Based on the situation, how you prove your identity changes. My family was outside in -20F temp. Let’s just say they were not happy while I made them each prove their identity (I had to sleep on the couch that night). Access to resources are on a per session basis: You want access to the bathroom… Granted. You want access to the toilet… Denied (I decided it is now safer to sleep in my car) Access to resources is enforced with dynamic policies: Certain people are unable to get access to WiFi resources afterhours or if they haven’t earned it. (They were unable to get access to Disney+ when the next episode of Boba Fett came out. My key to the front door no longer works) Actions are monitored: I set up cameras throughout the house to monitor activity. (I tell you, these cameras I bought are JUNK. Every single one broke on the first day. I need to leave a bad review on Amazon. Too bad I can’t get onto WiFi anymore)
Windows Server Windows Update using CLI (Command Prompt) and "sconfig" - The Tech Journal
11 'Avconv' Commands to Record, Convert and Extract Videos & Audios from Linux Terminal
Securing Kubernetes at the Infrastructure Level - Container Journal
Bottlerocket
5 Ways to Improve Linux User Account Security
1. Restrict Root Account Access 2. Set Expiration Dates on Accounts 3. Improve Account Password Security 4. Remove Unused User Accounts 5. Restrict Remote Access to a Specific User Group
Understanding TCP/IP Port Numbers | Alexander's Blog
7 Best Free and Open Source Status Page Systems - LinuxLinks
Ransomware as a Service Innovation Trends to Watch
How to use Azure proximity placement groups #Azure #SAP #Latency – Robert Smit MVP Blog
Big List of Social Security Tools: Best Time to Start Claiming Social Security Benefits? — My Money Blog
Ansible Reboot Plugin for Linux - Sam Doran
Performance Tuning Ansible Playbooks - Sam Doran
Grafana Weather Dashboard using InfluxDB and an ESP32 - In-Depth Tutorial - The DIY Life
Why you want labels for software, just like for food | Stop at Zona-M
5 ways to make your Ansible modules work faster | Enable Sysadmin
dnstop - Monitor and display DNS server traffic on your network - nixCraft
CERIAS Expert Explains the Effect of the Log4J Vulnerability - CERIAS - Purdue University
Santiago Torres-Arias
Switching from OpenNTPd to Chrony - anarcat
Allowing 'root cause analysis' - SysAdmin1138 Explains
Deploying HP BIOS Updates – a real world example
Web UI Testing Made Easy with Zalenium
DNF Guide For Beginners With 20 Examples | LinuxTeck
CVE-2021-4034, polkit, and VMware - VMware Security Blog - VMware
VMware ESXi 7.0 Update 3c’s cURL version is vulnerable - The things that are better left unspoken
Erman Arslan's Oracle Blog: Database-- Redo Transport Compression Custom Method
Backup And Restore Application Settings With Mackup In Linux - OSTechNix
How to Use the Terraform Command Line Interface (CLI) on Ubuntu
12 Best Practices for Writing Bash Scripts
Commenting Working With Functions Reference Variables With Double Quotes Terminating Script On Error Terminating Script On Undeclared Variable Uses Declaring Variables Use Curly Braces Command Substitution Variables Naming Convention Declare Static Variables Comparing Strings Script Debugging
How to Check Docker Logs [Stored or Real Time]
How to use LUKS with a detached header - Linux Tutorials - Learn Linux Configuration
Moxie Marlinspike >> Blog >> My first impressions of web3
WebAuthn – the future of strong user authentication – Mikail's Blog
Use PowerShell to Edit a CSV, Revisited - tommymaynard.com
I am TechNet Gallery Years Old, Part III - tommymaynard.com
I am TechNet Gallery Years Old, Part II - tommymaynard.com
I am TechNet Gallery Years Old - tommymaynard.com
Google Online Security Blog: ClusterFuzzLite: Continuous fuzzing for all
Resolving a sector offset to a logical volume – The ongoing struggle
Why I Achieved an MBA From WGU | neckercube.com: Jedadiah Casey
In either case, the individual’s culmination of experience and dedication makes them excel in their field, not a piece of paper.
The Process Will Save You | The Networking Nerd
ITIL didn’t really become a popular thing until after I left IBM but I’m sure if I were still there I’d be up to my eyeballs in it right now. Because ITIL was designed to keep keyboard cowboys like me from doing things we really shouldn’t be doing. Change management process are designed to save us at every step of the way and make us catch our errors before they become outages. The process doesn’t exist to make our lives problematic. That’s like saying a seat belt in a car only exists to get in my way. It may be a pain when you’re dealing with it regularly but when you need it you’re going to wish you’d been using it the whole time. Trust in the process and you will be saved.
Live or Dynamic Dashboard & Charts in SQL Developer Web
Oracle SQLcl: All the pretty colors for your console.
Getting Started With Threat-Informed Security Programs
Are SSH Keys Passwords? Yes, Here’s Why | Teleport
The Log4j Flaw Will Take Years to be Fully Addressed
Log4j: A CISO's Practical Advice
1. Lead with empathy and reach out to your security circles. 2. Get the clearest possible understanding of what's happening in your environment. 3. Identify your true partners and make changes to those you do business with. 4. Share threat intelligence data without marketing in mind.
Preemptive Strategies to Stop Log4j and Its Variants
Tip 1: Build automation into your cloud security processes. Tip 2: Remove as much human intervention as possible. Tip 3: Take a zero-trust approach to security. Tip 4: Assume nothing!
New Log4j Attack Vector Discovered
How Risky Is the Log4J Vulnerability?
Timely Questions for Log4j Response Now — And for the Future
If your organization is currently using SBOMs to help prioritize Log4j response, consider the following time-sensitive questions: Given that we know SBOMs will take a while to catch on with vendors, how are you balancing risks of missing key vulnerable assets early when directing limited staff? What is your plan for finding vulnerable applications that either lack SBOMs or have inaccurate SBOMs? If all SBOMs were perfect, what else about your process that's under your control would you improve after this Log4j response? For your after-event lessons-learned debriefs, how will you address your vendors who didn't have an SBOM and didn’t proactively communicate their Log4j status to you but were found to be vulnerable in testing? Do you have a way to flag every product in your environment that lacks an SBOM? What mechanism do you have to ensure parallel testing in future events like this? Are you benchmarking your response capabilities? Some elements to measure include: Speed: Were all your organization's assets checked and fixed, or verified as unaffected? Efficiency: Were the vulnerable assets of highest organizational value addressed first? Information sources: What was your rate of using SBOMs to prioritize your remediation efforts versus other sources of timely information — e.g., the Internet or your vendors telling you, or your own testing?
Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft
Analysis: Log4j Vulnerability Highlights the Value of Defense-in-Depth, Accurate Inventory
Attackers Target Log4j to Drop Ransomware, Web Shells, Backdoors
40% of Corporate Networks Targeted by Attackers Seeking to Exploit Log4j
How Sun Tzu's Wisdom Can Rewrite the Rules of Cybersecurity
The simplest way to avoid an attack is to minimize the attack surface. To accomplish this, you need to: Eliminate your external attack surface by migrating to cloud-delivered zero-trust access with an outbound-only access model. Reduce internal attack surface by leveraging zero-trust user-to-app segmentation for private apps. Minimize individual endpoint attack surface by protecting end-user Internet traffic. Reduce the data attack surface with software-as-a-service (SaaS) controls such as a cloud access security broker (CASB), data loss prevention (DLP), and other solutions.
Reddit’s Allison Miller builds trust through transparency | CSO Online
Kraft Heinz dishes up security transformation | CSO Online
Osmedeus Next Generation - A Workflow Engine for Offensive Security
The Proverbial HR Exit Walk – But What About the Data? | CSO Online
My top takeaways The rapid shift of vast amounts of data from inside corporate walls to home PCs, Dropbox accounts, and Google Drives over the past 15 months has magnified the problem. With record numbers of people on the lookout for new opportunities right now and statistics showing that most stay in the same industry, the risk of trade secret exposure is especially high. "All the security tools we’ve used historically were designed to block access. That flies in the face of what CIOs want to do today, which is share.” (Joe Payne, Code42 CEO) “The good news is that data exfiltration is usually unintentional. But intent matters less than outcomes.” (Paul Gillin, Technology Journalist, Computerworld)
Avery Dennison overhauls DLP program in enterprise-wide effort | CSO Online
DataSafe enlists all employees in an enterprise-wide effort to protect company data by asking them to consider the safeguards needed from the time a file is created through all its stages of use. DataSafe then combines its human resources with well-articulated controls and intelligent security software, completing the lauded people-process-technology framework for transformation.
How CISOs escape the cost center trap | CSO Online
Cultivate allies in the business Accentuate the positive Quantify the value security delivers Make security a differentiator
California state CISO: the goal is “operating as a whole government” | CSO Online
Four Tips To Build Security Into Your Accidental Multi-cloud | CSO Online
1. Approach multi-cloud, every cloud, in a holistic manner when it comes to security. Cloud ultimately is about delivering business results via application lifecycles. Security needs to follow the applications everywhere they go and where they reside. 2. Leverage a platform, fabric, or mesh approach to security. The building blocks of a successful platform security infrastructure include: complete visibility into the network and entire infrastructure. knowledge, gained by the use artificial intelligence (AI) and automation tools to gather, analyze, correlate, and make sense of all data. control, which requires distributing policies, federating enforcement, and taking action whenever and wherever needed to minimize the impact of a threat. Consistency and visibility matter most when it comes to cloud security. 3. Understand that the cloud is fluid and expansive, and choose solutions that enable flexibility to meet those needs, especially those integrated with a broad ecosystem of technologies. 4. Choose solutions that work well together. A critical need for most organizations to successfully drive digital innovations into and across clouds is to leverage a comprehensive cybersecurity platform.
5 IT risk assessment frameworks compared | CSO Online
The seven RMF steps are: Prepare, including essential activities to prepare the organization to manage security and privacy risks. Categorize, which involves sorting systems and information that’s processed, stored, and transmitted based on an impact analysis. Select, which is selecting the set of NIST SP 800-53 controls to protect systems based on risk assessment; Implement, deploying the controls and documenting how they are deployed. Assess, to determine if the controls are in place, operating as intended, and producing the desired results. Authorize, where a senior executive makes a risk-based decision to authorize the system to operate. Monitor, which involves continuously monitoring control implementation and risks to systems.
4 tools to prevent leaks in public code repositories | CSO Online
Gitleaks GittyLeaks SpectralOps GitGuardian
Helping Healthcare Win Its Other Big Battle: Cyberattacks | CSO Online
This far-from-exhaustive list illuminates the range of data needed to create continuous care and reduce the potential size of a healthcare organization’s threat surface area. Electronic health records (EHRs) — Digital medical charts, medical history, lab and test results, and other data Patient or disease registries — Databases containing the clinical outcomes for patients who share a specific diagnosis or condition Claims data — Billing codes data submitted by healthcare providers to insurance companies Health surveys — Data collected by public health organizations to assess public health risks and that inform public health policy and practice Picture archiving and communication system (PACS) — Data generated by a medical imaging device (such as a CT or MRI scan) that is archived for access by physicians, researchers, or other authorized medical staff Clinical trial data — Data on the results of clinical studies, private or public, used in the development of medical devices, pharmaceuticals, and other innovations
6 security analyst certifications to advance your career | CSO Online
Security+ CySA+ Certified Ethical Hacker (CEH) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP)
How Learning Linux Will Improve Your Software Testing
Security analyst resume: 8 tips to help you stand out | CSO Online
Focus on processes over tools Estimate the percent of time spent on key tasks Hands-on experience is a must Aim for the cloud Don’t overlook volunteer activities Consider including salary, visa, and location requirements List the certifications and skills you’re pursuing, not just the ones you have Prioritize experience over education credentials
What CISOs can learn from the US Navy insider who stole nuclear secrets | CSO Online
ITFlow
MSP
China's Personal Information Protection Law (PIPL) presents challenges for CISOs | CSO Online
The four stated objectives of the PIPL are: Protect the rights and interests of individuals Regulate personal information processing activities Safeguard the lawful and "orderly flow" of data Facilitate reasonable use of personal information
13 traits of a security-conscious board of directors | CSO Online
1. Does the board have at least one security expert? 2. Does the board ask good questions? 3. Does the board’s chain of command and reporting structure put the CISO in a position of authority? 4. Does the board conduct regular and detailed risk assessments? 5. Does the board have security-focused subcommittees? 6. Does the board meet regularly with the CISO? 7. Are the IT budgets and cybersecurity budgets presented to the board together? 8. Does the board integrate security concerns into all its discussion? 9. Does the board receive security training? 10. Does the board practice sound cybersecurity hygiene in its own communications? 11. Does the board use benchmarks to measure security preparedness? 12. Does the board make a determined effort to drive security culture throughout the company? 13. Does the board create a climate of open, honest information sharing?
Best practices for building images that pass Red Hat Container Certification | Red Hat Developer
Linux and Cloud Native Security: Red Hat’s Perspective – The New Stack
jmtd → log → Frictionless external backups with systemd
A security practitioner's take on CISA’s Incident and Vulnerability Response Playbooks | CSO Online
Preparation Detection and analysis Containment Eradication and recovery Post-incident activity Coordination While the IR playbook’s preparation phase directs agencies to align with Sec. 8 of the EO, it doesn’t go into enough detail regarding third-party service providers and partners that make up the broader ecosystem and supply chain. The reality is that today’s FECB as well as commercial organizations are using tens to hundreds of external service providers, especially when you account for cloud, particularly software as a service (SaaS). These external service providers often support critical business functions and store sensitive data, and logging from these sources is required to perform comprehensive IR activities. - Kronos highlights this.
NIST gears up for software security and IoT labeling pilot programs | CSO Online
Descriptive attestations that identify who is making claims about information within the label, what the label applies to, when the attestations were made, and how a consumer can obtain other supporting information required by the label Secure software development attestations, which in essence contain information on the recommended secure software development practices that were employed Critical cybersecurity attributes and capability attestations that describe features expressed by the software resulting from implementing a secure software development process Data inventory and protection attestations that highlight how data are stored, processed, or transmitted by the software
Container Security: Definition, Best Practices, and Examples | CSO Online
cloud workload protection platforms (CWPP) tools are favored for their ability to secure workloads across container-based platforms and cloud environments in a consistent manner, reducing the complexity of container security. They check for vulnerabilities in static code, perform system hardening, and identify workload misconfiguration, all of which can help to reduce security risk. However CWPP tools can be challenging to configure, especially in ephemeral environments. They only provide security at a workload level, not at the data or application layer. Many organizations prefer this option to CWPP tools as NDR offers many of the same benefits plus enhanced visibility, threat detection, and response across cloud workloads. NDR also offers container runtime security and application layer visibility.
Log4j Vulnerabilities : My Random Thoughts
Managing Ansible with AWX - Part I - Installation on Minikube - Blog dbi services
Log4j mitigation advice for Microsoft security and IT admins | CSO Online
Improving Software Supply Chain Security with DevSecOps | CSO Online
A secure software supply chain can provide needed guardrails that accelerate and enforce the right behaviors in key areas: Security: Applications have defenses to protect them from malicious actors. Compliance: Applications adhere to required controls. Privacy: Applications protect sensitive information that should not be shared. Transparency: Applications produce metadata—for example, about health and security posture—so that software behavior is observable and verifiable.
Install Security Patches or Updates Automatically on Rocky or AlmaLinux 8
How to Create & Manage SSH Keys on Linux Machines - JumpCloud
Shaark: Keep your bookmarks and data in one place
16 Practical and Useful Examples of Echo Command in Linux
Fastly Outage Illustrates Importance of Testing in Production | APMdigest - Application Performance Management
Use Ansible tags to save time on playbook runs | Enable Sysadmin
Change management: 9 ways to build resilient teams | The Enterprisers Project
1. Understand what resilience is – and is not 2. Unpack the impacts 3. Talk less, listen more 4. Promote psychological safety 5. Build communities and connections 6. Help others reframe 7. Protect your people 8. Model adaptability 9. Maintain these efforts long-term
Automation by the numbers: 11 stats to know | The Enterprisers Project
11 statistics on the state of automation (61 percent) of respondents said they’re worried that automation (of all types) is putting many jobs at risk in the future. X=Y - X represents “time spent on current tasks at work by humans” and Y represents “time spent on current tasks at work” by machines. Those numbers will be more or less equal in 2025 97 million vs. 85 million: estimates that 85 million jobs will be displaced as a result of that shift in the division of work, with more of it moving to machines. That said, the report also predicts the creation of around 97 million new roles as a result of the same shift toward automation. 77 percent of respondents said they’re “ready to learn new skills or completely retrain,” and 40 percent of people reported “successfully improving their digital skills” during the pandemic. Approximately one-quarter of respondents in O’Reilly’s AI Adoption in the Enterprise 2021 report indicated “mature” AI initiatives, defined in this context as having revenue-generating AI in production. 35 percent: That’s the percentage of organizations in the O’Reilly report that are actively evaluating AI, meaning they’re running a trial or proof of concept. Another 26 percent said they’re “considering” AI but haven’t started any formal work. Just 13 percent said they’re not using AI now and aren’t considering doing so in the foreseeable future. 1: The #1 challenge for these organizations is hiring: There aren’t enough people with skills in AI, machine learning, and data science.
Install Apache JMeter on Ubuntu 20.04 LTS Focal Fossa
Understanding Standard I/O on Linux
MediaMarkt hit by Hive ransomware, initial $240 million ransom
2022 Application Performance Management Predictions - Part 6 | APMdigest - Application Performance Management
2022 Application Performance Management Predictions - Part 5 | APMdigest - Application Performance Management
2022 Application Performance Management Predictions - Part 4 | APMdigest - Application Performance Management
2022 Application Performance Management Predictions - Part 3 | APMdigest - Application Performance Management
2022 Application Performance Management Predictions - Part 2 | APMdigest - Application Performance Management
2022 Application Performance Management Predictions - Part 1 | APMdigest - Application Performance Management
Troubleshooting: Group Policy (GPO) Not Being Applied to Clients | Windows OS Hub
Putting DNSSEC signers to the test: Knot vs Bind | APNIC Blog
Securing your network using Shadowserver reports | APNIC Blog
Useful Tmux Configuration Examples - DEV Community
Detection of Log4j Vulnerability | HackerTarget.com
Velociraptor & Loki - /dev/random
Portable Malware Analyzis Lab - /dev/random
ICE9 Blog: Bluetooth Recon With BlueZ
megi's PinePhone Development Log
PinePhone Speed Up Takes Soldering | Hackaday
Getting Started with Docker: Dry - interactive CLI for Docker containers - LinuxLinks
The Quickest Way to Set Up HTTPS | Nerdvana [blogs.perl.org]
Working with multiple WiFi interfaces on a Raspberry Pi | Jeff Geerling
Announcing Wyrcan
Hacking a USB battery bank to gather telemetry | Arduino Blog
How to detect Log4Shell exposure and exploitation | CSO Online
How to Create a Jenkins CI CD Pipeline
How to Perform a VMware Backup & Best Practices
Utilizing Terraform Output Variables in Infrastructure Configuration
My Seven Highlights Of 2021
Prevent Files And Folders From Accidental Deletion Or Modification In Linux - OSTechNix
8 new rules for winning the IT talent battle | The Enterprisers Project
1. Approach IT workforce development as a cross-functional undertaking with dedicated governance and leadership 2. Get better at tracking skills and roles 3. Invest in internal mobility above all else 4. Figure out how to hire ahead of demand 5. Take a multi-channel approach 6. Sustained investment bests opportunistic involvement 7. Location matters 8. Hyper-focus on measuring and improving productivity
Using your OpenPGP key on Yubikey for ssh
Hunting Bugs with Bisect
Home Assistant for a Newbie – CubicleNate's Techpad
Real Time Interactive IP LAN Monitoring with IPTraf Tool
Block SSH Server Attacks (Brute Force Attacks) Using DenyHosts
Virtual Machine Secure Boot Database Updates Made Easy with Oracle Linux
20 Years of Red Hat Product Security: From inception to customer experience (Part 1)
In 2022, security will be Linux and open-source developers job number one | ZDNet
Kubernetes infographic: usage of cloud native technology in 2021 | Ubuntu
Speedtest with InfluxDB and Grafana on Kubernetes | Lisenet.com :: Linux | Security | Networking
17 free, open-source Bullet Journal apps to boost your productivity
AMIDE: Open-source, free DICOM viewer for volumetric imaging
5 ways to automate security testing in DevSecOps
1. Code quality (SAST) 2. Web application scanning (DAST) 3. Container scanning/vulnerable dependency analysis 4. Software composition 5. Automated vulnerability scanning
Pi-Hole the Easy Way – CubicleNate's Techpad
Open-source software holds the key to solving Log4Shell-like problems - Help Net Security
There are two ways to mitigate a vulnerability like this: by patching or updating Log4j in all systems and applications where it’s deployed, or by blocking malicious requests as they enter the network, often through a reverse proxy or load balancer.
How to Monitor User Activity with psacct or acct Tools
Hitting the Books: Amiga and the birth of 256-color gaming | Engadget
GoTestWAF: Open-source project for evaluating web application security solutions - Help Net Security
GoTestWAF
Agile isn’t Transformative, it’s Doctrine – Unadulterated Nerdery
Matt Blaze: Testing Phone-Sized Faraday Bags
Digging deep for responsible aluminum - Fairphone
Azure DevOps Governance 101 – How does Identity, Billing and Service Endpoints intertwine? – Karim Vaes
Improving HammerDB Benchmark Test Results | Long White Virtual Cloudsu by
PowerCLI: List Server Serial Numbers – nerdybynature
VMSA-2021-0028 & Log4j: What You Need to Know - VMware Security Blog - VMware
Investigating CVE-2021-44228 Log4Shell Vulnerability - VMware Security Blog - VMware
Securing the Future: 7 Cybersecurity Predictions for 2022 - VMware Security Blog - VMware
The Log4j Zero Day will motivate organizations to rapidly adopt a Zero Trust approach. Supply chain attacks have just gotten started Insider threats pose a new challenge for organizations as the job market continues to shift. In 2022, accelerated delivery of the benefits of 5G infrastructure will highlight IoT security needs. Linux-based operating systems will become a key target for cybercriminals. Adversaries will move laterally and exfiltrate data from unsecure multi-cloud environments. Copycat cyberattacks on critical industries will disrupt human lives.
Protect your Kubernetes clusters against Log4shell - VMware Security Blog - VMware
Digital transformation: How agile leaders and scrum masters can catalyze change | The Enterprisers Project
They’re change agents: Agile coaches spend every waking moment figuring out how to help people make and sustain change. They read books about it and attend meetups and conferences that help them become better change agents. Team members trust them: Agile leaders have the trust of the team – perhaps the most valuable commodity during a digital transformation. Through your work with them, you can directly influence the front-line people in the transformation. They see things you cannot see: A strong agile leader provides insights from the real world. They can tell you which teams are struggling, why they’re struggling, and how to remove barriers and accelerate the change. They believe they have something to offer: Leadership positions are taken, not given. Great agile leaders are waiting for the opportunity to influence the broader organization. Invite them into the conversation and they’ll be so eager, you may need to ask them to slow down (when’s the last time you had that problem?).
Bare metal Kubernetes: The 6 things you wish you knew before 2022 | Ubuntu
1 – Kubernetes (K8s) will continue becoming the default API for infrastructure 2 – Bare metal provisioning will become a standard building block for multi node clusters at the edge 3 – Single node clusters for edge will be a thing 4 – Bare metal Kubernetes will be the default for all new 5G base stations 5 – AI/ML or VR/AR workloads will be delivered to the edge on bare metal Kubernetes 6 – Multi-tenancy at the edge will see more open source Virtual Machine (VM) based solutions
How to use Ansible Dry Run
Can you help with bulk storage firmware updates? – Technical Blog of Richard Hughes
Deploy Mycroft AI voice assistant on Raspberry Pi using Ansible | Opensource.com
Find failures with journalctl Using sort, uniq
journalctl --no-pager --since today --grep 'fail|error|fatal' --output json | jq '._EXE' | sort | uniq -c | sort --numeric --reverse --key 1
Writing and unit testing a Python application to query the RPM database | Enable Sysadmin
Tesseract 5.0 Released For This Leading Open-Source OCR Engine - Phoronix
Yubikey - PIV vs Security Key
Monica is your own personal CRM solution
Lennart Koopmann - Introducing nzyme: WiFi monitoring, intrusion detection and forensics
Lennart Koopmann - Common WiFi attacks and how to detect them
Lennart Koopmann - Regular expression (regex) performance: The fundamental guide
FreeScout is an open-source helpdesk for teams
How to achieve Rightsizing of VMs - ESX Virtualization
New – Offline Tape Migration Using AWS Snowball Edge | AWS News Blog
Amazon S3 Glacier is the Best Place to Archive Your Data – Introducing the S3 Glacier Instant Retrieval Storage Class | AWS News Blog
Use Packer to install Windows 11 and enable vTPM and VBS - ivobeerens.nl
DSCR for VMware 2.2 | Adventures in a Virtual World
SAML explained | Electric Monk
BIOS and UEFI | Electric Monk
Updating Git Project Structure - EverythingShouldBeVirtual
Manager or Leader - EverythingShouldBeVirtual
Find VM NUMA locality with PowerShell - Gabes Virtual World
New tool: Mess with DNS!
New – Sustainability Pillar for AWS Well-Architected Framework | AWS News Blog
How to Build a Hand Wired Split Ergonomic Keyboard with Per-Key RGB LEDs | dlford.io
Automation strategy: 6 key elements | The Enterprisers Project
3 benefits of a step-by-step approach to automation strategy Productive: You can generate and share results without waiting to reach some faraway “finish line.” Flexible: You can review and revise priorities as conditions change. Attainable: Your team can actually execute the strategy – a wildly underrated characteristic when setting even the most ambitious goals. 6 automation strategy essentials 1. Identify the starting point – and the criteria for ongoing priorities 2. Link automation with broader business goals 3. Create value for individuals, not just the organization 4. Acknowledge and address concerns about job impacts 5. Lay a foundation for measuring results 6. Equate automation with improvement
Understanding the Offense’s Systemwide Advantage in Cyberspace - Lawfare
Create your own animations with this open source motion graphics tool | Opensource.com
What sysadmins want to know about OpenShift and Kubernetes | Enable Sysadmin
Doc Searls Weblog · Rage in Peace
Replicating Slow Latency on Linux -- Virtualization Review
tc qdisc add dev ens192 root netem delay 200ms ## Set the delay tc -s qdisc show dev ens192 # Show the settings
DNS "propagation" is actually caches expiring
Digital Staph: Secondary Infections in Cyberspace - VMware Security Blog - VMware
DigitalStaph is an interesting thought process
Log in the Shell: An Analysis of Log4Shell Exploitation - VMware Security Blog - VMware
Performance enhancements in Red Hat Enterprise Linux 8.5
IT security: 4 issues to watch in 2022 | The Enterprisers Project
1. Double back to the basics (again) 2. You can't prioritize everything 3. Supply chain issues, meet IT security 4. It's all about the data
An elegant way to performance test microservices on Kubernetes | Red Hat Developer
Opening of email attachment led to HSE cyber attack, report finds
Inside Ireland’s Public Healthcare Ransomware Scare – Krebs on Security – Mac Pro Tricks
Doc Searls Weblog · Remembering Kim Cameron
2021-12: Testing, Kubernetes Roundtable | KWLUG - Kitchener-Waterloo Linux User Group
2021-12: Testing, Kubernetes Tools (Lens, Minikube) | KWLUG - Kitchener-Waterloo Linux User Group
SSH Key Rotation with the POSIX Shell - Sunset Nears for Elderly Keys | Linux Journal
Get All Kind of System Information in Linux Terminal With inxi - It's FOSS
What is Cloud Computing? | Basics of Cloud Computing - OSTechNix
Acra: Open-source database protection with field-level encryption and intrusion detection - Help Net Security
Kubernetes Features Explained In Detail - OSTechNix
Why We Can't Teach Cybersecurity | Tux Machines
.
Cybersecurity for Idiots - Lawfare
Secrecy Creep - Lawfare
This reply—refusing to confirm or deny the existence or nonexistence of records—has been referred to ever since as the “Glomar” response.
How to Install and Use Rdiff-backup in RHEL Systems
The Smart Hospitals of tomorrow need smarter software
By the year 2025, an ordinary person will interact at least 4,800 times a day with connected devices, and the volume of data in the world should reach 163 ZettaBytes by the year 2025, with the majority coming from IoT devices. To put that into clear, headache inducing English, a ZettaByte is a trillion gigabytes.
App note: Energy storage capacitor technology comparison and selection – Dangerous Prototypes
Veeam 321 backup rule becomes 3-2-1-1-0 Backup Rule - Check it out! - ESX Virtualization
Veeam 321 backup rule becomes 3-2-1-1-0 Backup Rule – Check it out! 3 : Keep at least 3 copies of your data 2 : Store the backups on 2 different media 1 : Keep at least 1 copy at the remote site 1 : Store at least 1 of the copies offline 0 : ZERO Errors – you should only keep backups without errors
Dell Windows drivers still vulnerable to kernel attacks | Born's Tech and Windows World
Chris's Wiki :: blog/linux/GrowingLVMRoot
The Rescue/Knife sharpener/The Wisdom Index | Cool Tools
Before making a decision, ask yourself these two questions “Will it help you do what you already want to do? Will it help you feel successful? The answers to those questions is freeing because if the change program doesn’t satisfy these two requirements, it’s not worth your time. ” Form habits through emotion, not repetition “In my own research, I found that habits can form very quickly, often in just a few days, as long as people have a strong positive emotion connected to the behavior… When I teach people about human behavior, I boil it down to three words to make the point crystal clear: emotions create habits. Not repetition. Not frequency. Not fairy dust. Emotions.”
Bermudagrass Yearly Maintenance Program | Home & Garden Information Center
GitHub - securitytrends/log4shell-validator: Visio goodness to help you quickly figure out if you're likely affected by #log4shell and if you need to upgrade to the latest version (spoiler alert - you should)
GitHub - logpresso/CVE-2021-44228-Scanner: Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
DBT Techniques to Help Your Kids at Home | Penniless Parenting
Detect and block Log4j exploitation attempts with CrowdSec - The open-source & collaborative IPS
Creating your first deployment on a Kubernetes Cluster
Pensela: The Swiss Army Knife of Screen Annotation Tools
How to use Ansible to install and configure Redis 6 on Debian 11
Open source cloud native security analyzer Terrascan embeds security into native DevOps tooling - Help Net Security
New Terrascan features The ability to identify security risks in more IaC and container definition formats Integration with all major container registries, including to identify vulnerabilities in container images referenced by IaC More flexible developer workflows, including the programmatic enforcement of security policies before changes are committed into the code repository and before they are applied to the runtime environment Improved ability to filter and prioritize findings according to user needs Deeper integration with external dashboards and reporting frameworks A new graphical user interface to simplify creation and testing of new policies
Open source cloud native security analyzer Terrascan embeds security into native DevOps tooling - Help Net Security
New Terrascan features The ability to identify security risks in more IaC and container definition formats Integration with all major container registries, including to identify vulnerabilities in container images referenced by IaC More flexible developer workflows, including the programmatic enforcement of security policies before changes are committed into the code repository and before they are applied to the runtime environment Improved ability to filter and prioritize findings according to user needs Deeper integration with external dashboards and reporting frameworks A new graphical user interface to simplify creation and testing of new policies
Protect your PHP websites with CrowdSec - The open-source & collaborative IPS
Participative IPS
XMGoat: Open-source pentesting tool for Azure - Help Net Security
Things I Found Out the Hard Way to Get the Most of the Nvidia Shield – Olivier Travers
Living and Having a Business in Amsterdam – Starting A Business
4. Learn the Culture The Dutch appreciate plain speaking above anything else, so avoid vague references while speaking. Nonetheless, there is a much more equal corporate structure in the Netherlands. Employees and managers are often given an elevated level of independence to make decisions instead of having to operate in a strictly hierarchical structure.
The value of a college degree
The bottom line? FREOPP says there are three main messages to draw from their report. First, major is the most important factor when predicting the return-on-investment for a college education. Degree subject accounts for half almost half of ROI variation alone. Second, elite colleges can pay off, but not always. FREOPP found that there is a weak correlation between the cost of a school and how much a degree from that school is worth. But, as with majors, there's plenty of variation. A film degree from Harvard is likely to be worth less than an engineering degree from a “no name” university. Finally, there are a lot of bachelor's degrees that don't make sense from a financial perspective. You might want an art degree or a religion degree for other reasons, and you might be fulfilled with those degrees, but they're poor choices when viewed through the lens of money.
How to Install ModSecurity for Nginx on Debian/Ubuntu
Server Performance Monitoring | Guide to Best Practices
Top SAST Tools 2021 | Static Application Security Testing
WhiteSource Software Perforce CyberRes SonarQube Spectral
Algorithms that detect cancer can be fooled by hacked images - The Verge
Exploiting Log4j: 40% of Corporate Networks Targeted So Far
PowerShell Get-Content a PowerShell Tail Equivalent
Texas Apple store closes due to COVID-19 outbreak | Engadget
Learning from history: How this all happened
6 Common Questions About Cybersecurity Exercises | ServerWatch
Before conducting cybersecurity exercises, your company should understand why such training is needed and how regularly it should be performed, as well as establishing standard incident response processes. When ordering cybersecurity exercises from a third party, your organization needs to convey complete information about your infrastructure to the service provider. Knowing all critical points, possible security vulnerabilities, and anticipated attack scenarios will help improve the quality of upcoming exercises. It is important to carefully consider your choice of a platform for conducting cybersecurity exercises. You must choose a service provider you can trust, understanding that this partner will adequately assess the results and formulate competent recommendations. Try to soberly assess your strengths and opportunities in terms of time and money. Start slowly, choosing a narrow area for improvement and then moving in clear and concrete steps. Learn from the experience of other industries, such as those of software development and testing. Many of your methodological may have been worked out by others. Do not forget that there is no “bad” way to develop cybersecurity skills — use all the methods available to you.
Hacking Unifi Controller Passwords for Fun and WIFI - Black Hills Information Security
QSC21, VMDR Training and Exam | Alexander V. Leonov
training
Vulristics Command Line Interface, improved Product & Vuln. Type Detections and Microsoft Patch Tuesday November 2021 | Alexander V. Leonov
3 401(k) Moves to Make ASAP in 2022 | The Motley Fool
Vanguard data, however, shows the median 401(k) match is 4% of a worker's salary.
Ransomware attackers down shift to 'Mid-Game' hunting in Q3
Terence Luk: Configuring Security Headers to secure Microsoft Active Directory Federation Services / AD FS for scoring an A on SecurityHeaders.com
he following are the configuration for headers that I’ve used in the past to score an A (these are executed on the internal AD FS server and not on the WAP): Set-AdfsResponseHeaders -SetHeaderName "Content-Security-Policy" -SetHeaderValue "default-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' " Set-AdfsResponseHeaders -SetHeaderName "Strict-Transport-Security" -SetHeaderValue " max-age=157680000; includeSubDomains" Set-AdfsResponseHeaders -SetHeaderName "X-XSS-Protection" -SetHeaderValue "1;mode=block" Set-AdfsResponseHeaders -SetHeaderName "X-Content-Type-Options" -SetHeaderValue "nosniff" Set-AdfsResponseHeaders -SetHeaderName "Referrer-Policy" -SetHeaderValue "no-referrer" Set-AdfsResponseHeaders -SetHeaderName "Permissions-Policy" -SetHeaderValue "geolocation=(),microphone=(),fullscreen=(self), vibrate=(self)" Note that X-Frame-Options is already set to DENY by the AD FS server so there is no need to configure it. Use the following cmdlet to review the settings: Get-AdfsResponseHeaders | Select-Object -ExpandProperty ResponseHeaders
Greek Spinach Rice Pilaf Recipe - Gluten Free, Vegan Option, Allergy Friendly | Penniless Parenting
Greek Spinach Rice Pilaf Recipe - Gluten Free, Vegan Option, Allergy Friendly Ingredients: 1/2 cup oil 2 large onions 3 cups packed greens, either spinach or swiss chard or sea beet (or honestly any other non bitter green would work) 1 1/2 tablesppons dry dill 1 tsp garlic powder 3 cups rice 6 cups water/broth 1 teaspoon salt or to taste 2-4 tablespoons lemon juice, or to taste Instructions: 1. Saute onions in oil until soft. 2. Chop your greens very finely. Add them to the onions. 3. Cook greens until fully wilted. 4. Add the rest of the ingredients other than lemon juice and bring to a boil. 5. Cover and simmer on low for 20 minutes. 6. Mix and add lemon juice to taste.
Greek Spinach Rice Pilaf Recipe - Gluten Free, Vegan Option, Allergy Friendly | Penniless Parenting
Greek Spinach Rice Pilaf Recipe - Gluten Free, Vegan Option, Allergy Friendly Ingredients: 1/2 cup oil 2 large onions 3 cups packed greens, either spinach or swiss chard or sea beet (or honestly any other non bitter green would work) 1 1/2 tablesppons dry dill 1 tsp garlic powder 3 cups rice 6 cups water/broth 1 teaspoon salt or to taste 2-4 tablespoons lemon juice, or to taste Instructions: 1. Saute onions in oil until soft. 2. Chop your greens very finely. Add them to the onions. 3. Cook greens until fully wilted. 4. Add the rest of the ingredients other than lemon juice and bring to a boil. 5. Cover and simmer on low for 20 minutes. 6. Mix and add lemon juice to taste.
Amazon explains outage that took out a large chunk of the internet | Engadget
Logging library for millions of apps has a serious vulnerability | Engadget
Log4Shell
How to Check Supported TLS and SSL Ciphers (version) on Linux | 2DayGeek
openssl ciphers -v | awk '{print $2}' | sort | uniq openssl ciphers -v | column -t openssl s_client -connect www.2daygeek.com:443 -tls1_2
Jack Dorsey Got Bored of Twitter Too - The Atlantic
Hitting the Books: How the interplay of science and technology brought about iPhones | Engadget
https://o.aolcdn.com/images/dims?image_uri=https%3A%2F%2Fs.yimg.com%2Fos%2Fcreatr-uploaded-images%2F2021-12%2F8d6f0e00-545d-11ec-badf-af068933054f&thumbnail=675%2C&client=49kdj93ncb8s938hkdo&signature=41f5e43322115eab5655cc0773c4d08d288e43af
USBefuddled: Untangling the Rat’s Nest of USB-C Standards and Cables - TidBITS
Deploy LXD container with terraform | panticz.de
Countering the Ransomware Threat: A Whole-of-Government Effort - Lawfare
Amazon will make its security awareness training freely available to the public.
Hitting the Books: How Amazon laundered the 'myth of the founder' into a business empire | Engadget
3 Types of Rice to Use for Risotto (and Which to Skip) | Kitchn
Java to Python: A Paradigm Shift in Automated Testing with Selenium - TechVariable
Top 5 Python Frameworks for Test Automation in 2021
5 Best OpenSSH Server Best Security Practices
1. DenyHosts 2. Fail2Ban 3. Disable Root Login 4. Display SSH Banner 5. SSH Passwordless Login
Managing the Cybersecurity Vulnerabilities of Artificial Intelligence - Lawfare
The Cyberlaw Podcast: Cyber Incident Reporting Bill: Good News for K Street - Lawfare
Five useful tools for Social Media Intelligence | Andrea Fortuna
Social Mapper Social Analyzer Sherlock Maigret SocialRecon
No future for booting ESXi from USB in VMware home labs, using max endurance microSD for ESXi 7.0U3 now, SATA/SATADOM or M.2 later | TinkerTry IT @ Home
Active Directory Certificate Services Discussion and Install Guide - The Tech Journal
vCSA Update - Backup and Restore Tips and Tricks - The Tech Journal
The SANMAN: The Evolution & Emergence of the Hybrid Cloud
The SANMAN: Answering a CIO's concerns around SDDC
Technical notes, my online memory: kubectl Kubernetes Cheat Sheet
Sysadmin Stories: Deploy VCSA Appliance with Terraform
How to move or restore a Windows 11 VM in Hyper-V with TPM enabled (Shielded VMs)
6 steps to pimp my terminal
Make PowerShell with k8s great again
Improved, Automated Vulnerability Management for Cloud Workloads with a New Amazon Inspector | AWS News Blog
Improved, Automated Vulnerability Management for Cloud Workloads with a New Amazon Inspector | AWS News Blog
AWS Cloud Adoption Framework (CAF) 3.0 is Now Available | AWS News Blog
New – Amazon EC2 R6i Memory-Optimized Instances Powered by the Latest Generation Intel Xeon Scalable Processors | AWS News Blog
Identify the boot device for a VMware ESXi host - ivobeerens.nl
Terraform and vSphere – Part 1 | Adventures in a Virtual World
The long, complicated history of lines at Disney theme parks
DIY: Light boar​​d, part 3 - proof of the pudding - robbeekmans.net
DIY: Light board, Part2 - Setup - robbeekmans.net
DIY: Light board - robbeekmans.net
Combined Pi-Hole Statistics in Home Assistant · vNinja.net
Public Policy: Strategies for Civilizing American Cyberspace | VMware Security Blog | VMware
Empowering Customers with Simpler and Faster Security | VMware Security Blog | VMware
1. The Security Risk Picture Is Out of Focus – Rather than focusing directly on a risk scenario and its impact, organizations should zoom out and think in terms of a spectrum of possible impacts. 2. Legacy Security Practices Are Slowing Things Down – All security practices should be open to challenge and, if appropriate, be thrown aside. To scale and remain agile, organizations must constantly challenge the “how” of cybersecurity, as well as the “why.” 3. Security Is Not a Solo Sport – No single group or organization can stem the tide of security threats. Put simply, we’re all in this together.
CISO Empowerment | VMware Security Blog | VMware
Here is a ten-step strategy to bolster and strengthen your position as CISO: 1. Learn the business of your organization and translate cyber risk to business risk. 2. Befriend your General Counsel and explain how cybersecurity is a “duty of loyalty”. Explain why worst case scenario has changed to the digital transformation that will be hijacked and used to attack our customers and partners. 3. Consolidate your security tools and ensure they are integrated. 4. Decrease dwell time and raise Board awareness by conducting weekly threat hunts. 5. Join the Advisory Board of your top two security vendors and influence their designs. 6. Write monthly concise reports for your Board which include imagery. 7. Bring in external cyberthreat experts to brief your Board on industry specific cyber-attack campaigns on a quarterly basis. 8. Participate in your regional cyber fraud taskforce. 9. If you don’t have the personnel or capacity to manifest your security vision, hire an MDR firm who specializes in your industry. 10. Speak at the major cybersecurity conferences and develop your personal brand.
DevSecOps: The Competitive Advantage of a Unified Team | VMware Security Blog | VMware
Only one in five developers strongly agree that they understand which security policies they are expected to comply with, while alarmingly, more than half of the developers surveyed are not involved at all in security policy decisions, despite many of these greatly impacting their roles. Organizations where security and development teams have a positive relationship can speed up the software development lifecycle by five days per release compared to those without – demonstrating how speed to market and competitive advantage are at stake here.
Moving Left of the Ransomware Boom | VMware Security Blog | VMware
How to Install and Use acme.sh script to get free SSL Certificates on Linux – VITUX
acme.sh
vCloudNotes : Let's Learn Together: Domain Trust Relationship issue on a recently migrated server
ipconfig /registerdns
AWS Certified DevOps Engineer Professional Study Guide – vcdx133.com
Best Open Source Security Tools | eSecurityPlanet
WhiteSource Revenera Synopsys
oracle/linux-blog-sample-code at linux-cheat-sheet
How to take a backup of an Elasticsearch cluster
ClamAV 0.104.1 Free Antivirus Package Updating - LinuxStoney
15 Basic 'ps' Command To Monitor Linux Process With Examples | LinuxTeck
5 Ways to Remove Background in Image Using GIMP
Upgrading Homelab Kubernetes Cluster from 1.21 to 1.22 | Lisenet.com :: Linux | Security | Networking
What Are Uchi and Soto and Why Are They So Important for Understanding Japanese?
Dependency Combobulator: Open source toolkit to combat dependency confusion attacks - Help Net Security
Combobulator
screenFetch - An Ultimate System Information Generator for Linux
Install TaskBoard with Apache and let's Encrypt SSL on Debian 11
Wazuh Blocking attacks with Active Response - Unixcop the Unix / Linux the admins deams
Introduction to Kubernetes | What is Kubernetes - OSTechNix
8 Things You’ll Notice When You Start Living Below Your Means – BeingFrugal.net
1. Sacrifice Isn’t as Painful as You Thought 2. You Didn’t Need That Item 3. Less Stress 4. More Security 5. A Healthier Bank Balance 6. Improved Opportunities 7. You’ll Become Savvier 8. Increased Self-Worth
Essential System Tools: Czkawka - data cleaner - LinuxLinks
Czkawka
ThreatMapper: Open source platform for scanning runtime environments - Help Net Security
Securing your Kubernetes cluster with Kubewarden - Octopus Deploy
Securing Your Kubernetes Cluster with Kubewarden | Linux Today
Pi-Hole Update Troubles – CubicleNate's Techpad
Raspberry Pi Unveils 'Code Club World': A Way for Kids to Learn Code at Home - FOSS Force
[Howto] Installing Cilium with Minikube on Fedora – /home/liquidat
Configuring TACACS+ Server With A Simple GUI | Linux Journal
TACACS+
The Get Rich Slowly file vault
The Best HSA Plans: Fidelity and Lively — My Money Blog
Digital Minimalism Book Review: Parallels With Time and Money Management — My Money Blog
Researchers identify 'cybermercenary' group behind dozens of hacks | Engadget
Something Awful founder Richard Kyanka dies at 45 | Engadget
US joins international cybersecurity partnership | Engadget
Cyberattacks Disable IT Networks at 2 Indiana Hospitals
From Oracle Standard Auditing to Oracle Unified Auditing - Blog dbi services
DistroWatch.com: Put the fun back into computing. Use Linux, BSD.
3 focus areas for DevSecOps success
Impact of the team Incorporating a new security-focused mindset with tools Measuring the progress
IT careers: 5 ways to get out of a rut | The Enterprisers Project
1. Set new personal goals 2. Expand your network 3. Don't limit yourself to a specific career path 4. Always look to solve problems 5. Acquire new skills
IaaS vs PaaS vs SaaS
Shared responsibility in the cloud - Microsoft Azure | Microsoft Docs
What is EFS (Elastic File System) in AWS and how to use it
3 phases to start a DevSecOps transformation | Opensource.com
Phase 1: analysis, education, and training Phase 2: integrate security into your DevOps lifecycle Phase 3: introduce automation into your DevOps lifecycle
Using terraform to launch Digitaocean kubernetes cluster – Part 1
Instantly test your cables by plugging them into this device | Arduino Blog
Hello IPv6: a minimal tutorial for IPv4 users
Book Review: API Security In Action – Adventures in the programming jungle
The Future of Connected Cloud Architecture
Top 10 security concerns for cloud-based services
1. Data Breaches 2. Hijacking of Accounts 3. Insider Threat 4. Malware Injection 5. Abuse of Cloud Services 6. Insecure APIs 7. Denial of Service Attacks 8. Insufficient Due Diligence 9. Shared Vulnerabilities 10. Data Loss
NIST Guidance Focuses on Creating 'Cyber Resiliency'
Case Study: Team Approach for Medical Device Cybersecurity
Startup Security Guide: Minimum Viable Security Checklist for a Cloud-Based Web Application
Apple Deprecates the Insecure TLS 1.0 and 1.1 Protocols in iOS 15, macOS 12
8 Free and Open Source Patch Management Tools Your Company Needs
Former Army Contractor Received a 151-Month Sentence for Fraud Scheme
Google's New Spyware in Chrome 94 - FOSS Force
In PuTTY, Scripted Passwords are Exposed Passwords | Linux Journal
A major telecom company that partners with AT&T and Verizon said hackers had access to its system for over 5 years, exposing billions of texts
Best 15 Dark Web Websites You Shouldn’t Miss
Facilitating the Secure Exchange of Health Data
FTC: Health App, Device Makers Must Report Breaches
Are You A Hacker, Developer or Engineer? (And Why it Matters)
A hacker can come up with solutions, but maybe they can’t look back after they’ve finished and realize how they came up with the solution. They just kinda poke at things until they get something that works. … At some point, you level up and become a developer and a developer understands best practices. They’ve heard other developers say things like “you should put your scripts at the bottom of the webpage” … and you use those best practices to craft solutions but you don’t really understand beneath the best practices, beneath the abstractions. … An engineer is someone who can get things done, craft a solution – they understand the best practices, but they also understand why they’re using the best practices that they are … [they] move into an understanding of the platform as a whole. Can companies follow the same journey?
Startups: Get More Customers From Your Website by Understanding the Funnel
Turn Your Nervous Speech Habit into An Awesome Presentation Tactic
Healthcare Exchange Standards: InScope podcast: #FHIR security
Healthcare Exchange Standards: Tutorial Links
Healthcare Exchange Standards: Healthcare use of Identity level of assurance
Ransomware, Vendor Breaches Spike on Federal Tally
Lawsuits: Negligence Led to UC San Diego Health Incident
"It may further take longer to determine whether, to what extent, and whose patient information was or may have been compromised," she notes. "Covered entities need to remain very conscious of any timing requirements during the course of what can be often protracted forensic analysis and investigation, and ensure their legal counsel remains involved in the process as well." "Analysis of large organization data breaches invariably exposes institutional failures that proper oversight would have identified and prevented," he notes. "It is high time all healthcare CEOs and boards learn it. Rampant medical identity theft threatens each patient’s safety and financial well-being," he says.
Thank you, SonarSource - openSUSE admin - openSUSE Project Management Tool
ClamAV Antivirus for Linux Tutorial | HackerTarget.com
PHP End of Life (a reminder)
The New Security Basics: 10 Most Common Defensive Actions
The BSIMM report aims to allow companies to make data-driven decisions on how to improve their software security efforts over time. The 10 most common activities — and the share of organizations participating in those activities — are: Implement lifecycle instrumentation and use to define governance (92%) Ensure host and network security basics are in place (91%) Identify PII obligations (89%) Perform security feature review (88%) Use external penetration testers to find problems (87%) Create or interface with incident response (84%) Integrate and deliver security features (80%) Use automated tools (80%) Ensure QA performs edge/boundary value condition testing (78%) Translate compliance constraints to requirements (77%)
5 Ways to Become a Better Cyber-Threat Exterminator
Establish a Formal Intelligence Program Structure Data into Entities and Events Prioritize Alerts Improve Incident Response and Vulnerability Management Use Predictive Models
GitHub - vletoux/pingcastle: PingCastle - Get Active Directory Security at 80% in 20% of the time
How to Implement a Security Champions Program
What Are the Different Types of Cyber Insurance?
Cyber insurance policies include different types of coverages that span first-party loss, first-party expenses, and third-party liability, each with specific parameters — sublimits, retention, and others. First-party loss typically includes loss of revenue due to business interruption, while first-party expenses would include the many services and resources needed to recover from an attack, such as forensic or system-rebuilding services. Third-party liability may cover expenses and legal fees related to the potential damage caused by the incident to third parties, such as partners, customers, or even employees whose sensitive information has been compromised.
Blog, Reproducing vulnerabilities in test reports - DigiNinja
Blog, ModSecurity and DVWA lab
Introducing USB Detective - Digital Forensics Stream
Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest - The Ethical Hacker Network
Errata Security: CISSP is at most equivalent to a 2-year associates degree
The right to repair – Exotic Security
The best long haul flight tip I've got, bring an empty bottle – Exotic Security
Waterbottle
Recovering data from a hard drive after wiping the partition table – Exotic Security
Securing Apache with Client Certificates – Exotic Security
AviD's Rule of Usability – Exotic Security
AviD's Rule of Usability: "Security at the expense of usability, comes at the expense of security."
Is antivirus dead yet? – Exotic Security
Automated Kubernetes Deployment with Ansible – Virtual Elephant
Build a Cyber Security Lab with DetectionLab | HackerTarget.com
osquery Linux Tutorial and Tips | HackerTarget.com
NSA Urges SysAdmins to Replace Obsolete TLS Protocols | Threatpost
TLS in 2021 | JDPFu.com 2021
NSA strongly discourages use of TLS 1.2
BloodHound – Hacking Active Directory Trust Relationships - blackMORE Ops
A Death Due to Ransomware - Schneier on Security
The Wall Street Journal is reporting on a baby’s death at an Alabama hospital in 2019, which they argue was a direct result of the ransomware attack the hospital was undergoing. Amid the hack, fewer eyes were on the heart monitors — normally tracked on a large screen at the nurses’ station, in addition to inside the delivery room. Attending obstetrician Katelyn Parnell texted the nurse manager that she would have delivered the baby by caesarean section had she seen the monitor readout. “I need u to help me understand why I was not notified.” In another text, Dr. Parnell wrote: “This was preventable.” [The mother] Ms. Kidd has sued Springhill [Medical Center], alleging information about the baby’s condition never made it to Dr. Parnell because the hack wiped away the extra layer of scrutiny the heart rate monitor would have received at the nurses’ station. If proven in court, the case will mark the first confirmed death from a ransomware attack. What will be interesting to see is whether the courts rule that the hospital was negligent in its security, contributing to the success of the ransomware and by extension the death of the infant. Springhill declined to name the hackers, but Allan Liska, a senior intelligence analyst at Recorded Future, said it was likely the Russianbased Ryuk gang, which was singling out hospitals at the time. They’re certainly never going to be held accountable.
iTWire - Ransomware contractor paints a different picture of the genre
The Cyber Monoculture Risk - Lawfare
Why there will be new software winners in ten years time, and how the giants will fall - Maddyness UK
111+ Mind-boggling Linux Statistics and Facts for 2021 - Linux Rocks!
That grumpy BSD guy: What every IT person needs to know about OpenBSD
If you only have a few minutes to spare, the highlights are: OpenBSD has been around for more than 25 years (started October 1995) OpenBSD is proactively secure with only 2 remote holes in default install in all those years OpenBSD pioneered use of strong cryptography, the first free system to ship with IPSec (entangling itself in US export regulations in the process) OpenBSD pioneered and is still leading in code audit, fixing similar bugs tree-wide when found OpenBSD has all security enhancements enabled by default and are hard going on impossible to disable OpenBSD is open source, free software and the project actively encourages independent verification of code quality and security. Today OpenBSD is in use in many network-centric roles, even though it is a general purpose operating system albeit with a particular emphasis on security. OpenBSD has a high profile quality image based on actual code quality and proven performance in real world use OpenBSD is upstream (origin) for several widely used pieces of software such as OpenSSH, OpenBGPD, PF, OpenSMTPd, LibreSSL, iked, mandoc and a number of others. For a complete list, please see the OpenBSD Innovations page on the OpenBSD website. OpenBSD has been ‘growing up in public’ with code generally accessible via anonymous CVS (the first of its kind) since 1995 – transparent process, development discussions on public tech@ mailing list Developers would do well to study high quality (mainly) C source and how the project runs a 6 month release cycle like clockwork (with only a few notable exceptions).
What's up with Sandboxing? | Jolla Blog
Use Vagrant to test your scripts on different operating systems | Opensource.com
Chip Shortages Aren’t Sweet for Networking | The Networking Nerd
Oracle 21c XE Database and Docker setup « Oralytics
28 Days Later – Managing the Challenges Posed by Long-Term Retention Backups | Data Protection Hub
There are in fact seven distinct challenges that the use of long-term retention backups introduce: Cost Future recoverability Testing Platforms and media management Organisational change People and processes Legal and auditing
How do you solve protective dissonance?
So let’s get back to protective dissonance. You can either just accept it as something that there’s a disconnect between the bulk of the work you do/what the company values, or you can take action by: Being lazy – automating everything you can, Evolving the tools you use – handling scale, and Moving towards autonomous behaviour.
Connecting your Dell EMC systems to SRS, the easy way! - FastStorage
Proxmox vs ESXi | Choosing the Best Hypervisor | ServerWatch
How to Create Linux OS Templates with KVM on Ubuntu 20.04 – VITUX
CISA's Cloud Security Technical Reference Architecture: Where it succeeds and where it falls short | CSO Online
Seven strategies for building a great security team | CSO Online
Accelerate career advancement Create a supporting cast Create teams that better reflect the overall population Hire for, and cultivate, nontechnical skills Build strong, resilient team players Show your team the mission Let your team members know what’s in it for them
10 top API security testing tools | CSO Online
APIsec AppKnox Data Theorem API Secure Postman Smartbear ReadyAPI Synopsis API Scanner Astra crAPI Apache JMeter Taurus
Software cybersecurity labels face practical, cost challenges | CSO Online
The new math of cybersecurity value | CSO Online
5 observations about XDR | CSO Online
1. No one owns the definition of XDR. 2. XDR solutions will win or lose based on advanced analytics. 3. XDR is all about turnkey automated response. 4. The MITRE ATT&CK framework is the lingua franca of XDR. 5. “Openness” is critical.
A Cheap And Easy Picroft
4 lessons from recent Microsoft Azure cloud vulnerabilities | CSO Online
Developers and admins should always: Review which of the cloud services you use have external IP access. Evaluate the risks involved in external access and determine if there are other ways to protect that access. Set up for notifications from your cloud vendors to keep apprised of security issues. Stay aware of the security chatter and news regarding the development platform you use. In the case of Microsoft Azure, you can use the Microsoft Security Response Center landing page and filter on the product family of Azure for the tools you use. Cloud vendors will often fix the issue on their end and alert you if you need to install patches.
Three Essential Security Technologies to Combat Ransomware | CSO Online
1) Transition VPN to ZTNA 2) Bring Enterprise-grade security and networking to employees’ homes 3) Add Endpoint Detection and Response Making a Dent in Ransomware Through Education and Training
6 steps for third-party cyber risk management | CSO Online
Here are the six key steps involved in creating a comprehensive TPCRM framework: Identify vendors Determine risk potential Have vendors complete risk questionnaires Develop a security scorecard Address risks in order of priority Monitor, optimize, strengthen, and streamline
How to Create a Cold Storage Crypto Wallet with a USB Memory Stick | Hacker Noon
Scanning Ansible code with Ansible Lint - Blog dbi services
Understanding AWK - Earthly Blog
How To Convert Text To Speech Using eSpeak NG In Linux - OSTechNix
Toshiba Canvio Advance external hard disk and Debian Linux. – BaronHK's Rants
(because tests need to be reproducible in order to determine if there’s a problem, how bad it is, and whether you’ve made progress in fixing it)
How To Install Django on Debian 11 - idroot
How I monitor my web server with the ELK Stack | Enable Sysadmin
How I use Ansible and anacron for automation | Opensource.com
Linux Achieves 5.1M IOPS Per-Core With AMD Zen 3 + Intel Optane - Phoronix
Personal Management System: A personal CRM and daily routine for busy minds
House passes legislation to strengthen federal cybersecurity workforce | TheHill
Security experts weigh in on Microsoft Azure security holes
How to analyze Linux system boot time with Systemd - Linux Shout
7 tips for better CISO-CFO relationships | CSO Online
How Jefferson Health enhanced cybersecurity via its cloud transformation | CSO Online
Using RADIUS For WLAN Authentication, Part II - Wi-FiPlanet.com
Using RADIUS For WLAN Authentication - Wi-FiPlanet.com
Oracle to PostgreSQL? 6 Reasons to Make Your Open Source Migration - insideBIGDATA
1) Starting is easy 2) The open source licensing and community are *exceptionally* open 3) It’s true open source 4) It’s similar to Oracle in the ways that you want it to be 5) It’s extensible 6) The power of PostGIS
The CIS Benchmarks Community Consensus Process | CSO Online
Linux Fu: Monitor Disks | Hackaday
Using Ansible with REST APIs | Opensource.com
MS-DEFCON 4: The printing issues continue @ AskWoody
Savings Rate vs. Income Bracket: How Impressive Is Your Savings Rate? — My Money Blog
How to Use the PowerShell Exit Command and Friends
25 years of Sysinternals | Born's Tech and Windows World
How to Make Your Next Cybersecurity Compliance Audit a Breeze | CSO Online
Cloud Sniper - Black Hat USA 2021 | Arsenal Schedule
SimpleRisk - Black Hat USA 2021 | Arsenal Schedule
The Speed of Time
The Cost Of Moving Atoms In Space; Unpacking The Dubious Claims Of A $10 Quintillion Space Asteroid | Hackaday
Linux Fu: VPN For Free With SSH | Hackaday
USB Webcams Out Of Stock? Make One With A Raspberry Pi And HQ Camera Module | Hackaday
This Automated Wire Prep Machine Cuts And Strips The Wire | Hackaday
North American Field Guide To Rail Cars | Hackaday
Learn Compilers Online From Cornell | Hackaday
Minimal safe Bash script template - Better Dev
Hitting the Books: How Bitcoin is somehow worth more than the paper it's printed on | Engadget
HEPA Room Air Filter by jshanna - Thingiverse
USB-C Charging On Your ThinkPad, One Step At A Time | Hackaday
What Makes A Good Antenna? | Hackaday
A USB-PD Laptop Conversion In Extreme Detail. | Hackaday
How To Bake Brownies With A Perfect Glossy Skin | Hackaday
FreeTouchDeck Upgrades Its Hardware And Its Name: ESP32 Touchdown | Hackaday
FreeTouchDeck
Mastering The Tricky Job Of Soldering SMA Connectors | Hackaday
A Brief History Of Viruses | Hackaday
What Can A $30 USB Spectrum Analyser Do For Me? | Hackaday
RIP Lou Ottens, Developer Of The Compact Cassette And More | Hackaday
Scratch-Built Rolling Tool Cabinet Is A Metalworking Skill-Builder | Hackaday
New Research report “Connected Medical Device Security” shows health networks still exposed to significant risk of attack and disruption - Forescout
How CMMC Measures Up to Other Compliance Frameworks | ActZero
What NOT to Do in Your First 90 Days as a CISO - Security Boulevard
Learn as much as possible about your predecessor’s mistakes. Come up with a massive strategic InfoSec restructuring plan. Ask to triple the budget. Pick an infosec framework that is drastically different from the one already in place. Bring a Big 4 consultant to conduct a large audit against that framework. Based on the audit results, define a 3-year InfoSec roadmap that involves new hires and tool purchases, but does not set clear milestones (3 years is about as long as it takes before your next CISO swapping cycle) Announce plans to replace a couple of major infosec tools, heavily integrated throughout the environment, on the grounds of not meeting expectations. Purchase new tools that do exactly the same, but cost 50% more (plus 6 months of implementation services) Hire a couple of symbiotic employees who follow you everywhere (with proper titles & compensation) Make friends with key executives; blame recently departed execs/managers for all problems. Start slowly looking for your next career opportunity.
Recent Threats Highlight the Importance of Cybersecurity in Healthcare - Forescout
Protecting the healthcare industry from cyber threats - Security Boulevard
Introducing KubeLinter - an open source linter for Kubernetes - Security Boulevard
DICOM file security: How malware can hide behind HIPAA-protected images | Votiro
5 Reasons Why Web Security Is Important to Avoid Ransomware | Acunetix
Reason 1. Ransomware Is a Result of Attack Escalation Reason 2. Web Attacks Are Used to Spread Ransomware Reason 3. Move to Cloud Means that More Criminals Aim for the Cloud Reason 4. Organizations Do Not Report Attack Details Reason 5. Media Focuses on the Problem, Not the Solution
What Is the R.U.D.Y. Attack - Security Boulevard
Obfuscation - Lessons from Teaching Cybersecurity: Week 5
Why Cyber Risk and Compliance Needs to Be the Foundation for Healthcare Digital Transformation Initiatives - Security Boulevard
5 Lessons Learnt from BJJ that Are Applicable to Cybersecurity
1. Close the distance 2. Keep your friends close, but your elbows closer 3. Size doesn’t matter 4. When you know how to defend, you know how to attack 5. Everything in life changes, but jiu-jitsu stays the same
ENISA Threat Landscape 2020 - List of top 15 threats — ENISA
Keep Your Site Safe with the OWASP Top 10 List - Hashed Out by The SSL Store™
5 key benefits of using an IP scanner - ManageEngine Blog
1. Enabling holistic scanning and data consistency of IP allocations 2. Deriving a complete picture of your IP resource usage with an IP scanning software 3. Increasing network performance by optimizing IP space fragmentation and utilization 4. Managing dynamic networks by monitoring IP status changes 5. Staying ahead of IP resource exhaustion and capacity planning
Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out - Security Boulevard
Picking the right tool - lessons from teaching cybersecurity week 6
Roles and responsibilities that lead to better software security initiatives | Synopsys
How To Prepare for a CMMC Audit - Security Boulevard
Top 10 risks to include in an information security risk assessment
Social engineering Disclosure of passwords Unauthorised access to the network Maintenance error Electrical outage Infrastructural damage Malfunctioning equipment Destruction of records Theft Weather events
Three Ways Tracking NIST 800 53 in Spreadsheets is Wasting Your Cybersecurity Team's Time - Security Boulevard
1) Incongruencies and Version Control 2) Aggregation and Analyzing Results 3) Presenting and Reporting to Leadership
HTTP/3: Ready to Land - Security Boulevard
Software Composition Analysis Explained - Security Boulevard
Recommended Controls for Maintaining HIPAA Security Compliance - Security Boulevard
A Holistic Approach to Kubernetes Security and Compliance
Kubernetes Security Best Practices - Security Boulevard
Ghidra 101: How to Use the Cursor Text Highlighting Feature
4 Things a Good Vulnerability Management Policy Should Include
An Overview of what the policy is intended to do. The Scope of the policy. Roles and Responsibilities under the organization. Vulnerability Remediation/Risk Mitigation.
What You Need To Know About Application Security Testing Orchestration - Security Boulevard
Security and privacy laws, regulations, and compliance: The complete guide | CSO Online
The 5 Ws for Building a Strong Cybersecurity Plan | CSO Online
12 database security landmines, failures, and mistakes that doom your data | CSO Online
1. Inadequate access management 2. Easy physical access 3. Unprotected backups 4. Unencrypted data at rest 5. Not using privacy protecting algorithms 6. Lack of proliferation controls 7. Lack of database controls 8. Vulnerable secondary databases 9. Vulnerable applications with access to data 10. Risky internet exposure 11. Lack of integrity management 12. Retaining unneeded data
8 top cloud security certifications | CSO Online
1. Certificate of Cloud Security Knowledge (CCSK) 2. CompTIA Cloud+ 3. GIAC Cloud Security Automation (GCSA) 4. Certified Cloud Security Professional (CCSP) 5. Azure Security Engineer Associate 6. AWS Certified Security — Specialty 7. Professional Cloud Security Engineer 8. Certified Kubernetes Security Specialist (CKS)
GLaDOS Voice Assistant Passive-Aggressively Automates Home | Hackaday
Data Pump Enhancements in Oracle 21c (and a little support story)
CERIAS Researchers Join Rolls-Royce, Carnegie Mellon Network to Create Cyber-resilient Systems - CERIAS - Purdue University
50 Years, and Lessons (Not) Learned - CERIAS - Purdue University
Sturm und Drang and Hacking and Twitter - CERIAS - Purdue University
Creative Choices: Developing a Theory of Divergence, Convergence, and Intuition in Security Analysts | Chris Sanders
Ansible YAML Basics - Anto ./ Online
XDR Defined | Security Blog | VMware
Top DAST Tools 2021 | Dynamic Application Security Testing
More IOPS with BIO caching [LWN.net]
Excellent Free Tutorials to Learn Arduino - LinuxLinks
Proxmox VE Full Course: Class 8 - Creating Container Templates - Invidious
20 Free Open-source Time Tracker Solutions To boost your Productivity
Why Encryption is Critical to the Healthcare Industry | PKI
Defense in Depth: Why You Need DAST, SAST, SCA, and Pen Testing - Security Boulevard
Risk Journeys with Lisa Young | Cyber Risk Management | Axio
Risk Journeys with Lisa Young | Cyber Risk Management | Axio
Tripwire Book Club - A Review of The Ghidra Book
The Most Common Website Attacks (How to Protect Yourself)
CKS Certification Study Guide: System Hardening in Kubernetes - Security Boulevard
Learn about containers and Kubernetes with Red Hat Academy
Ghost in the Shell – Part 6 – Learn Shell Scripting | 𝚟𝚎𝚛𝚖𝚊𝚍𝚎𝚗
IAM Best Practices For DevOps - Sonrai Security
Pcaps and the Tools That Love Them Part 1 of ??? - Security Boulevard
DFARS Interim Rule Drives Need for Assessment Prep & Cybersecurity Management - Security Boulevard
More Lessons Learned About Passing the OSCP Exam
GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy - Security Boulevard
Discuss digital personas. Explain the abstract. Encourage privacy behaviors. Lead by example. Make it a family conversation.
CKS Certification Study Guide: Monitoring, Logging, and Runtime Security - Security Boulevard
API Security in a Digitally Transformed World - Security Boulevard
Five Things Security and Development Teams Should Focus on in 2021
1. Proportionate security by design 2. Clear, reliable documentation 3. Security focused training and methodologies 4. Maintain your foundations: Risk Management, including threat mapping Patch and Asset Management Vulnerability Management Threat Intelligence Third Party Governance 5. Continuous validation on your solution and your environment
10 Tips to Protect Your Company’s Data in 2021 - Security Boulevard
1. Replace FTP Scripts 2. Encrypt Data in Transit and at Rest 3. Use Secure Collaboration Tools Between Employees, Customers, and Partners 4. Avoid Common Mistakes When Sending Large Files 5. Identify Compromised Devices on the Internal Network 6. Inspect Your Data Content Using DLP Technology 7. Classify Your Data to Protect It 8. Create and Implement a Cybersecurity Program 9. Try the Data Security Solutions You Want to Implement for Free 10. Trust in a Comprehensive Cybersecurity Provider
WhiteHat Security Introduces AppSec Stats Flash: A Modernized Approach to Application Security Reporting - Security Boulevard
It's Time for Vendor Security 2.0 - Daniel Miessler
FTC rules that health apps must notify consumers if their data is breached | Engadget
FTC rules that health apps must notify consumers if their data is breached | Engadget
How COVID-19 Has Changed Cybersecurity for Government Departments - Security Boulevard
Apple iPhone security update points to growing problem of 'zero days'
Infrastructure in place to run each app as a separate user
Global Logistics Company Uses AppViewX to Automate Certificate Lifecycle Management - Security Boulevard
Building a Framework to Assess the Total Cost of Cloud IT Infrastructure - JumpCloud
JeffSoh on NetSec: Pcaps and the Tools That Love Them Part 2
JeffSoh on NetSec: Pcaps and the Tools That Love Them Part 1
Rancher Kubernetes Engine (RKE) Security Best Practice for Cluster Maintenance & Network Security - Part 4 of 4 | StackRox Community
Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security - Part 3 of 4 | StackRox Community
Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access - Part 2 of 4 | StackRox Community
Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup - Part 1 of 4 | StackRox Community
WordPress security & hardening, the definitive guide - Security Boulevard
Ghidra 101: Decoding Stack Strings | The State of Security
Which AppSec Testing Type Should You Deploy First? | Veracode
Crawl, Walk, and Run with SASE Adoption - Security Boulevard
ICS Purdue Model in Industrial Internet of Things (IIoT) & Cloud - Security Boulevard
PacketFence | Open Source NAC
deploy360-ipv6-security-v1.0.pdf
infoblox-whitepaper-seven-deadly-traps-of-ipv6-deployment_0.pdf
Source Code Security Analyzers | NIST
Secure JSONification? - LFlat, The Home of Vrurg
eduroam.org – eduroam global site
ADT Installer Hacks Home Cams for Sexual Thrills - Security Boulevard
How to Write a Vulnerability Management Policy - Hurricane Labs
Things your manager might not know
Here are the facts your manager might not know about you and your team that we’ll cover in this post: What’s slowing the team down Exactly what individual people on the team are working on Where the technical debt is How to help you get better at your job What your goals are What issues they should be escalating What extra work you’re doing How compensation/promotions work at the company
Best practices for REST API design - Stack Overflow Blog
Handbook
Docker Threat Model - CloudSecDocs
GitHub - alcideio/skan: Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.
Free for developers
Securing your code: GDPR best practices for application security
The CSS Mindset | Max Böck
Running static analysis tools for PHP - Rule of Tech
Automate your dependency management using update tool - Rule of Tech
Getting Started With FreeRTOS And ChibiOS | Hackaday
Ransomware Lessons for a Nation Held Hostage - Lawfare
Understand Cyber Security and Cryptography - Unixcop
Scanner School Podcast + Webinar: This is Why You Need an SDR
Set the order of task execution in Ansible with these two keywords | Enable Sysadmin
Jonah Edwards - Internet Archive Infrastructure : Free Download, Borrow, and Streaming : Internet Archive
The Current State of Kubernetes Threat Modelling – Marco Lancini
Docker Security Best Practices from the Dockerfile
Chess Tactics Explained in English: Ward Farnsworth's Predator at the Chessboard
Scott Hanselman's 2021 Ultimate Developer and Power Users Tool List for Windows - Scott Hanselman's Blog
GitHub - Ethereal-Developers-Inc/OpenScan: OpenScan is an open-source document scanner app that enables users to scan hard copies of documents or notes and convert it into a PDF file. No ads. No data collection. We respect your privacy.
Unicode: On Building The One Character Set To Rule Them All | Hackaday
Applying DevSecOps practices to Kubernetes: software supply chain
introducing witchery: tools for building distroless images with alpine – Ariadne's Space
Highly Configurable Open Source Microscope Cooked Up In FreeCAD | Hackaday
History Of Closed Captions: The Analog Era | Hackaday
Pcaps and the Tools That Love Them Part 3 of ??? - Security Boulevard
16 Basic Cron Command In Linux With Examples | LinuxTeck
How to Speed Up an Ansible Playbook | Linux Today
Figuring out the container runtime you are in – /home/liquidat
10 Commands to Collect System and Hardware Info in Linux
How the CIS Foundations Benchmarks Are Key to Your Cloud Security
Unlocking the Mysteries of the Fed's New CMMC Requirement - Anitian
Managing scans using Python and the Acunetix API | Acunetix
Japan’s Proactive Cybersecurity Measures Gain Upper Hand Against Threats | Votiro
Q&A trip to Linux’s Black Hole - /dev/null | Linux Journal
Kubernetes: Master Post Carnal0wnage - Blog Carnal0wnage Blog
How To Cook Turkish Borek The Easy Way - foXnoMad
CISO's Guide to Secure Software Development - Security Boulevard
5 Reasons CISOs Should Invest in Application Security Drowning in Cybersecurity Data The number of sensors generating security data keeps growing, including firewall logs, antivirus scan reports, insider threat reports, DLP logs, vulnerability scan data, modern persistent threats, server access logs, authentication logs and more. The variety, velocity and volume of data can quickly overwhelm security analysts. Automation and analytics can address this challenge. Reactive and Passive Approaches are not Enough Actions like logging, alerting and monitoring are not sufficient for security measures alone. Tools that can not only provide visibility but react to threats or incidents in near real-time are necessary to avoid damage. Advanced automated security operations and hands-on threat-hunting with swift incident responses are essential to safeguard digital assets. Fragmentation and Chaos As a CISO and their team persistently react to threats, they generate a disorganized digital mixture of HTML pages, PDF reports, XML extracts and CSV files. These reports, files or pages are tough to integrate, analyze and integrate into applications and strategies for generating automated responses. The Shift from Discrete Security Events to Uninterrupted Security The cloud and DevOps are increasingly enabling code deployments and facilitating dynamic environments that confront the conventional “certify once and monitor forever” waterfall security model. Modern applications and infrastructure and IT environments necessitate a proactive, dynamic and advanced security approach. Security-as-code is the only methodology that can scale and react on a real-time basis. Data from Multiple Sources CISOs possess two distinct sets of dashboards: one for internal and the other for external stakeholders. However, both these dashboards must operate based on the same underlying data sets. But this is not always the case; from simple spreadsheets to advanced BI tools, CISOs have data streaming in from multiple sources, making it difficult and complicated to secure necessary information and show analytical dashboards to the rest of the C-suite.
Do we need humans for that job? Automation booms after COVID - Japan Today
Filtering with Ansible’s selectattr()/rejectattr() when the tested attribute can be absent – 0xf8.org
How to modify a list of dictionaries with Ansible – 0xf8.org
An updated configuration file structure diagram for rspamd 1.9.0 – 0xf8.org
4n6k: Forensics Quickie: Methodology for Identifying "Clear Recent History" Settings for an Old Version of Firefox
Critical Security Controls: Part 2 (with Brian Ventura) | Advanced Persistent Security
Critical Security Controls: Part 1 (with Brian Ventura) | Advanced Persistent Security
Defending Our State & Local Communities from Cyber Threats
Networking Basics – CodingBee
Identity and Access Management - who you are, and where you need to be
Concretedog: Tool Tuesday - RS Pro Flat Nose Pliers
GitHub - countercept/chainsaw: Rapidly Search and Hunt through Windows Event Logs
packetsifterTool - A Tool To Aid Analysts In Sifting Through A Packet Capture (Pcap) To Find Noteworthy Traffic
Chainsaw - the New Tool That Helps Incident Responding Teams
MSSQL for Pentester: Abusing Trustworthy
MSSQL for Pentester: Command Execution with External Scripts
Meet Estefannie Explains it All - Raspberry Pi
Expanding our free Isaac Computer Science platform with new GCSE content - Raspberry Pi
Raspberry Pi thermal camera - Raspberry Pi
Add face recognition with Raspberry Pi | Hackspace 38 - Raspberry Pi
Guiding Principles For Your Digital Transformation Strategy - Security Boulevard
7 Ways to Defend Mobile Apps and APIs from Cyberattacks - Security Boulevard
Windows Incident Response: On Writing DFIR Books, pt I
You Don't Need to be CMMC Compliant, You Need to Be DFARS Compliant (A Kardashian Parable) | Pivot Point Security
Best-Practice Password Policy and the Research Behind It | Pivot Point Security
75% of Apps in the Healthcare Industry Have a Security Vulnerability - Security Boulevard
How to Build a DIY Mattress with Pocket Coil, Latex or Poly-Foam
Advice for DIY mattress - The Mattress Underground
Windows Incident Response: Tips for DFIR Analysts, pt II
Windows Incident Response: Tips for DFIR Analysts
ESXi SD-Card/USB boot devices unsupported in 7.0u3 · vNinja.net
GoPurple - Yet Another Shellcode Runner Consists Of Different Techniques For Evaluating Detection Capabilities Of Endpoint Security Solutions
Protecting CUI and the DoD Supply Chain | PreVeil
Helping Contractors Achieve DFARS Compliance | PreVeil
Can the healthcare industry stay ahead of cybercriminals? | Untangle
How to cyber security: Containerizing fuzzing targets | Synopsys
Discussing Cybersecurity Outcomes (Not Features) with CIOs - Security Boulevard
Installing vRealize Automation 8.0 in a Home Lab | vLore Blog
Nettacker - Automated Penetration Testing Framework
Nettacker
Proofpoint lawsuits underscore risk of employee offboarding | CSO Online
8 must-ask security analyst interview questions | CSO Online
Run your small DNS server with MaraDNS - Virtual to the Core
Architecture of Docker – Joseph Griffiths
Building my own virtual lab in vCloud Director with Terraform - Virtual to the Core
List all Databases and Their Associated Files | Chris Blogs
After startup database with srvctl, sqlplus as sysdba results in ORA-12547: TNS:lost contact - Blog dbi services
lost contact
Ansible: How to work with inventory, variables, and facts - Anto ./ Online
How to Succeed as a CISO in 2021 | Fidelis Cybersecurity
Infrastructure Hygiene: Why It’s Critical for Protection - Security Boulevard
10 Reasons Check-the-Box Compliance Puts Your Organization at Risk - Security Boulevard
Application Security in 2021 | Radware Blog
When Organizations Take a Risk-First Approach to IT Compliance, They’re Better at Avoiding Security Incidents - Security Boulevard
Getting Started with Web Application Security? A Developer’s Guide
List of data breaches and cyber attacks in August 2021 – 61 million records
China's key enforcement agencies and lessons learned from recent actions
IG: DoD Did Not Properly Secure Access to VIP Records
How to manage the growing costs of cyber security - IT Governance UK Blog
Governments continue to eye data privacy, forcing CIOs to adapt
House representatives sent a letter to Yahoo's CEO... from 2017 | Engadget
Ransomware, data protection and compliance   
Transfer Impact Assessment Templates
Visiting Ghent, Belgium with kids - Curious and Geeks
Trash – a safer alternative to rm - Be smart(er than me), start trash-ing now! · Hook’s Humble Homepage
Create a photo collage from the Linux command line | Opensource.com
Why SAST and DAST are Crucial for the Applications? | Indusface Blog
Dangerous defaults that put your IT environment at risk: IT security under attack - ManageEngine Blog
New CISO Priorities of 2021 - Sonrai Security
Adoption of Cybersecurity Insurance & its Role in the Modern World | Axio
Can security and compliance for managed database services be simple? | Imperva
Are Your IT Infrastructures 2021 Cybersecurity Compliant?
Some Tips and Tricks for PMP Studies – Unadulterated Nerdery
Top STIG – Part 6 (OS Accounts) | Late Night Oracle Blog
Download Oracle software with the command line – Laurent Schneider
Critical flaw in Atlassian Confluence actively exploited | CSO Online
9 notable government cybersecurity initiatives of 2021 | CSO Online
CDPSE certification: Requirements, exam, and cost | CSO Online
Setting Up Your Child for Success | Penniless Parenting
Oracle Database 21c Is Here – Databases Are Fun
Installing Multi-Factor Authentication for your Office 365 Users
HCL Sametime Meetings monitoring for Kubernetes | IdoNotes (and sleep)
Concretedog: Tool Tuesday - The Digital Multi Meter
Cloud Computing Infrastructure: NetApp ONTAP 9 Simulator and Free eBook
HDMI Dummy Plug Success with VNC! - MovingPackets.net
Response to "Certifications Are Not A Big Deal. Stop Being a Princess About It." - MovingPackets.net
Cranky Old Network Engineer Complains About The Youth Of Today - MovingPackets.net
Heavy Strategy 008: Five Core Issues for IT Architects in 2021 — EtherealMind
5 Question on Cybersecurity — EtherealMind
VMware Snapshot Size Powershell Nagios Script | Nerhood Weblog
Open Systems SnapVault (OSSV) Web Reporting | Nerhood Weblog
Network Janitor | The Smartest Guy in the Room
Ubiquiti EdgeRouter Lite Setup Part 6: Odds and Ends
Ubiquiti EdgeRouter Lite Setup Part 5: OpenVPN Setup
Ubiquiti EdgeRouter Lite Setup Part 4: IPv6 Setup
Ubiquiti EdgeRouter Lite Setup Part 3: VLAN Setup
Ubiquiti EdgeRouter Lite Setup Part 2: Firewall Setup
Ubiquiti EdgeRouter Lite Setup Part 1: The Basics
Stretch's Hierarchy of Network Needs - PacketLife.net
Mind Map for CCIE & CCNP Routing & Switching | neckercube.com: Jedadiah Casey
Easy Disaster Recovery Plan | neckercube.com: Jedadiah Casey
Soldering QFNs using solder paste and stencils – Matt's Tech Pages
How to start blogging in 2021?
Weight Loss and Personal Health
Twelve Days of Cooking and Baking
Using Ansible Automation Platform For Post Configuration With Red Hat Satellite Provisioning Via Callbacks | Greg Sowell Saves The World
CCNA Training » Cloud & Virtualization Questions
CCNA Training » Security Questions
CCNA Training » Security Questions 2
Import Into ServiceNow CMDB Via Ansible ServiceNow Collection | Greg Sowell Saves The World
HPE Warns Sudo Bug Gives Attackers Root Privileges to Aruba Platform | Threatpost
18 Recommended Open-Source Tools for Writers and content creators
Enumerating .gov.af - vulns.xyz
Network Controls in the DevSecOps life cycle
Analyzing a High Rate of Paging
The case for Collective Defense in the U.S. energy sector
Securing the sudo to sudo_logsrvd connection • Sudo Blog
HTTP Security Headers: Why? How? What? - Sylvain Kerkour
5 DevSecOps open source projects to know | The Enterprisers Project
Clair Sigstore KubeLinter Open Policy Agent and Gatekeeper Falco
5 Popular Free And Open Source Project Management Tools
Automate Red Hat JBoss Web Server deployments with Ansible | Red Hat Developer
How to Create eLearning Platform with Moodle and ONLYOFFICE
Best DNS Benchmark Tools 2021 | DNS Server & Speed Test
Control your Raspberry Pi remotely with your smartphone | Opensource.com
Hackers Could Increase Medication Doses Through Infusion Pump Flaws | WIRED
How to replace a failed disk in a ZFS mirror | Jordan Elver | Ruby on Rails Developer, Bristol, UK
HP H240 HBA Controller | Page 2 | TrueNAS Community
HP/PMC SA in whitebox | ServeTheHome Forums
HP Smart Storage Admin CLI (ssacli) installation and usage on Proxmox PVE (6.x) · GitHub
What are container runtimes? | Opensource.com
20 essential Linux commands for every user | Opensource.com
RSA/SHA1 signature type disabled by default in OpenSSH
Must-have gear to make traveling with kids easier | Engadget
Understand Your Staff: How Insiders Shape Defenses - Security Boulevard
BSides Calgary 2020 - Josh Sokol's 'Architecting For Security In The Cloud' - Security Boulevard
BSides Calgary 2020 - David Lindner's 'So You Are Comparing A WAF And RASP?' - Security Boulevard
 Security operations center, Part 2: Life of a SOC analyst  - ManageEngine Blog
The Ransomware Group Tactics which Maximise their Profitability - Security Boulevard
Auckland University of Technology choose Koha Library System | Catalyst
U.S. medical entities fall prey to Pysa threat actors, but many haven’t disclosed it – at least, not yet.
Why Do Chief Security Officers Leave Jobs So Often? - Security Boulevard
“According to Radware’s 2018 State of Web Application Security report, 23 percent of companies reported executive firings related to application attacks. U.S. companies were more likely to say execs were let go after an incident, as were companies in the technology or financial services sectors.” After a major security incident the team often gets resources and support to fix problems. “less than 1 percent of CISOs are actually fired, though 12 percent believe they would be dismissed because of a breach, according to a 2015 IDC report.” “recall occasions where their firm’s CISO was dismissed for poor reporting, exceeding their budget, not following business strategies or even spreading FUD (Fear, Uncertainty and Doubt) — rather than delivering practical solutions to these same problems. It was, as one CIO remarked, a case of the CISO ‘talking the talk, but not walking the walk.’” You may agree with this or not, and you may think the statements trite and without detail, but heck, let’s hang this out there … in my view as a CISO, or indeed a chief information risk officer, you have to do four basic and foundational things: Really understand the risks to your organization and where you sit against those risks Educate the board, the management and the people in the organization Provide pragmatic solutions and choices to the board, the management and the people in the organization Beat the desk and beat it hard if you think there is unnecessary obstruction when it comes to dealing with the issues and making progress
Eclipse Adoptium achieves its first Java SE release
Hardening Executables
How to optimize anything
Docker Logs: What They Are and How to Use Them (with Examples)
Learning by rewriting - bash, jq and fzf details
How to Enable ZFS Compression
From Google Cloud Blog: “New Cloud Security Podcast by Google is here” - Security Boulevard
Sellers Buying 5-Star Amazon Reviews - Security Boulevard
How to scan a Debian server for rootkits with Rkhunter – VITUX
A beautiful power tool to scrape, clean, and combine data – Jon Udell
https://workbenchdata.com/
How to monitor disk space usage with shell script | 2DayGeek
How To Mount Microsoft OneDrive In Linux | Itsubuntu.com
PgBouncer changelog
10 Database Security Best Practices You Should Know
1. Deploy physical database security 2. Separate database servers 3. Set up an HTTPS proxy server 4. Avoid using default network ports 5. Use real-time database monitoring 6. Use database and web application firewalls 7. Deploy data encryption protocols 8. Create regular backups of your database 9. Keep applications up to date 10. Use strong user authentication
Essential System Tools: dust - more intuitive version of du - LinuxLinks
Security operations center, Part 3: Finding your weakest link - ManageEngine Blog
How WAFs Can Mitigate The OWASP Top 10 | Radware Blog
What is a Smart Card?
Infrastructure Hygiene: Fixing Vulnerabilities - Security Boulevard
Dijkstra’s Algorithm
Experimenting with Python implementation of Host Identity Protocol | Linux Journal
How to check memory usage per process in Linux | 2DayGeek
Know your organization's rule makers and rule breakers | Opensource.com
Memorial Health System Hit By Ransomware | Avast
6 Must-Have Open-Source Tools to Secure Your Linux Server
60% of Companies Go Out of Business After a Cyberattack - Security Boulevard
Ask the Expert: Why is it critical that organizations mature their cyber risk program now?
The Case for Collective Defense of the Public Sector - Security Boulevard
Why Do Healthcare Departments Need Managed IT Services?
Corporate Cyber Threats and the Need for Executive Protection - Constella
Bash Redirection Explained With Examples - OSTechNix
Three Key Questions to Define ICT Supply Chain Security - Lawfare
History and the Recognition of the Taliban - Lawfare
Neural Fuzzing: A Faster Way to Test Software Security | Linux Today
Unsupported IoT Devices Are Cyber-Trouble Waiting To Happen | LinuxInsider
DHT11 Humidity and Temperature Sensor With Raspberry PI Pico and MicroPython
How to reformat 520 byte drives to 512 bytes (usually) - Hardware - Level1Techs Forums
single version: sg_format -v --format --size=512 /dev/sg2 loop for multiple for disk in $(ls /dev/da{#first…#last}); do echo “>>> ${disk} <<<” && sg_format -v --format --size=512 ${disk} ; done replace #first with your first drive number i.e. da0 and #last with the lastnumeber i.e. da12
3 Hiking Principles That Made Me a Better CISO - Security Boulevard
Turning Mountains Into Hills Read the Map, Read the Mountain The Leader Must Not Fall
HIPAA Security Requirements: What They Really Mean - Security Boulevard
ENISA releases guidelines for healthcare services cloud security
The stars are aligning for federal IT open source software adoption | TechCrunch
IT careers: 3 key skills for remote jobs | The Enterprisers Project
communication character listening
Level up your Ansible skills while having fun: Sysadmin after dark | Enable Sysadmin
Ricardo Gerardi
How To Setup A Virtual Penetration Testing Lab - ByteXD
How to detect and manage devices on Linux – VITUX
udevadm info /dev/sda2
Perform a vulnerability scan with Openscap scanner - Unixcop
How To Install Elasticsearch on Debian 11 - idroot
Setting Up an Effective Vulnerability Management Policy - Security Boulevard
Compliance – The Invisible Hand Guiding Cybersecurity
Reducing Cybersecurity Risk With Minimal Resources - Security Boulevard
We use a periodic sampling approach from the many threat reporting sources (as part of our “CTI” program), then distill those results into the following current risk areas that we sense apply to most organizations: Phishing: Over 90 percent of all security incidents start here (where someone will always “click”!) Ransomware, including morphing malware/crypto-mining: It’s easy and profitable, and now comes with a data breach extortion threat too. Poor cyberhygiene: known vulnerabilities not patched (98 percent of exploits use these) Ineffective access controls: Identity is the new perimeter and core (ZTA) (e.g., we need multifactor authentication everywhere) Hostile intruders: hackers, insider threats, careless users, any malicious user Crime as a service: as now anyone can be a hacker, just pay the criminals Internet of Things security: the many atypical computing devices connected to your network Third-party/vendor access and risks: this is a major threat all by itself and accounts for half of all breaches Regulation/compliance (e.g., GDPR, SOX, PCI DSS, etc.): Fines, loss of integrity/brand and competitiveness.
Securing APIs: Application Architecture Disrupted - Security Boulevard
AC.1.001 Basic Security Requirements (CMMC Level 1) - Security Boulevard
Ghidra 101: Loading Windows Symbols (PDB files)
Easy Scallion Rice Recipe- Gluten Free, Vegan, Soy Free | Penniless Parenting
Issuing valid certificates for LAN-only websites :: Rafael Cavalcanti
DNF Guide for Beginners with 20 Examples | Linux Today
How to maximize data storage for microservices and Kubernetes, Part 1: An introduction | Red Hat Developer
Top 14 Podcast Tools - best free podcast software - LinuxLinks
Getting Started With Docker Containers: Beginners Guide - Front Page Linux
President Biden is meeting with Apple, Google and Microsoft on cybersecurity | Engadget
Data Brokers Are Advertising Data on U.S. Military Personnel - Lawfare
How to Check and Improve Your Linux Boot Time
DoD: Get Started With a CMMC Self-Assessment Now | Apptega - Security Boulevard
Managing Security Debt: How to Reduce Security Deficit - Security Boulevard
Historical Income Tax Rates and Brackets, 1862-2021 | Tax Foundation
Microsoft GCC or GCC High for CMMC and DFARS Compliance? | Apptega - Security Boulevard
The Three Components of the HIPAA Security Rule - JumpCloud
SA.3.169 Community-based Threat Sharing (CMMC Level 3) - Security Boulevard
German health system adopts Matrix | Joinup
Website Vulnerability Assessment to Protect Website | Indusface Blog
Book Review: Born Digital by Robert Wigley - Security Boulevard
SI.1.210 System Integrity/Patching (CMMC Level 1) - Security Boulevard
Peeling Back Your PKI Onion: Can I Trust My PKI? - Keyfactor - Security Boulevard
Putting the Sec in DevSecOps - Security Boulevard
CA.2.158 Ongoing Security Assessment (CMMC Level 2) - Security Boulevard
Cyber Attacks and Ransomware in Healthcare | ARIA Cybersecurity - Security Boulevard
Some open questions to consider as you evaluate the current state: Do you have a way to recognize medical devices or IoMT devices as they enter your network? If so, can you also take these devices offline if you need to remediate possible threats? Are you implementing OS, system and software patch updates as soon as manufacturers release them? Is your staff regularly changing passwords to network systems and refraining from reusing passwords for different accounts? Are you using multi-factor authentication whenever possible? Have temporary and contract staff been authenticated as users accessing your network, and are they adhering to the same protocols as your permanent employees? Have you identified critical assets in your network infrastructure (e.g., patient databases) and created the necessary backups offline and away from your network? Are all of your antivirus and anti-malware solutions set to update and scan automatically? Does your crisis management team include someone from your security team?
Agile strategy: 3 hard truths | The Enterprisers Project
1. Leadership often serves as a barrier to agility 2. Agile takes time 3. All agile coaches are not created equal
How to Monitor Log Files in Real Time in Linux [Desktop and Server]
Virginia Enacts New Data Privacy Law - Security Boulevard
Vulnerability Detection and Patching: A Survey Of The Enterprise Environment | Linux Journal
Tesseract 5.0 OCR Engine Bringing Faster Performance With "Fast Floats" - Phoronix
A beginner’s guide to Kubernetes
Building RepRap 3D printer · GeekSocket
NIST Password Guidelines 2021: Challenging Traditional Password Management — VeriClouds
How to Strengthen Password Policies to Stay Compliant with GDPR
Why is having a strong password policy essential? According to the 2019 Verizon Data Breach Report, the most significant single factor leading to the breach of an organization are weak passwords, which they found to be the cause of 29% of breaches. Weak passwords are easily obtained by threat actors and used for credential stuffing and password spraying attacks which the European Data Protection Board has issued guidance saying are reportable breaches. If either of these happens, the organization will be held to the 72-hour reporting period and must notify all users that are potentially impacted by the attack that their data may have been compromised. Given the risks involved with allowing weak passwords and the potential repercussions of what may happen, it is essential strong password policies are not overlooked
Cybercrime to cost over $10 Trillion by 2025 - Security Boulevard
IR.2.092 Incident Preparation (CMMC Level 2) - Security Boulevard
A Security Vulnerability Management Guide - Security Boulevard
Container Security and Vulnerabilities - Security Boulevard
How to Improve Your Cloud and Container Security - Security Boulevard
I figured out how DMARC works, and it almost broke me | Simon Andrews
Looking back on 30 years of Linux history with Red Hat's Richard Jones
Planetary-Scale Computing – 9.95 PFLOPS & Position 40 on the TOP500 List | AWS News Blog
Why backups are not just insurance policies in 2021 — ThinkCharles.net
How to benchmark VMware vSAN the right way — ThinkCharles.net
How to build a private cloud with VMware Cloud Foundation in 3 hours? — ThinkCharles.net
10 SCP Commands to Transfer Files/Folders in Linux
How To Backup And Restore Linux System With Timeshift - OSTechNix
Create Your Own Certificate Authority (CA) for Homelab Environment | Lisenet.com :: Linux | Security | Networking
StartTLS in LDAP — Firstyear's blog-a-log
Recognizing the Risks of the Cloud | Application Security | K2 Security
Five Reasons EDR & EPP Solutions Cannot Protect Application Workloads - Security Boulevard
1. Applications on Server/Workloads are fundamentally different than those running on devices. 2. Exploits targeting servers and workloads are also fundamentally different. 3. The blacklisting model is old and doesn’t scale. 4. Reactive security models always fall behind. 5. Advanced exploits today bypass EDR security tools.
Microsoft Azure Checklist: Expert Advice on Security - Sonrai Security
A CISO’s Guide to Prevent Ransomware Attacks - Kratikal Blogs
How to Build a Strong Information Security Policy | Hyperproof
3 Foundations of a Data Security Strategy - Security Boulevard
Use a VPN Deploy a DLP solution Encrypt Sensitive Files Encrypt in transit, encrypt at rest, and know where the data is going.
NIST SP 800-172 release couldn’t come at a better time
800-171b is now 800-172 3PAudit + 800-171 + 800-172 = CMMC
Securing APIs: Modern API Security - Security Boulevard
Why Healthcare Security Requires an Operation-Centric Approach - Security Boulevard
Anton’s Security Blog Quarterly Q1 2021 - Security Boulevard
Five medical device security best practices | Synopsys
1. Establish a secure software development life cycle 2. Understand cloud security 3. Create logging and monitoring control 4. Use a secure operating system to build medical devices 5. Remember that deployment security is equally important
All aboard the CMMC bandwagon! | Entrust Blog
How to Delete Empty Lines in Files Using Grep, Sed, and Awk
How to set up and use Python virtual environments for Ansible | Enable Sysadmin
How to Install Plex Media Server on Ubuntu 20.04 LTS Server/Desktop
Set Up Response Policy Zone (RPZ) in BIND Resolver on Debian/Ubuntu
Penetration Testing Automation | Cybersecurity | CompTIA
25 Useful IPtable Firewall Rules Every Linux Administrator Should Know
Best Digital Forensics Tools & Software 2021 | eSecurity Planet
Building back better to modernise healthcare - VMware EMEA Blog
Combating Cybersecurity Burnout Through Self-care, Empathy, and Empowerment | Security & Compliance Blog | VMware
The World Health Organization defines burnout as a syndrome resulting from unmanaged workplace stress. Physical exhaustion and emotional exhaustion are critical components of that. In addition, ineffective work processes and workflow while “doing more with less,” can lead to a sense that decision-makers do not get it, or they do not care. That is when cynicism sets in.
How to: 4 Ways to Cloud in 5 mins. (Multi, GCP, AVS, AWS)
AWS Named as a Leader for the 11th Consecutive Year in 2021 Gartner Magic Quadrant for Cloud Infrastructure & Platform Services (CIPS) | AWS News Blog
Monitoring processes inside a vm with PowerCLI | Virtu-Al.Net
A Small Furniture Company in Hokkaido Created 5000 Medal Cases for the Tokyo Olympics - Spoon & Tamago
What Is Real: Incident Responders Face Uptick in Time Stamp Manipulation | Security & Compliance Blog | VMware
From the Canyon Edge: Working from Home: Lessons Learned Over 20 Years & a Shopping List
Azure security 101: Security essentials, logs, authentication, and more - ManageEngine Blog
System Hardening with DISA STIGs and CIS Benchmarks
If your network or assets aren’t set up securely, they will always be vulnerable — no matter how much you spend on security solutions. That’s where system hardening comes in.
A New York special: NYDFS cybersecurity regulation (23 NYCRR 500) – Reflectiz
NYDFS
Microsoft Word - SecurityOrb - Parent Child Online Agreement.docx - SecurityOrb-Parent-Child-Online-Agreement.pdf
Getting to Know DevSecOps | Hyperproof
3 Best Practices for Building Secure Container Images
Practice Vulnerability Scanning Make the Container Images as Simple as Possible Run the Container as Non-Root Security as a Source of Trust
5 major benefits of early security testing | Acunetix
Benefit 1: Simplifying Fixes Benefit 2: Building Developer Responsibility Benefit 3: Educating Developers on Security Benefit 4: Saving Even More Time Benefit 5: Avoiding Premeditated Exposure
The Guide to Presenting Information Security's Business Value
1/3rd of Organizations Take No Action After Detecting a Cyber Attack
Well that is depressing
Ransomware Defense: Three Implementations Every Security Team Needs - Security Boulevard
Cyber Resilience Starts With Visibility: How Risk Quantification is Imperative to Improving Security Posture - Security Boulevard
ROC-n-SOC: Creating Risk Operations Centers to Support SOCs
Malicious Life Podcast: The Story of L0pht Heavy Industries, Part 1 - Security Boulevard
How Misconfigured Amazon S3 Buckets Can Lead to a Ransomware Attack - Security Boulevard
Ensuring Security and Compliance for Global Healthcare - Security Boulevard
How to Run a Security Tabletop Exercise | Hurricane Labs
Continuous Compliance with CIS Benchmarks
CISO Stories Podcast: Doing Security Before Security Was a Career Path - Security Boulevard
How to Increase & Justify Your Cyber Security Budget | DFLabs
Building a Security Conscious Workforce - Security Boulevard
Three Years In: An Update on the Georgia Cyber Center - Security Boulevard
Types of Penetration Testing, benefits and drawbacks | Indusface Blog
Malicious Life Podcast: The Story of LØpht Heavy Industries, Part 2 - Security Boulevard
Ghidra 101: Creating Structures in Ghidra | The State of Security
GrammaTech Releases CodeSonar 6.0 with Improved Analysis, Visualization, Reporting and Unified Java Analysis - Security Boulevard
11 'df' Command To Check Disk Space In Linux With Examples | LinuxTeck
Part-2: 25 Basic Linux Interview Questions & Answers | 2DayGeek
Part-1: Basic 25 Linux Interview Questions and Answers | 2DayGeek
What Is Cyber Command’s Role in Combating Ransomware? - Lawfare
Why Van Buren Is Good News for Cybersecurity - Lawfare
Responsible Cyber Offense - Lawfare
On Sexual Harassment in Japan (Part 3): A Modest Proposal | This Japanese Life.
On Sexual Harassment in Japan (Part 2): For ALTs | This Japanese Life.
On Sexual Harassment in Japan (Part 1) | This Japanese Life.
Penetration testing: A yearly physical for your applications
Don’t Put Off Cybersecurity Incident Response Planning - Security Boulevard
The NIST Incident Response Lifecycle contains four steps: Preparation Detection and Analysis Containment, Eradication, and Recovery Post-Incident Activity
75% of Leaders Lack Confidence in Their Web Application Security
Creating Cloud Security Policies that Work | The State of Security
What to Expect from PCI DSS 4.0 - Security Boulevard
While the main 12 requirements are not anticipated to change in any drastic way, one of the main goals that stands out is to “promote security as a continuous process.”
What's Good for Fintech Is Good for All Our Clients - Ermetic
Various Types of Software Bugs - Vol1 - Security Boulevard
How Advanced Automation and New Technologies are Enabling Enterprises to Do More with Less
The speed of business is fast – is your PKI keeping up? | Entrust Blog
ABCs of UEBA: V is for Vulnerability | Gurucul Stops Zero Day Attacks
How Frequently Should We Run a Vulnerability Scan? | Indusface Blog
1. Good Cyber Hygiene and Situational Awareness 2. Risk of Emerging Threats During the Scan Gaps 3. Compliance Standards 4. Major Infrastructural and Other Changes 5. Agility
Securing APIs: Empowering Security - Security Boulevard
The First Step to Achieving DevSecOps Is Shifting Security Culture Left - Security Boulevard
How Organizations Can Change The Security Behavior of Their Employees? - Kratikal Blogs
6 Stages of Risk and Compliance Program Maturity and the Opportunities for Automation - Security Boulevard
Cyberattacks can cost hospitals $47K per hour of downtime
Seven survey insights: 1. Nearly half of the hospital executives surveyed (48 percent) were forced to or proactively shut down in the last six months because of cyberattacks or queries. 2. For hospitals that experienced a shutdown, large hospitals were shut down for 6.2 hours on average, which cost them about $21,500 per hour. Midsize hospitals were shut down for 10 hours on average at $45,700 per hour. 3. Even though cyberattacks are a prominent threat to hospitals, 60 percent of hospital IT teams have other spending priorities. Less than 11 percent of respondents said cybersecurity is a high priority spend. 4. Most hospitals are unprotected against common vulnerabilities. Three in 4 respondents said their hospital was not protected against NotPetya, followed by 64 percent of respondents who said their hospital is unprotected against WannaCry and 52 percent of respondents who are unprotected against Bluekeep. 5. Fifteen percent of respondents from midsize hospitals and 13 percent of respondents from large hospitals said they have no way to determine the number of inactive or active devices within their network. 6. Two in 3 IT teams said they are adequately staffed for cybersecurity. 7. More than half of respondents (58 percent) said they have cyber insurance.
Taking Steps Toward an Impactful SASE Architecture - Security Boulevard
Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics - Security Boulevard
A Historical Perspective of Cybersecurity Frameworks | Axio
When You Can’t Add Cybersecurity Staff Build Cyber-Resiliency Instead - Security Boulevard
Ethics: University of Minnesota's hostile patches - Security Boulevard
Developer Security Champions Rule the DevSecOps Revolution - Security Boulevard
DevSecOps
Three Best Practices When Accessing the Dark Web for Investigations - Security Boulevard
Cyber Security for Manufacturing Firms: 5 Reasons & 5 Ways - Kratikal Blogs
1. The Rising Instances of Cyber Crimes 2. Manufacturing Industry Has a Lot to Offer 3. Manufacturing Firms are Vulnerable in Many Ways 4. Manufacturing Industry is Still Learning 5. Business Competition
Why we use Containers and Kubernetes - an Overview - Security Boulevard
Manual Security Audits vs. Continuous Audits - Sonrai Security
Protecting Electronic Health Records (EHR) With Continuous Monitoring
Why Ransomware Is Making Our Healthcare Worse - Security Boulevard
Perspectives in Healthcare Security
Important Strategies for Aligning Security With Business Objectives - Security Boulevard
Domains and practices and levels – oh my! Making sense of CMMC | Entrust Blog
Using Ikea Guts To Add Sonos Compatibility To A Vintage Speaker | Hackaday
Random Robot Makes Random Art | Hackaday
Julius Sumner Miller Made Physics Fun For Everyone | Hackaday
The Soviet RBMK Reactor: 35 Years After The Chernobyl Disaster | Hackaday
AVR Bare Metal With Lisp | Hackaday
VCF Swap Meet Takes Step Back To Move Forward | Hackaday
Linux Fu: A Little Bit Of (Network) History Repeating Itself | Hackaday
Pi-Based Spectrometer Puts The Complexity In The Software | Hackaday
Choosing a Cyber Security Framework | Web Application Security
Diminish Your Vulnerability to School Ransomware Attacks in 10 Ways
The Role of Translation in Cyber Security and Data Privacy - Security Boulevard
The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government - Security Boulevard
The Night Witches of WWII - Security Boulevard
7 Types of Phishing: How to Recognize Them & Stay Off the Hook - Security Boulevard
Google noted a more than 600% spike in phishing attacks in 2020 compared to 2019 with a total of 2,145,013 phishing sites registered as of January 17, 2021, up from 1,690,000 on Jan 19, 2020. It is the gateway to many types of damaging cyberattack including ransomware, malware, business email compromise (BEC), spoofing, identity theft, brand impersonation and credential compromise.
Protecting Industrial Control Systems Against Cyberattacks - Part 1 - Security Boulevard
The Kubernetes Network Security Effect - Security Boulevard
The Key to Cybersecurity is an Educated Workforce - Security Boulevard
Workforce Cyber Intelligence 104: Examining Protection Against External & Internal Threats - Dtex Systems Inc
Genetically Modified Mosquitos: Biohacking For Disease Prevention | Hackaday
API Security Need to Know: Lessons Learned From the Peloton Security Incident | Cequence
he API vulnerabilities that led to the Peloton disclosure can be mapped to the OWASP API Security Top 10 vulnerabilities: API2:2019 Broken User Authentication API3:2019 Excessive Data Exposure API4:2019 Lack of Resources & Rate Limiting. Once discovered, a threat actor could scrap
How to Improve Your Security Incident Response with Automation - Security Boulevard
6 Amazing Idea Generation Tips to End Your Creative Drought – Business
Legacy Software Assessment: A Checklist for Enterprises – Business
Happy SysAdmin Day – Reflections of a former SysAdmin » Welcome to vSphere-land!
T-Mobile investigates claims of giant customer data breach | Engadget
The History Of Neon Lights | Hackaday
A Standing Desk On The Cheap | Hackaday
Soil Moisture Sensors, How Do They Work? | Hackaday
Should I Automate This? | Hackaday
Practical Sensors: The Hall Effect | Hackaday
5 Top Cloud Security Threats and Tips to Mitigate Them - Security Boulevard
1. Unauthorized Access to Data 2. Distributed Denial of Service (DDoS) Attacks 3. Cloud Misconfiguration 4. Data Leaks and Data Breaches 5. Insecure API
Taking Screenshots with EyeWitness | itsec.siers.ch
What is the difference between VDI desktop virtualization and virtual machines
Two year update: Building an Open Source Marketplace for Kubernetes
The Need for A Cloud Native Tunnel
XDR Demands a New Approach to Security—and Business - Security Boulevard
What domain name to use for your home network
home.arpa
Hitting the Books: How a radio telescope cost this West Virginia town its modernity | Engadget
Maintainance of GeoIP legacy databases | Blog of Patrick
The history of VMware vSphere | VM Spot
How Offensive AI Can Disarm Cybersecurity - Security Boulevard
Demystifying SSD Security - Security Boulevard
Can Managed Security Keep Businesses Safer? - Security Boulevard
Growing Up With Computers | Hackaday
The Other First Computer: Konrad Zuse And The Z3 | Hackaday
Linux Fu: Databases Are Next-Level File Systems | Hackaday
Don't look away - Open Canada
Professional Certifications, Reboot! - Security Boulevard
Achieving PCI DSS Compliant Firewalls within a Small Business - Security Boulevard
Discarded Plastic Laser-Cut And Reassembled | Hackaday
USB Rechargeable LiPo Pack for Original Gameboy | Hackaday.io
DIY Fume Extractor Keeps Air Clean While You Solder | Hackaday
The Story Behind Ohm’s Law | Hackaday
Faulty Electrolytic Caps Don’t Always Look Bad | Hackaday
What’s Chia, And Why Is It Eating All The Hard Drives? | Hackaday
DIY Air Quality Sensor | Hackaday
Throne Of Dev: An Endgame Office Chair | Hackaday
Virginia Apgar May Have Saved Your Life | Hackaday
How to Protect Medical Devices from Ransomware - Security Boulevard
How to Interpret the Various Sections of the Cybersecurity Executive Order - Security Boulevard
What is Application Security Testing and How Does it Affect Software? - ZeroNorth
Static AppSec Testing (SAST) inspects the static source code of an application, testing the internal operations of the system, to report weaknesses in the software. Dynamic AppSec Testing (DAST) focuses on behavioral testing of applications, which means it is based on software requirements and specifications. Interactive AppSec Testing (IAST) tools combine the two approaches of SAST and DAST tools to find a broader range of security weaknesses and to provide important information on the root cause of vulnerabilities—including specific lines of problematic code. Software Composition Analysis (SCA) tools help manage the use of open source components by performing automated scans of an application’s code base.
Five Lessons from the JBS Attack for Securing the Manufacturing Supply Chain - Security Boulevard
Lesson 1: Control Access to Ecosystem Applications Lesson 2: Automate Identity Governance Lesson 3: Strengthen Authentication Lesson 4: Secure Non-Human Identities Lesson 5: Modernize the Right Way
How to Secure Jenkins Pipelines without the hassle - Security Boulevard
Cybersecurity and Compliance for Healthcare Organizations
The Perils of a Running Start: Can You Skip SOC 2 Type 1? - Security Boulevard
Learn Ghidra from Your Home at Black Hat USA 2021
10 Most Common CMMC Compliance Questions | PreVeil
Ghosts in the Machine – Looking at OT & IT Convergence
5 factors for evaluating an RMM tool for the modern MSP - ManageEngine Blog
Healthcare cybersecurity: Our 6-step plan to secure healthcare data - ManageEngine Blog
Scan for ePHI in your storage Assess the risks associated with stored ePHI Classify the files containing healthcare data Audit all accesses to sensitive files Monitor data uploads and downloads Implement a data loss prevention (DLP) strategy
Extending Visibility and Security to Network and Unmanaged Devices - Security Boulevard
Sitdown with a SOC Star: 11 Questions With Siobhan Kelleher of Boston College - Siemplify
Siobhan Kelleher
Server Side Scans and File Integrity Monitoring
10 Things You Might Not Know About Cyber Essentials - Security Boulevard
Four compliance considerations for government bidding | Entrust Blog
81% of Developers at Large Organizations Admit to Knowingly Releasing Vulnerable Applications - Security Boulevard
How to Clear RAM Memory Cache, Buffer, and Swap on Linux
#Clear PageCache only. sync; echo 1 > /proc/sys/vm/drop_caches #Clear dentries and inodes. sync; echo 2 > /proc/sys/vm/drop_caches #Clear pagecache, dentries, and inodes. sync; echo 3 > /proc/sys/vm/drop_caches
Subplot 0.2.2 released—acceptance testing tool
My Pi-Hole Setup · vNinja.net
Human Resources, Part 2 - Source Defense
Randy Paszek
Human Resources, Part 1 - Source Defense
Oracle Auditing Part 1: Standard Auditing - Security Boulevard
5 Signs It’s Time for A Web Application Penetration Test - Security Boulevard
Your System/ Service Is Going Live/ Into Production You Have Made Significant Changes to Infrastructure/ Web Applications Significant changes to the infrastructure or web applications include: installation of new software/ infrastructure/ applications modifications to code old software being decommissioned new third-party services onboarded new physical office sites being added to the network physical office relocation introduction of new IoT devices into the system network equipment changes, etc. You Have Applied Security Patches You Have Modified Policies Your Industry Is Being Regularly Targeted
Confidential Computing Consortium Adds End User Advisory Council - Security Boulevard
Confidential Computing Consortium - Open Source Community
Securing Single-Page Web Applications - Security Boulevard
Evaluating XDR Against EDR, SIEM and SOAR Solutions - Security Boulevard
Solarize your Home Lab, and your Home
Understanding the Fundamentals of Cybersecurity Frameworks | Axio
CMMC is not as scary as you think | Entrust Blog
The Truth About Zero-day Vulnerabilities in Web Application Security | Indusface Blog
The Top Three Weaknesses in Healthcare Cybersecurity - Security Boulevard
Phishing Is a Rising Threat to Healthcare Patient Portal Defenses Pose Major Cybersecurity Issues Healthcare Browser Use Is Still a Serious Concern
5 Steps in Your CMMC Compliance Checklist | Apptega - Security Boulevard
1. Assess Your CUI 2. Leverage Other Federal Frameworks 3. Read the CMMC Appendices and Assessment Guides 4. Complete NIST Special Publication 800-171 5. Find the Right Partners
New Age Network Detection: Introduction - Security Boulevard
There is a lot to unpack there. What kind of actions should you be taking? Shorter term: We’re particularly guilty of overestimating progress because most of the work we do is cloud security assessment and architecture, forcing us to live in the future. Yet, the cloud still makes up a tiny percentage of total workloads. Sure it’s growing fast, probably faster than anything we’ve seen from a technology disruption standpoint. But all the same, it will be years before corporate data centers are not a thing, and we don’t need those enterprise networks anymore. So we’ve got to continue protecting the existing networks, which continue to get faster and more encrypted, complicating detection. Longer term: If we have underestimated progress over the next decade, that’s nuts since we’ve been pretty clear that how we build, deploy and manage technology will be fundamentally different over that period. If we step into the time machine and go back ten years, the progress is pretty incredible. For security, the APT was just getting started. Ransomware wasn’t a thing. AWS was in its early days, and Azure and GCP weren’t things. That means we need to ensure flexibility and agility in detecting attackers on a mostly cloud-based network, as progress doesn’t just apply to the defenders. Attackers will likewise discover and weaponize new techniques.
Building a complete network security checklist - ManageEngine Blog
SOC 2 Admin and Control Owner Responsibilities — and Tips for Passing an Audit - JumpCloud
Three Steps to Meet Digital Healthcare Challenges in the Post-Pandemic Era - Security Boulevard
With cybersecurity and digital experience at the forefront, I and my Accenture colleagues consistently hear healthcare leaders asking the following questions: How do I know that the person online is who they say they are? How do I protect my organization, yet make it frictionless for users to interact with us? How do I allow my employees to do their work from home, yet still protect them and our organization’s assets? What’s the fastest path to achieving the safety and security of sensitive patient data while meeting consumer (patient/member) experience demands? Step One: Align Healthcare IT, Digital Experience Stakeholders, and Industry Experts Step Two: Modernize IAM for Security and Experience on Your Terms Step Three: Layer AI and ML On Top of Your Current Investments
Ransomware Reshapes Health Care Security Landscape - Security Boulevard
zations should also monitor all privileged accounts and critical systems for unusual behavior and educate users on typical phishing attacks, which are often a source of ransomware,” Dunne said. “In terms of preventing damage once ransomware has found its way on the network, security leaders should be putting into place practices and procedures related to backing up infrastructure from storage.”
Acunetix introduces software composition analysis (SCA) | Acunetix
ISO 27001 Certification Project Implementation Plan | Hyperproof
1. Secure executive buy-in in the beginning. 2. Hire an outside expert to conduct a gap analysis if you’re not familiar with ISO 27001 or comparable security compliance frameworks. 3. Appoint a project leader. 4. Be careful about scoping the ISMS. 5. Establish a risk management framework that meets the requirements of ISO 27001. 6. Break down control implementation work into smaller pieces. Use a visual project management tool to keep the project on track. 7. Map existing controls to ISO 27001 requirements. 8. Document things as you go so preparing the Risk Treatment Plan and Statement of Applicability (SoA) take less effort. 9. Consider scheduling multiple audits at the same time. 10. Use a compliance operations platform
Analysis of 100 Data Breaches: Part 2, What are the root causes of breaches?
Lessons Learned from 100 Data Breaches: Part 1, What Specific Types of Data Get Stolen?
Lessons Learned from 100 Data Breaches: Part 3, Securing Public Cloud Services
Introducing Student LogWars — A LogRhythm EDU Partnership Program | LogRhythm
What’s new in v8 of the CIS Controls from the Center for Internet Security
CISOs Say Application Security is Broken - Security Boulevard
Designing and Building a Security Architecture - Security Boulevard
Conceptual views focus on the business perspective for non-technical audiences. Logical views dig into process, technology and people for business process owners. Physical views describe the IT infrastructure for subject matter experts.
Bell Labs, the Colonial Pipeline and Multi-Factor Authentication (MFA) - Security Boulevard
5 Tips and Tricks for Improving Cloud Native Security
White House Cyber Memo Long Overdue for Business Executives | Axio
A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next - Security Boulevard
Here, we wanted to quickly summarize some of the challenges, covering the usual range of people, tools, and processes: Uncommon log collection methods (compared to on-premise systems). Cloud providers haven’t necessarily simplified this journey for customers, even though, compared to 2012, decent logs actually exist today in many cases. Telemetry data volumes may be high (especially from all those web-facing production systems); this has sometimes led to “log fragmentation” where cloud logs never make it to a SIEM, but are left to rot in some storage buckets in the cloud. Egress costs are there sometimes, especially if you want to move the logs from one cloud to another for analysis. Alien licensing models for security tools (compared to on-premise), some teams can’t afford what they used to be able to afford on-premise or they can’t afford a new cloud-native tool in addition to the on-premise tool they already have. Alien detection context — instances, containers, microservices, etc — has confused many teams born and raised on server names and IP addresses for context. This topic is big enough to be explored in a dedicated post later. Lack of clarity on cloud detection use cases is there despite useful resources like ATT&CK Cloud. Sadly, cloud providers haven’t necessarily simplified this journey for customers either, and many traditional SOC teams are not sure what to detect in the environments that their business is using today (“is this container access bad?”). Also, there is a lot of cloud; this means governance sprawl causes visibility gaps for the SOC. Examples include shadow IT (“BYOCloud” and SaaS purchased by departments) as well as other cloud sprawl (that is why people are reaching for all those novel attack surface management tools; this should help). SOC teams lacking cloud skill in general; complex public/hybrid/multi — cloud scenarios require more extensive knowledge of various technologies, their security implications, diverse (and alien) data sources, while SOC teams are too busy doing D&R to grow their cloud skills. For those organizations trying to stick to old on-premise tools many other challenges abound; tools don’t support many cloud telemetry sources — they lack collection machinery, parsing/analysis, use cases, useful visuals, etc. Also, log support is often not done at “cloud speed.” Lack of input from SOCs into cloud decisions, ranging from provider choices to IT architecture (and even security architecture). Frankly, many SOC teams are too busy and too focused on threats and don’t have a dedicated headcount focused on preparing their organization for the cloud change …
Ransomware Detection and Mitigation Strategies in OT/ICS Environments | LogRhythm
Additional information for your zone configuration. | blog.moellenkamp.org/c0t0d0s0.org
International Verify Your Backups Day - TidBITS
CMMC-AB |
Checklist for a successful network segmentation within a Health System - Forescout
Five simple steps towards segmentation 1. Establish visibility 2. Classify 3. Visualize baseline traffic 4. Design and simulate 5. Monitor and respond
Overcoming Compliance Issues in Cloud Computing
DTEX C-InT Brief: Up to 60% of Employees Research or Trade Cryptocurrency on Corporate Devices - Dtex Systems Inc
A Road to a Consistent Encryption Strategy | Entrust Blog
4 Ways CISOs Can Strengthen Their Security Resilience
Increase Situational Awareness Secure Workloads & Kubernetes Environments Track Identities on the Move Activate Your Threat Hunting Program
3 Common Cybersecurity Threats Must Worry About | Indusface Blog
Phishing Ransomware Attacks Insider Threats
Packet Captures in the Age of TLS - Security Boulevard
A Logging History Lesson – From syslogd(8) to XDR - Security Boulevard
Getting Ahead of Mandatory Cybersecurity Guidelines for Critical Industries - Ericom Blog
New Requirements for Pipeline Companies On May 28, 2021, TSA issued Security Directive Pipeline-2021-01. See the directive for details; in general, the new regulations include: Companies must designate a Cybersecurity Coordinator who is to be available 24×7. Cybersecurity incidents must be reported to CISA (Cybersecurity and Infrastructure Security Agency). Companies will be required to review their cybersecurity measures and identify any gaps. Identify remediation measures to address cyber-risks. Report the results to TSA and CISA within 30 days.
What are the keys to a successful cybersecurity strategy? Our CEO Ran Shahor Explains All - HolistiCyber
So, the idea is to be better protected compared to others in your business environment, to be more efficient and optimize your cyber security defense budget. They don’t look at the whole picture of the business environment, the main viable threats and come up with a relevant strategy. Building a cyber security strategy is the most cost efficient and secure way of moving forward. One of the first challenges I encountered was when I needed to establish the division of the attack teams in the Israeli Military. This was at a time when the world was in the exceedingly early stages of public internet and mobile phone usage. instead of doing what everybody else is doing, to offer a different, fresh, and effective approach
How to Relieve Vendor Risk Assessment Headaches: Tips | Hyperproof
Challenge #1: Maintaining an up-to-date list of vendors Challenge #2: Developing a security questionnaire that generates meaningful insights about a vendor’s risk profile Challenge #3: Managing remediation projects and monitoring vendors after on-boarding Challenge #4: Providing proof of your vendor risk management activities for compliance purposes
Why Now: How CyberSaint is Making Automated Risk Assessments Possible with NLP - Security Boulevard
How to Pitch Your CFO on Automated Security Control Validation - AttackIQ
Three Ransomware Attacks that Upped the Ante - Security Boulevard
Installing Acunetix on Docker | Acunetix
A Guide To Automated Continuous Security Testing - Security Boulevard
Why Food and Agriculture Need to Accelerate Security Measures in the Second Half of 2021 - Security Boulevard
Michelin Drives Sustainable Mobility Using Data and DevOps - Security Boulevard
How to Build a Cybersecurity Culture - Security Boulevard
Top 5 Physical Security Considerations - Security Boulevard
Connecting RaaS, REvil, Kaseya and your security posture - Security Boulevard
Cities Key in War on Ransomware, Neuberger Tells Mayors - Security Boulevard
Using Fiberoptic cabling for Ethernet Networks | The Automation Blog
Cockpit: manage ALL your servers – Marksei
Troubleshooting Application Performance and Monitoring with Selenium
Learn the Internet of Things with "IoT for Beginners" and Raspberry Pi - Raspberry Pi
Collection of Raspberry Pi retro tech projects - Raspberry Pi
Create secure code with Secure Code Bootcamp - Rule of Tech
The Elephant in the Risk Governance Room - Security Boulevard
Infographic - 7 Common SSL/TLS Certificate Errors and How to Avoid Them - Security Boulevard
New Paper: “Autonomic Security Operations — 10X Transformation of the Security Operations Center” - Security Boulevard
So, please see a tiny subset of my favorite quotes from our paper: “Autonomic Security Operations is a combination of philosophies, practices, and tools that improve an organization’s ability to withstand security attacks through an adaptive, agile, and highly automated approach to threat management. “ “An unfortunate common theme of many cloud transformations is that the SOC requirements get deprioritized when organizations have tight timelines and budgets to drive their teams to the cloud. The reason being, most SOC teams are too busy fighting fires and don’t have the spare cycles to focus on adapting their use cases to cloud workloads and modernizing their own infrastructure.” “To be 10 times more effective with the people component, your SOC cannot achieve this by increasing the personnel by a factor of 10. As of today, both threats and technology resources that need effective security are increasing at a much faster pace than people entering the workforce. […] It is absolutely impossible for most organizations to 10x their headcount in a SOC.” ”At Google and across other industry-leading security operations teams, the role of an analyst is not simply to manage cases and perform tier-1 level work. Analysts are engineers, architects, project managers, and are empowered to be leaders of their subject matter focus. At such a SOC, the concept of Level 1 to Level 3 analysts is a thing of the past, rather, you should organize teams based on aligning skills to the use cases that fall under their purview.” “The SOC can only truly be 10X and transformative if it also has strong influence over the upstream elements of the security lifecycle. You can make a significant impact on the amount of alerts that get into your SOC if your team has a strong integration with your DevOps practice. A deep understanding of how infrastructure and applications are securely built, deployed, and managed across your organization paired with your ability to influence this design can only improve your ability to catch attackers at their earliest onset, or even better, prevent them from getting in entirely.”
Case Study: High Security Architecture for Healthcare Networks - Security Boulevard
Best practices for IT teams to prevent ransomware attacks - Help Net Security
To My Fellow CEOs: Cyber Security is Your Business Too! - Kratikal Blogs
A Security Checklist for Your Startup - JumpCloud
How Different Personality Types Cope with an Always-On Culture
Focus their attention on the outside world of people and things (extraversion) or on their inner world of thoughts and feelings (introversion) Trust and use information on the basis of experience and the evidence of their five senses (sensing) or consider the future and how things connect to form a big picture (intuition) Make decisions on the basis of objective logic (thinking) or on the basis of their values and how the decision will affect people (feeling) Live in a more structured, organized way (judging) or in a more flexible, spontaneous way (perceiving) 1. Create time and space to switch off. 2. Beware of information overload. 3. Create boundaries. 4. Find a work/life balance that suits you.
How purple team operations helped defend the Pentagon - and can help your security team today. - AttackIQ
Sitdown with a SOC Star: 13 Questions With Axel Schulz of the University of Toronto - Siemplify
Still love the shared SOC concept.
What to Consider When Crafting Your OSS Policy
How To Clean Up Your Digital Footprint | Avast - Security Boulevard
What to Know Before Your Business Moves to the Cloud - Security Boulevard
Top 10 Tips to Fight OWASP Top 10 Vulnerabilities | Indusface Blog
#1 Take a Zero-Trust Approach to Security #2 Use a Next-Gen, Intuitive and Managed Web Application Firewall (WAF) #3 Implement a Strong Password Policy and Multi-factor Authentication #4 Encrypt all Sensitive Data #5 Establish Proper Access Controls #6 Input Validation is Critical #7 Maintain High Standards of Cyber Hygiene #8 Establish Effective Logging and Monitoring #9 Regular Scanning, Audits and Pen-Tests #10 Follow Secure Coding Practices
Practical solutions for a secure automotive software development process following ISO/SAE 21434 | Synopsys
ISO/SAE 21434
Cloud (in)security: Avoiding common cloud misconfigurations
R - Restrict Access by Least Privilege E - Encrypt All Data At rest & Flight D - Disable Cloud Resources That Are Not Needed P - Prevent Access to Privileged Accounts E - Ensure Encryption Keys are Rotated N - Need NDR and HBM for 100% visibility into Layer 2 & 3
An incomplete list of skills senior engineers need, beyond coding | by Camille Fournier | Medium
Computer Security and Data Privacy, the perfect allianceSecurity Affairs
The True Meaning of Technical Debt 💸 - by Luca Rossi - Refactoring
He talks of disagreement between business needs and how the software has been written. But how do we land to such disagreement? In my experience, there are two offenders: 🎨 Wrong Design — what we built was wrong from the start! 🏃 Rapid Evolution — we built the right thing, but the landscape changed quickly and made it obsolete.
New Pro-Ocean crypto-miner targets Apache ActiveMQ, Oracle WebLogic, and Redis installsSecurity Affairs
Dutch police arrested 2 people for the illegal sale of COVID-19 patient dataSecurity Affairs
President Biden's Peloton exercise equipment under scrutinySecurity Affairs
The 10 Best Practices for Remote Software Engineering | Opinion | Communications of the ACM
Work on Things You Care About. Define Goals for Yourself. Define Productivity for Yourself. Establish Routine and Environment. Take Responsibility for Your Work. Take Responsibility for Human Connection. Practice Empathetic Review Have Self-Compassion. Learn to Say Yes, No, and Not Anymore. Choose Correct Communication Channels.
Modern Javascript: Everything you missed over the last 10 years by Sandro Turriate
The UI & UX Tips Collection: Volume Two. | Marc Andrew
GitHub - lirantal/awesome-nodejs-security: Awesome Node.js Security resources
How to Handle Secrets on the Command Line
Uncomplicate Security for developers using Reference Architectures | Medium
Educating young people in AI, machine learning, and data science: new seminar series - Raspberry Pi
MicroK8s: getting started with Kubernetes – Marksei
Best Practices For Social Media Security
Five Great Reads on eDiscovery for April 2021
Microsoft 365 Security Best Practice – 10 Ways To Secure Your Microsoft 365
PowerShell Event Log Mining • The Lonely Administrator
Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021 - Security Boulevard
Culture is Defined by the Worst Behavior Tolerated
Java mon amour: AppDynamics presentation
Ryobi battery won't charge? Two possible fixes - The Silicon Underground
g enough for the good battery to transfer sufficient charge to the flat battery. Disconnect the wires, then put the flat battery in your charger to see if they get along now. If not, you can probably guess what’s next. Try every Ryobi charger you own. And if none of them want to play, you can try jump starting the battery again for another five minutes, but if the second jump start isn’t successful, the battery is probably too far gone.
OODA Loop - Mitigating Cyber Risk In An Age of Continuous Crisis
Linked: 1 in 4 employees say they still have access to accounts from past jobs, survey finds
Josef “Jeff” Sipek » Explicit, Automatic, Magical, and Manual
explicit & automatic = good magical & manual = bad Avoid Magical Behavior Error Out when Uncertain Provide Interfaces and Tools Create Low-level Primitives Avoid Commitment Be Consistent
Some notes on PWM on the Raspberry Pi · The Odd Bit
Ansible for Infrastructure Testing · The Odd Bit
Stupid Ansible Tricks: Running a role from the command line · The Odd Bit
Defense Cybersecurity: Defense Logistics Agency Needs to Address Risk Management Deficiencies in Inventory Systems | U.S. GAO
Cybersecurity: Federal Agencies Need to Implement Recommendations to Manage Supply Chain Risks | U.S. GAO
Cyber Insurance: Insurers and Policyholders Face Challenges in an Evolving Market | U.S. GAO
Software Development: DOD Faces Risks and Challenges in Implementing Modern Approaches and Addressing Cybersecurity Practices | U.S. GAO
Cybersecurity and Information Technology: Federal Agencies Need to Strengthen Efforts to Address High-Risk Areas | U.S. GAO
Cybersecurity: HHS Defined Roles and Responsibilities, but Can Further Improve Collaboration | U.S. GAO
DIY air quality monitor – Dangerous Prototypes
How to be a #DailyLearner | Don Jones
Razor Tooth Pruning Saw | Cool Tools
US healthcare: hazardous to your health – Countries Beginning with I
Remote work: In any multinational, someone is always remote – Countries Beginning with I
Improving the Deployment Experience of a Ten-Year Old Application - Code as Craft
Prime Minister Boris Johnson wants to enhance UK cyber capabilitiesSecurity Affairs
Data Breaches Tracker monitor unsecured ElasticSearch servers onlineSecurity Affairs
Deploy SQL Server – The Ansible way! - Microsoft Tech Community
.
Kitchen Cleaning Hacks | Kitchn
NPR : National Public Radio
from Cool Tools
Step by Step Guide to Setup LDAPS on Windows Server - Microsoft Tech Community
Stain Devils | Cool Tools
Increasing experimentation accuracy and speed by using control variates - Code as Craft
CUPED
Dedupe, or not dedupe – that is the question | Tony Yan
WINTRIAGE: THE TRIAGE TOOL FOR WINDOWS DFIRERSSecurity Affairs
Books With a Purpose That Can Help Shape Your Child’s Future | Penniless Parenting
What Will Cybersecurity Look Like Over the Next Five Years? - Security Boulevard
Top 20 Problems FIM Can Help Solve Part 1
1. SECURITY RISKS INCLUDING ZERO-DAY THREATS 2. 24x7 SITUATIONAL AWARENESS 3. CONCEPT OF "ZERO TRUST" SECURITY 4. INSIDER THREATS 5. SKILLS GAP 6. STAFF OVERLOADED 7. NETWORK NOT RESILIENT
Essential Protection for Legacy Applications – Part 1 - Security Boulevard
Microsoft is open sourcing CyberBattleSim SimulatorSecurity Affairs
Six Terms to Up Your IoT Vocabulary - Security Boulevard
Things: This is the “T” in IoT. It refers to any device, process, or machine that becomes part of the infrastructure or your organization and needs to be managed. The term is casually used in conversation, as in: “How many things do we have operating on our network?” RPA: This acronym spells out Robotic Process Automation, which is the ability of a machine to consistently and repeatedly perform a pre-programmed task. Think of it as a claims agent process for an insurance company that can automate inputting claims faster and with fewer errors – far exceeding human capabilities. The next iteration of RPA involves artificial intelligence (AI), which moves RPA out of the static, rule-based arena and into self-driving IoT intelligence. Identity of Things (IDoT): This term refers to identifying, registering, and managing the full lifecycle of all the “Things” in your domain, just like you do human identities. This term is sometimes derisively referred to as ‘IDIOT’, but there is nothing dumb about IDoT. In fact, it’s likely the future of IoT. IoT IAM: This acronym is equivalent to the Internet of Things Identity and Access Management. That’s a mouthful, but just like IDoT, it’s another way to reference managing the full lifecycle of IoT devices on your network – when they join, move, and leave. IIoT: This is the Industrial Internet of Things and refers to devices used in an industrial or manufacturing environment. Examples include valves, sensors, and instruments used to efficiently and safely run a factory. Another term to represent this is Industry 4.0. Device posture: This is an endpoint security capability that proactively checks whether a device is in a fully secured state as a condition for allowing the device onto the network. If it still has a factory password or it does not have a proper certificate, it’s likely not getting on your network.
Why Do Ransomware Attacks Keep Happening | Digital Defense, Inc.
1. Popular Ransomware Vectors are Nearly Impossible to Close. 2. Paying the Ransom Incentivizes Attackers. 3. Ransomware Attacks are Increasing and Evolving. 4.What Can Be Done to Reduce Ransomware Risk?
Free Active Directory - 10 Users Free with JumpCloud - JumpCloud
(1) New Message!
three things to keep in mind about the shared responsibility model: Although it may seem equal on paper and in visuals, a significant amount of responsibility, implementation and attack surface defense (?) is still on the customer. Don’t underestimate the time and resources you’ll need to invest for each cloud deployment — including any necessary training to bring your team up to speed.
 Certain audit and compliance categories (control families) are made easier by shifting to the cloud via inherited controls from the cloud provider. Inherited controls can include patch management and configuration management and can translate to noticeable cost savings. While your infosec team should drive this strategy, it’s important to engage with other key groups in your organization, particularly the governance, risk and compliance (GRC) and legal departments. The internal audit team can prove especially helpful here. According to a 2018 Deloitte report, “while an organization’s information security group can build cloud monitoring capabilities, [the internal audit team] can assist and assess the effectiveness of the control environment and prevent the IT department being left out of the loop.” 
 Don’t assume the cloud provider holds sole liability in the event of a breach. Even if a scenario were to happen where the cloud provider was found to be at fault, the fallout would still potentially extend to your customers and your organization could be named in and class action lawsuits. In many jurisdictions, legal liability falls to the data owner (ie. the organization using the cloud services) rather than the CSP itself. In short, don’t be complacent. Paying attention to your role in the shared responsibility model can do more than keep your data secure; it can protect your organization in the event of a lawsuit.

Demystifying the 18 Checks for Secure Scorecards - Security Boulevard
SHOCKER: Senate Says Security Sucks—Still - Security Boulevard
Elevating Web App Security to a National Priority - Security Boulevard
Why Your Code Is A Graph. Graph structures and how they are used… | by Vickie Li | Jun, 2021 | ShiftLeft Blog
The Software Bill of Materials and Software Development - Security Boulevard
Why It's Critical For the Healthcare Sector to Reassess their Cybersecurity Posture
HIPAA Penetration Testing - A Primer for Healthcare Security - Virtue Security
For Hackers, APIs are Low-Hanging Fruit - Security Boulevard
The time to prepare for CMMC is now – what we learned from Coalfire - Security Boulevard
Closing the Developer Security Skills Gap | by Vickie Li | ShiftLeft Blog
Cybersecurity report: Average household hit with 104 threats each month - TechRepublic
Average household hit with 104 threats each month
5 building blocks of a well-developed security culture - TechRepublic
How to develop a security culture As to what a well-developed security culture consists of, Malik suggests the following building blocks are needed: Compliance: Written security policies and the extent that employees must adhere to them. Attitude: Individuals must develop a mindset--learned opinions reflecting the organization's security protocols--on what to do or say. Behavior: When the time comes, employees must act or make decisions based on their learned opinions. Cognition: Attitude and behavior are meaningless unless there is an understanding, knowledge, and awareness of security threats and issues. Communication: Cybercriminal activity is not static, there must be methodology to share security-related information in a timely manner. Malik warns, "All of these dimensions are inextricably interlinked; should one falter so too would the others."
Beating the OWASP Benchmark. Achieving a best-in-class OWASP… | by Vickie Li | ShiftLeft Blog
Intro to the Content Security Policy (CSP) | by Vickie Li | ShiftLeft Blog
Managing Open Source Vulnerabilities | by Vickie Li | ShiftLeft Blog
Application Security for builders and creators — part 2 | by Prabhu Subramanian | ShiftLeft Blog
Application Security for builders and creators | by Prabhu Subramanian | ShiftLeft Blog
Rashomon Effect and Product Management | by Alok Shukla | ShiftLeft Blog
Intro to XXE Vulnerabilities: AppSec Simplified | by Vickie Li | ShiftLeft Blog
Shifting Left : A Penetration Tester’s Journey to the Code Analysis Camp | by Vickie Li | ShiftLeft Blog
Secure Developer Challenge May 2021 | by Vickie Li | ShiftLeft Blog
7 tactics for boosting the security of your APIs - TechRepublic
Look at the traffic to your APIs Set security standards for all APIs Review authorization and authentication permissions Bring the procurement team into the conversation Do an API inventory Invest in API tooling Make security training for developers a priority
Medical data security: Top 5 things to know - TechRepublic
Container security: How to get the most out of best practices - TechRepublic
Building a Security-First Culture | by Vickie Li | ShiftLeft Blog
CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable - Security Boulevard
Cybersecurity Insurers Are Putting an End to the ‘Pass the Buck’ Era - Security Boulevard
How to Prevent Supply Chain Attacks by Securing DevOps | by The ShiftLeft Team | Jul, 2021 | ShiftLeft Blog
Developer Education: Learning to Secure Code on Demand | by Katie Horne | Jul, 2021 | ShiftLeft Blog
API Security 101: Broken Object Level Authorization | by Vickie Li | Jun, 2021 | ShiftLeft Blog
SAST vs DAST vs SCA?. Do you know the difference? Test… | by Vickie Li | Jul, 2021 | ShiftLeft Blog
API Security 101: Broken Function Level Authorization | by Vickie Li | Jul, 2021 | ShiftLeft Blog
The Battle Between Linters, Scanners, and Data Flow Analysis | by Katie Horne | Jul, 2021 | ShiftLeft Blog
API Security 101: Lack of Resources & Rate Limiting | by Vickie Li | Jul, 2021 | ShiftLeft Blog
API Security 101: Excessive Data Exposure | by Vickie Li | Jul, 2021 | ShiftLeft Blog
SAST vs. DAST vs. SCA: A Comparison | by Katie Horne | Jul, 2021 | ShiftLeft Blog
API Security 101: Broken User Authentication | by Vickie Li | Jul, 2021 | ShiftLeft Blog
Payment Security: Understanding the Four Corner Model - Security Boulevard
Cybersecurity in Supply Chain Management, Risks to Consider - Security Boulevard
The Growth of Vulnerability Assessment: A Look at What Nessus Offers Today - Blog | Tenable®
More than 28,000 Nessus plugins and updates published by Tenable Research, which continues to lead the industry in CVE coverage, zero-day research and vulnerability management.
Cyber Hygiene Essentials: What You Need to Know - Blog | Tenable®
Cyber Hygiene Essentials: What You Need to Know
NERC CIP-008-6: How Power Grid Operators Can Improve Their Incident Reporting
The new NERC CIP-008-6 regulation challenges power grid operators to differentiate attempts to compromise their environment from other non-malicious cyber incidents.
Securing Classified Telework: 3 Principles for Protecting Sensitive Data
1. Maintain good cyber hygiene 2. Outline vulnerability management procedures 3. Establish streamlined network visibility
Protecting Your Cloud Assets: Where Do You Start?
Three security challenges to address first Your people are not talking to each other: I have seen firsthand the disconnect between the security team and the business units. As one of my IT buddies described it, "trying to work with the business groups is like walking my Yorkshire Terrier on a chilly winter morning. I pulled on the leash to go one way, my dog was pulling in the other direction because it didn't want to go along. At the end, we were both exhausted." In many companies, the security team and the cloud team operate in siloed business units. According to a recent Forrester Consulting study commissioned by Tenable, only half of the more than 400 security leaders surveyed say they work with other teams to align risk reduction objectives with business needs. When your teams are not working together, it is difficult for you to protect, control and gain visibility to your cloud assets, putting your security posture at risk.
 Your business process has gaps: With an on-prem traditional network, it is relatively easy to keep track of workloads and applications. With cloud environments, it is difficult to know just how large your footprint might be. This is because non-IT functions such as marketing and developers often create (then sometimes abandon) cloud assets, making it difficult for you to have a realistic view of all your cloud inventory. For example, one organization I met with recently thought they had 2,000 cloud assets in AWS. After a discovery scan, they found close to 3,500 assets. After we investigated further, we found gaps in their business process with untagged cloud assets and lost child accounts. And this is not an uncommon finding in many organizations.
 "You can't protect what you don't know about!": While this is almost a cliche, it is still very applicable when it comes to securing your cloud assets. Organizations are having a difficult time discovering and assessing ephemeral (short-lived) assets in dynamic cloud environments. According to the Forrester study, only 44% of more than 800 security and business leaders surveyed say their security team has good visibility into their organization's most critical assets. Yet, even when assets are discovered, Tenable's own research shows that only 20% of them are actually assessed for exposures. Why? Because the traditional method of vulnerability management for the cloud is difficult and time consuming. Scanners and agents need to be installed and new vulnerability detections can lag for several weeks. In short, traditional IT security is no match for the speed of the cloud.

Free Certificate for IIS with Let’s Encrypt | PeteNetLive
Hacking a X-RAY Machine with WHIDelite & EvilCrowRFSecurity Affairs
PostgreSQL: Documentation: 9.1: SQL Dump
Script to Collect Hardware Inventory Data
Senate report warns of glaring cybersecurity holes at federal agencies | Engadget
Telegraf / InfluxDB / Grafana | Nelson's log
Using PowerCLI to Update ESXi License - Notes of a scripter
HOWTO: Configure Accurate Time in Active Directory - The things that are better left unspoken
Packet drop issue on HP Gen 9 \ Gen 10 servers running ESXi6.7. | Techbrainblog
AxiDraw V3
So where have I been? - Stuart Moore
Lots of performance issues have become apparent when they aren’t being masked by a good fast network.
My Grafana / Starlink setup | Nelson's log
acme.sh – Stuff I'm Up To
Fire Damages WebNX Utah Datacenter, Causes Extended Outage - LowEndBox
Incremental Remote Backups Using rsnapshot - LowEndBox
Twenty Years - Thomas LaRock
Running Systems » Blog Archive » Better iostat visibility of ZFS vdevs
USBGuard – Stuff I'm Up To
Cloning with GParted – Stuff I'm Up To
Outage at Akamai Takes Down Major Internet Sites - LowEndBox
LUKS Encryption and LVM – Stuff I'm Up To
New In Nessus: Find and Fix These 10 Active Directory Misconfigurations - Blog | Tenable®
Oracle July 2021 Critical Patch Update Addresses 231 CVEs - Blog | Tenable®
Focus on the Fundamentals: 6 Steps to Defend Against Ransomware - Blog | Tenable®
Scan often, scan everything
 Harden AD to protect your crown jewels
 De-escalate privilege escalation
 Prioritize using prediction
 Remediate like your organization depends upon it
 Measure to improve your game

The Top 5 Active Directory Misconfigurations Putting Your Organization at Risk - Blog | Tenable®
Attack Detection Fundamentals 2021: Azure - Lab #2
Attack Detection Fundamentals 2021: Azure - Lab #1
Attack Detection Fundamentals 2021: AWS - Lab #3
Attack Detection Fundamentals 2021: AWS - Lab #2
Attack Detection Fundamentals 2021: AWS - Lab #1
Data poisoning in action
An MSP and SMB guide to disaster preparation, recovery and remediation | Webroot
Key questions Who will be involved in recovery and communication when your DR plan is in action? How much downtime can your organization withstand? What service level agreement (SLA) do we need to provide to the business and users? What users do we need to recover first? What tools do we have to reduce risk and downtime within the environment? How are user networks separated from operational or business networks? How quickly can data protection tools get us up and running again? Can users get their data back if an endpoint device is compromised? Can we determine when the ransomware first hit the network or endpoint devices? Are we able to stop the proliferation of ransomware or malware throughout the network? Can we recover quickly to a specific point in time? Can our users access their data from the cloud before it has been restored?
Raspi-config's mostly undocumented non-interactive mode | Logan Marchione
Homelab 10" mini-rack | Logan Marchione
5 Tips to get Better Efficacy out of Your IT Security Stack | Webroot
Here are our top 5 tips for getting the best possible efficacy out of your IT security stack. 1. Partner with solution vendors who can guide you to the right setup. 2. Trust your tools, but make sure you’re using them wisely. 3. Consider whether EDR/MDR/ADR is right for you. 4. Lock down common security gaps. 5. Train your end users to avoid security risks.
IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemicSecurity Affairs
Infrastructure Hygiene: Fixing Vulnerabilities
Learning In Public Helps Everyone — Ethan Banks
If You Haven’t Checked Your Backups, They Probably Aren’t Working — Ethan Banks
Free Networking Lab Images From Arista, Cisco, nVidia (Cumulus) — Ethan Banks
A few HTTP Status Codes for the Vulgar-Minded – Jon Spraggins
Best practices to backup VMware vSphere Virtual Machines - ITSMDaily.com
13 Stages of IT Burnout | KC's Blog
How they swindle $100K without blinking an eye - Forensic Analysis of a BEC (Business Email Compromise) (III) - Security Art Work
How they swindle $100K without blinking an eye - Forensic Analysis of a BEC (Business Email Compromise) (II) - Security Art Work
How they swindle $100K without blinking an eye - Forensic Analysis of a BEC (Business Email Compromise) (I) - Security Art Work
Matt Ventura's blog » Blog Archive » Homegrown ZFS-based Cloud Backup
Oracle fixes critical RCE vulnerabilities in Weblogic ServerSecurity Affairs
What Real Security and Compliance Look like when Managing 5000+ Endpoints | Webroot
Ransomware ate my network (IV) - Security Art Work
Ransomware ate my network (III) - Security Art Work
Ransomware ate my network (II) - Security Art Work
Ransomware ate my network (I) - Security Art Work
Pentagon believes its precognitive AI can predict events 'days in advance' | Engadget
Colorado Passes Consumer Privacy Law - Schneier on Security
Disrupting Ransomware by Disrupting Bitcoin - Schneier on Security
Candiru: Another Cyberweapons Arms Manufacturer - Schneier on Security
The Real Reason Why Executives Ignore Security Priorities | Pivot Point Security
What Objective Evidence Will You Need for Your CMMC Assessment? | Pivot Point Security
Everything You Need to Know about NGINX Logs
Troubleshoot ethernet cable wires without a Cable Tester using a Cisco Switch and the TDR Command – jasoncoltrin.com
HOWTO: Calculate Elapsed Business Hours Using PowerShell – Please Work
How to Backup (and Restore) Your Ubuntu Computer
The Attention Economy And The IT Talent Dearth — Ethan Banks
Freeze Your Credit Reports Before Identity Thieves Open Credit In Your Name — Ethan Banks
ll three credit reporting agencies–Experian, TransUnion, and Equifax–allow you to place a freeze on the credit reporting data they gather. This means that hard inquiries will fail, making it highly unlikely that a lend
What Makes A Senior IT Engineer “Senior”? — Ethan Banks
Data-Driven Customer Lifetime Value
E-Commerce is Dead, Long Live A-Commerce
How to connect to a Windows Internal Database WID such as WSUS – Dimitri's Wanderings
Data Quality Doesn't Matter
Don’t super glue heatsinks to your Raspberry Pi
Download Microsoft Security Compliance Toolkit 1.0 from Official Microsoft Download Center
Raspberry Pi h̶e̶a̶t̶s̶i̶n̶k and case fan continued
RemotePotato0: Privilege Escalation Vulnerability in Windows RPC Protocol | Born's Tech and Windows World
RemotePotato0
Expand the existing Swapfile on Linux » Cyberfella LIMITED
Solid state drive/NVMe - ArchWiki
The Kaseya Attack: What We Know Now – Risk Based Security
Ballpark Costs for a CMMC Level 3 Assessment | Pivot Point Security
WireGuard: very simple setup | Nelson's log
Windows “PetitPotam” network attack – how to protect against it – Naked Security
The Code Red worm 20 years on – what have we learned? – Naked Security
CSI_SECURING_WIRELESS_DEVICES_IN_PUBLIC.PDF
Amazon faces $888M GDPR fine
Ransomware attacks leave organisations ‘barely able to keep up’
PlugwalkJoe Does the Perp Walk – Krebs on Security
PlugwalkJoe
CSIRT-Collect - PowerShell Script To Collect Memory And (Triage) Disk Forensics
Reconmap - VAPT (Vulnerability Assessment And Penetration Testing) Automation And Reporting Platform
HOWTO: Force (really) WSUS Clients to Check in on Demand – Please Work
Function Force-WSUSCheckin($Computer) { Invoke-Command -computername $Computer -scriptblock { Start-Service wuauserv -Verbose } # Have to use psexec with the -s parameter as otherwise we receive an "Access denied" message loading the comobject $Cmd = '$updateSession = new-object -com "Microsoft.Update.Session";$updates=$updateSession.CreateupdateSearcher().Search($criteria).Updates' & c:\bin\psexec.exe -s \\$Computer powershell.exe -command $Cmd Write-host "Waiting 10 seconds for SyncUpdates webservice to complete to add to the wuauserv queue so that it can be reported on" Start-sleep -seconds 10 Invoke-Command -computername $Computer -scriptblock { # Now that the system is told it CAN report in, run every permutation of commands to actually trigger the report in operation wuauclt /detectnow (New-Object -ComObject Microsoft.Update.AutoUpdate).DetectNow() wuauclt /reportnow c:\windows\system32\UsoClient.exe startscan } }
HOWTO: Backup and View All Contents of an Android Device – Please Work
How to install Tiny Tiny RSS on Debian 10 · GitHub
Phishing Attack: Clinic Says 450,000 May Have Been Affected
Insurer: Size of Claims Paid for Ransomware Attacks Declines
Ace of Spades: Assassination of UN Secretary-General Dag Hammarskjöld | flyingpenguin
DagHammarskjöld
APT group hits IIS web servers with deserialization flaws and memory-resident malware | CSO Online
10 security tools all remote employees should have | CSO Online
10 top security tools for remote workers Cybersecurity training Digital wallets Credit/digital identity monitoring Password managers Two-factor tokens Antimalware software VPN services Backup solutions Privacy screens Laptops, phones, network hardware
8 Security Tools to be Unveiled at Black Hat USA
Scrapesy Blue Pigeon Mushikago PackageDNA PurpleSharp 2.0 Git Wild Hunt SimpleRisk Cloud Sniper
Biden memo, infrastructure deal deliver cybersecurity performance goals and money | CSO Online
How to Phish for User Passwords with PowerShell - Black Hills Information Security
6 ways to develop a security culture in your organization
1. Instill the concept that security belongs to everyone 2. Focus on awareness and beyond 3. If you do not have a secure development lifecycle, get one now 4. Reward and recognize those people that do the right thing for security 5. Build security community 6. Make security fun and engaging
Running FIPS 140 workloads on Ubuntu | Ubuntu
Over 100 warship locations have been faked in one year | Engadget
S11.4CS: General Administration - Packaging | blog.moellenkamp.org/c0t0d0s0.org
7 Foundations of OSINT – We are OSINTCurio.us
1. Curiosity 2. Diligence 3. Analytic and Intelligence Framework 4. Community and Networking 5. Technique and Tools 6. Ethics and Verification 7. Communication
How to Repair Corrupted XFS Filesystem with xfs_repair
WiFiWart Boots Linux, Moves To Next Design Phase | Hackaday
Hotspot: How const Can Improve Performance - KDAB on Qt
Seven (more) things I wish I'd known before becoming a sysadmin | Enable Sysadmin
Slightly knowledgable users are the worst Empowering them (within their limits) frees you. Takeaway: Be thankful for the modern tools that remove the ability for users to experiment and generate support calls, and be equally thankful for the users who fix it themselves (within their security contexts). Training is product specific, but the real world isn't Takeaway: You gotta learn to integrate on your own. If it plugs into the wall, IT owns it Takeaway: Multiple Red Hat, CompTIA, Microsoft, and Cisco certifications taught me nothing about copiers. IT is a budgetary black hole Takeaway: Some decision-makers see IT as a budgetary black hole. Project management is essential Takeaway: Not all IT skills are technical—invest in project and service management knowledge. I'm actively pursuing a project management certification myself right now. Users don't see security as their problem Takeaway: We must continue to convince users that they are a critical part of security. Winning the IT battle is a cultural thing, not a technical thing Takeaway: Culture is at least as important as technology.
LUNA multitool for hacking, building and analyzing USB - Geeky Gadgets
ParData: A conduit for easy and standardized data set sharing – IBM Developer
What do we call post-modern system administrators? | Opensource.com
Does the image of a sysadmin crawling under the desk to fix broken cupholders still apply?
3 Useful Tips on How to Use History Command in Linux
Success Story: Preparing for Kubernetes Certification Improves a Platform Development Engineer’s Skills - Linux.com
A Dozen Business Solutions You Need. All on One Platform. | The Notes Guy in Seattle
have been asking — begging — HCL that businesses don’t need platforms. They need solutions. Solutions to common business problems.
JENKINS - some ways to restart manually Jenkins services - Blog dbi services
Windows Incident Response: On #DFIR Analysis, pt III - Benefits of a Structured Model
How to Use Apache JMeter to Load Test Web Applications - LinuxBabe
5 Phases of SharePoint implementation - SharePoint Maven
Mongolian Chicken - Dinner at the Zoo
Errata Security: Risk analysis for DEF CON 2021
Bughound - Static Code Analysis Tool Based On Elasticsearch
Wpscvn - Wpscvn Is A Tool For Pentesters, Website Owner To Test If Their Websites Had Some Vulnerable Plugins Or Themes
Ireland AI Strategy (2021) « Oralytics
Spam Kingpin Peter Levashov Gets Time Served – Krebs on Security
Swatter Who Caused Man's Death Over @Tennessee Twitter Handle Is Going to Prison
MIT Predicted in 1972 That Society Will Collapse This Century. New Research Shows We’re on Schedule.
Arkime
How To Restore The Default PiHole Block List - Kev Quirk
Introducing The New Mac Plu.. Err... Mycroft Mark II!
MANSPIDER - Spider Entire Networks For Juicy Files Sitting On SMB Shares. Search Filenames Or File Content - Regex Supported!
Beanshooter - JMX Enumeration And Attacking Tool
CVE Prophet – JerryGamblin.com
Acacia Wood Furniture: Pros and Cons to Know Before You Buy – World Interiors
Tips For Maintaining Your Acacia Wood Furniture Wipe the furniture daily with a soft cloth (a slightly moistened cloth is advisable to ensure all dust stays on the cloth). No need to worry about water spillage due to our water-based lacquer finish. Avoid exposing the wood to alcohol, deodorants, perfumes, nail varnishes and similar liquids. If spillage occurs, wipe immediately with a dry cloth. These liquids will pull moisture from wood when left, causing cracking. Alcohol such as red wine would also stain the wood. Place your furniture carefully so that it’s not in contact with direct sunlight (this can cause fading and, in extreme cases, cracking). Do not place furniture next to fireplaces or radiators as this can cause warping. We recommend using placemats and coasters when resting hot drinks or dishes on the furniture. We recommend occasionally rotating your acacia wood pieces to expose all angles to an equal amount of air and light to ensure even darkening over time. Avoid all cleaning tools with a rough surface. This will wear down the finish and increase the likelihood of scratching. Avoid polish or cleaning products containing silicone, which can dry out natural wood over time. Do not use detergents or any cleaning products that contain ammonia. These will take moisture out of the wood and wear down the finish much faster. Due to Acacia's natural scratch resistance, you don't need to worry too much about scratching. If a scratch does appear, use touch-up marker to conceal the scratch. Be sure to test the marker on an unseen part of the table, such as the underside, to ensure that the marker matches the finish.
Terraguard - Create And Destroy Your Own VPN Service Using WireGuard
Quote Details: Pablo Picasso: Computers are useless. They... - The Quotations Page
"Computers are useless. They can only give you answers." - Pablo Picasso
Saudi Aramco Traces Data Leak to Attack on Supplier
Elekta Health Data Breach Victim Count Grows - HealthcareInfoSecurity
Alert for Ransomware Attack Victims: Here's How to Respond
Irish hospital sued by cancer patient after ransomware attack • Graham Cluley
Not because of negligent treatment, but because some of his personal medical files were published on the dark web after the hospital suffered a ransomware attack earlier this year. The middle-aged man who is at the centre of the case is choosing to remain anonymous for now, but his solicitor says that he has other clients in a similar situation who he expects to also take legal action:
Errata Security: Ransomware: Quis custodiet ipsos custodes
6 resume mistakes CISOs still make | CSO Online
Failing to show executive abilities https://emtemp.gcom.cloud/ngw/globalassets/en/newsroom/images/graphs/ciso-effectiveness-olyaei.jpg Leaving out achievements Getting too techie Leaving out experience with breaches and hacks Making too little (or too much) of industry connections Poor formatting, rookie mistakes and unintended misrepresentations
Wireless Penetration Testing: SSID Discovery
Wireless Penetration Testing: Wifite
INTERPOL: International police coordination required to combat global cyberthreats | CSO Online
Dead Drops and Security Through Obscurity | Daniel Miessler
Cheers to the Winners of EFF's 13th Annual Cyberlaw Trivia Night | Electronic Frontier Foundation
The cybersecurity of our medical health devices ~ Cyber Thoughts
Move over XDR, it's time for security observability, prioritization, and validation (SOPV) | CSO Online
security observability, prioritization, and validation (SOPV)
Biden Administration announces flurry of new anti-ransomware efforts | CSO Online
Securing CI/CD pipelines: 6 best practices | CSO Online
1. Stop storing secrets in CI/CD environments 2. Scrutinize automated pull requests and scheduled tasks 3. Harden and periodically audit your cloud-native containers 4. Integrate deep code scanning to automate code quality checks 5. Patch early against latest CI/CD tooling vulnerabilities 6. Verify integrity of updates before applying them
NIST’s EO-mandated software security guidelines could be a game-changer | CSO Online
NIST defined five objectives for the operational-only (not covering development and acquisition matters) security measures: 1. Protect EO-critical software and EO-critical software platforms (the platforms on which EO-critical software runs, such as endpoints, servers, and cloud resources) from unauthorized access and usage. Measures here include use of multi-factor authentication, following privileged access management principles, and employing boundary protection techniques. 2. Protect the confidentiality, integrity, and availability of data used by EO-critical software and EO-critical software platforms. Measures here include maintaining a data inventory, protecting data at rest and in transit, and back up data with a tested recovery plan. 3. Identify and maintain EO-critical software platforms and the software deployed to those platforms to protect the EO-critical software from exploitation. Measures here include maintaining a software inventory, have a patch management plan, and use configuration management practices. 4. Quickly detect, respond to, and recover from threats and incidents involving EO-critical software and EO-critical software platforms. Measures here include recording necessary logging information, continuous security monitoring, and using endpoint and network security protection. 5. Strengthen the understanding and performance of humans' actions that foster the security of EO-critical software and EO-critical software platforms. Measures here include training all users and administrators of EO-critical software and conducting frequent awareness activities.
My thoughts on the “2021 Gartner Market Guide for Vulnerability Assessment”. What about the quality? | Alexander V. Leonov
8 biases that will kill your security program | CSO Online
1. Confirmation bias 2. Bandwagon bias 3. Hindsight bias 4. “They won't let us do that” bias 5. Anchoring bias 6. Business language bias 7. “Developers don't care about security” bias 8. Blind spot bias
News about Windows 10 vulnerability HiveNightmare | Born's Tech and Windows World
From Plex to Jellyfin Media Server
Raspberry Pi 2 wireless temperature box
What Is A Virtual Server? Types of Server Virtualization | ServerWatch
It’s Linux – But On An ESP32 | Hackaday
A case against security nihilism – A Few Thoughts on Cryptographic Engineering
Ansible Infographic - Anto ./ Online
(55) Timetrace: Track Your Work Day With Ease - YouTube
How to View and Analyze Logs on Linux With journalctl
akamai outage: Internet goes dark for many as Akamai suffers outage, IT News, ET CIO
TT-RSS - ArchWiki
Easy Gluten Free Vegan Ginger Snaps Recipe - Frugal and Delicious | Penniless Parenting
vSpeaking Podcast: Top 10 VMware Admin Tools | VMware
How I configure sshd at home – Blog FiascoBlog Fiasco
VyOS and Mikrotik – VLAN-a-rama – blog.kroy.io
VyOS from Scratch: Routing and VPS Edition – blog.kroy.io
Adventures in mTLS Debugging
3 years of GDPR: Further ambiguity in companies | Born's Tech and Windows World
Other key findings of the CrowdStrike survey on the GDPR: 27% of the German companies surveyed have not taken precautions in the event of a cyberattack. This puts Germany well above the international average – 15.9% of respondents gave this answer. Fittingly, a total of 47.5% of respondents in Germany said that they tended not to see their company as a target of cyberattackers, or not at all. On average internationally, a total of only 30.33% of respondents shared this view about their company. 71% of respondents in Germany stated that their company had not yet been the victim of a cyberattack. This puts Germany well above the international average of 53.8% of respondents. Only 82% of respondents in Germany are certain that the GDPR will continue to apply after Brexit. This view is shared by only 75.7% of respondents on average internationally.
A Government Practitioner’s Guide to Countering Online Foreign Covert Influence - Lawfare
5 essential soft skills for sysadmin self-improvement | Enable Sysadmin
1. Methodical and organized 2. Collaboration and networking 3. Spoken and written communication 4. Problem-solving skills 5. Mental and physical health
Nasty Linux systemd security bug revealed | ZDNet
Ευάγγελος Μπαλάσκας - wireguard » Evaggelos Balaskas - System Engineer
Terraform and AWS Lambda? Yep. You Can do that.
New TKMR Podcast: "Does it Take 10,000 Hours to Become a Legal Tech Expert?" | DennisKennedy.Blog
Journo who went to prison for 2 years for breaking US cyber-security law is jailed again • The Register
Dealing with security vulnerabilities on data center servers requires more skilled staff - Help Net Security
Checking Active TCP/IP Connections on Windows with PowerShell | Windows OS Hub
Windows 10 upgrade breaks SAM access rights from 1809 upward, user access possible | Born's Tech and Windows World
Software: Our grave as furture car owners? | Born's Tech and Windows World
Warning against data theft from used cars | Born's Tech and Windows World
The Ins and Outs of the VMware vCenter Converter [With Demos]
Raspberry Pi History – Linux Hint
Your Goto Guide for Working with Windows WMI Events and PowerShell
The Essentials of Business Intelligence – Running Your Business
The Internet is my computer
5 Crontab Examples to Help You Automate Linux Tasks
1. Cleaning Up /tmp Using a System-Wide Crontab 2. Database Backups Twice Daily 3. Checking Site Uptime With a Custom Script 4. Disk Space Reports via Email 5. Broadcast a Message at Specific Times
Certificate Auto Enrollment from Samba – David Mulder
Hundreds of millions of HP, Xerox, and Samsung printers vulnerable to new bug - The Record by Recorded Future
Chris's Wiki :: blog/sysadmin/SyslogToOnePlace
Can you Backup the Free Version of ESX 7? | PeteNetLive
Back to the answer: Whoever started this rumour needs a percussive adjustment to the face, free ESX still cannot be backed up
24/7 availability and oncall - SysAdmin1138 Explains
The July 2021 Patch Tuesday addresses twelve vulnerabilities for Domain Controllers running as DNS Servers - The things that are better left unspoken
Chia Crypto Farming Wreaks Havoc in the Hard Drive Market - LowEndBox
Manage ODA patching with Data Guard or Dbvisit Standby - Blog dbi services
Database Patching Revisited : Take off and nuke the entire site from orbit…
How to forget 10x engineers for the good of your team | The Enterprisers Project
The idea of the “10x engineer” – those iconoclastic, almost mythical developers who can do the work of 10 people – has been plaguing Silicon Valley ever since. But in the last few years, it seems like every company in every industry is doggedly on the hunt for their 10x engineer. With the immense pressure on companies around the world to innovate faster through software, they have been led to believe that hiring only the most efficient developers will give them a competitive edge to supercharge their digital transformation. 1. Boost collaboration 2. Celebrate non-traditional backgrounds 3. Set talent up for success
Mycroft, an open source voice assistant works with Linux smartphones like the PinePhone - Linux Smartphones
10 Open-source free Self-hosted Document Search Engines
White House blames China for Microsoft Exchange cyberattacks | Engadget
Arduino Cable Tracer Helps Diagnose Broken USB Cables | Hackaday
Heroes Of Hardware Revolution: Bob Widlar | Hackaday
widlarize - You take it over to the anvil part of the vice, and you beat on it with a hammer, until it is all crunched down to tiny little pieces, so small that you don’t even have to sweep it off the floor. It makes you feel better. And you know that that component will never vex you again.
ITAD: IT asset disposal is a security risk to take seriously | CSO Online
Then there is the case of ShopRite, which found itself on the receiving end of a monetary fine for “failing to properly dispose of electronic devices used to collect the signatures and purchase information of pharmacy customers.” The New Jersey attorney general noted how the company had tossed the devices into a dumpster without wiping them of the sensitive data. The House and Human Services Office of Civil Rights slapped Filefax, a company that had shuttered its doors with a monetary fine for mishandling protected health information (PHI). They had arranged to have medical records destroyed by a contractor, drove the records to the facility, and left it unattended overnight in an unlocked truck—good intentions with lousy execution.
Cleanup IIS Log using PowerShell – Ingo Karstein
Set TLS Version in PowerShell – Ingo Karstein
Windows 10 20H2
Introduction To Ansible Automation Platform | Linux Today
Creating audiobooks | Toby Kurien
Could ‘culture-as-a-service’ be part of the future of work?
Thoughts about RAM and Storage Changes « etbe - Russell Coker
Windows vulnerability PrintNightmare: It’s not over yet (July 15, 2021) | Born's Tech and Windows World
Benjamin Delpy, the mimikatz developer among others, posted a video on Twitter yesterday via the following tweet showing how he can install a printer driver as the default user on a fully patched system.
Chris's Wiki :: blog/linux/UdevNetworkDeviceNaming
Tarsnap: Cloud Backups for the Truly Paranoid - LowEndBox
Broccoli, Bok Choy, and Mushroom Stir Fry with Beef Recipe -- Gluten Free, Allergy Friendly | Penniless Parenting
Chris's Wiki :: blog/sysadmin/SyslogLogEverythingSomewhere
Japan breaks internet speed record with a 319Tbps data transfer | Engadget
Motherboard reports that scientists at Japan's National institute of Information and Communications Technology (NICT) have smashed the internet transfer record by shuffling data at 319Tbps. For context, that's almost twice as fast as the 179Tbps a team of British and Japanese researchers managed in August 2020.
Amazon Simple Queue Service (SQS) – 15 Years and Still Queueing! | AWS News Blog
What sys admins need to know about cloud, containers and career moves
1. Extend your technical prowess with new concepts and operating models. 2. Explore cloud-native tech for your next career step. 3. Don’t discount your on-prem knowledge and experience. 4. Rely on your community. 5. Put your curiosity to work.
DIY lithium powered lawn mower - Meatball Racing
Upgrading an electric lawn mower to lithium batteries | KuzyaTech
Hospitals launch antitrust lawsuit against Intuitive Surgical - Axios
CISO MindMap 2021: What do InfoSec professionals really do?Rafeeq Rehman – Personal Blog
Should We Security Patch Oracle Databases?
10 signs of an IT leader with a growth mindset | The Enterprisers Project
10 signs of a growth mindset 1. Curiosity 2. Desire for more 3. Creativity 4. Courage 5. Openness to possibilities 6. Compassion and resilience 7. Appreciation for serendipity 8. Optimism 9. Comfort with discomfort 10. Open-mindedness and self-awareness
Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses
Subscription Changes for Computer Backup
Navigating Active Directory Security: Dangers and Defenses
Sx - Fast, Modern, Easy-To-Use Network Scanner
Deploy a Kubernetes Cluster using Ansible - buildVirtual
The Kaseya Attack: Everything to Know – Risk Based Security
11 technologies improving database security | CSO Online
1. Basic encryption 2. Differential privacy 3. Hash functions 4. Digital signatures 5. SNARKs succinct non-interactive argument of knowledge (SNARK) “zero knowledge proof” (ZKP) 6. Homomorphic encryption 7. Federated processing 8. Fully distributed databases 9. Synthetic data 10. Intermediaries and proxies 11. No data In some extreme cases when compliance makes it possible and the users are willing to accept less personalized service, deleting the database can do the most for privacy.
How to install Siege on Ubuntu – Linux Hint
Set up temperature sensors in your home with a Raspberry Pi | Opensource.com
Teradata customers express terror as field-based hardware support outsourced to IBM on both sides of the pond • The Register
Event recap: “Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger”
Protecting Your Windows Servers & Clients from the PrintNightmare Vulnerability | Alexander's Blog
CISO_Job_MindMap_Rafeeq_Rehman_v_2021.png (PNG Image, 2062 × 3160 pixels)
ToolsWatch.org » Top 10 Most Exploited Vulnerabilities in 2020
1- CVE-2020-0796 : Windows SMBv3 Client/Server Remote Code Execution Vulnerability (codename: SMBGhost) 2- CVE-2020-5902: F5 Networks BIG-IP TMUI RCE vulnerability 3- CVE-2020-1472: Microsoft Netlogon Elevation of Privilege (codename: Zerologon) 4- CVE-2020-0601: Windows CryptoAPI Spoofing Vulnerability (codename: CurveBall) 5- CVE-2020-14882: Oracle WebLogic Server RCE 6- CVE-2020-1938: Apache Tomcat AJP File Read/Inclusion Vulnerability (codename: GhostCat) 7- CVE-2020-3452: Cisco ASA and Firepower Path Traversal Vulnerability 8- CVE-2020-0688: Microsoft Exchange Server Static Key Flaw Could Lead to Remote Code Execution 9- CVE-2020-16898: Windows TCP/IP Vulnerability (codename: Bad Neighbor) 10- CVE-2020-11651: SaltStack RCE Authentication Bypass 10- CVE-2020-1350: Critical Windows DNS Server RCE. (codename: SIGRed)
Children report 2021 | Securelist
IT threat evolution Q1 2021 | Securelist
Kaspersky Security Bulletin 2020-2021. EU statistics | Securelist
Ransomware by the numbers: Reassessing the threat’s global impact | Securelist
Privacy predictions for 2021 | Securelist
The future of cyberconflicts | Securelist
Healthcare security in 2021 | Securelist
The story of the year: remote work | Securelist
InfoSec Handlers Diary Blog
Last Week’s Security news: PrintNightmare patches and Metasploit, Kaseya CVEs, Morgan Stanley Accellion FTA, Cisco BPA and WSA, Philips Vue PACS, CISA RVAs, Lazarus job offers | Alexander V. Leonov
RemotePotato0 - Just Another "Won't Fix" Windows Privilege Escalation From User To Domain Admin
Military Cryptanalytics, Part III - Schneier on Security
Amazon Has Trucks Filled with Hard Drives and an Armed Guard - Schneier on Security
A Cybersecurity Policy Agenda - Schneier on Security
Education and Workforce Development Public Core Resilience Supply Chain Security Measuring Cybersecurity Promoting Operational Collaboration
Virginia Data Privacy Law - Schneier on Security
How to Edit the Windows Registry Completely Offline
Kaseya VSA has been hit with a ransomware attack @ AskWoody
Print Nightmare is going to be a nightmare @ AskWoody
Details of the REvil Ransomware Attack - Schneier on Security
Why Averages suck and what make Percentiles great – data-nerd.blog
The Chaos PrintNightmare Emergency Update (July 6/7, 2021) | Born's Tech and Windows World
Chris's Wiki :: blog/linux/InitramfsHidesOldThings
The History of Plastics in Computing - krypted
Chris's Wiki :: blog/sysadmin/AmandaLosingTrackOfWhy
Quick look at CVE-2021-1675 & CVE-2021-34527 (aka PrintNightmare) | Securelist
Tools and Jewels
Introduction to ICS Security | SANS Institute
SANS Institute Healthcare Security Resources
Accessing Web APIs with PowerShell | Clay Risenhoover | SANS Institute
Using the VMWare PowerCLI modules to Measure VMWare Compliance | SANS Institute | Clay Risenhoover
PowerShell Tools I Use for Audit and Compliance Measurement | Clay Risenhoover | SANS Institute
Open Source Software and Maturity Model – The Right Security – Risk Based Security
Vulnerability QuickView – May 2021 – Risk Based Security
Beyond the Technical - Advise for those starting in Infosec
Always the soft skills
Create a central VMware Tools repository - ivobeerens.nl
Virtualization The Future: Free Training from VMware - Docker Fundamentals
Please try Subplot, for acceptance criteria
OPSWAT | Infographic: Emerging Cybersecurity Trends, Challenges and…
ISO 27701 Privacy Extension “Lessons Learned”: Data Mapping | Pivot Point Security
FedRAMP Authorization - Key Players and How They Relate | Pivot Point Security
FedRAMP Authorization - Key Players and How They Relate | Pivot Point Security
CMMC Situational Awareness Domain: Summary | Pivot Point Security
A Risk-Based Approach to “Doing Less” with Cybersecurity | Pivot Point Security
3 Steps to Success with OWASP Guidance for WebAppSec | Pivot Point Security
What Every DIB Org Needs to Do NOW If You Have a DFARS 7012 Clause in ANY of Your DoD Contracts | Pivot Point Security
4 Top Tools for Maximum CMMC Compliance Benefit with Minimum Effort | Pivot Point Security
SASE: Technology, Transport and ServiceRafeeq Rehman – Personal Blog
StateRAMP Security Categories: Low, Moderate, High and “Just Right” | Pivot Point Security
“StateRAMP Verified” and “StateRAMP Ready”: 2 Paths to SLED Security Verification for CSPs | Pivot Point Security
How To Install VMware vCenter 7 Appliance via GUI and CLI
What is the Expected Level of Effort for a CMMC Level 3 Assessment? | Pivot Point Security
Here’s What Your CMMC Level 3 Readiness Assessment Will Look Like | Pivot Point Security
S3 Ep10.5: “20 years of cyberthreats that shaped infosec” [Podcast] – Naked Security
Create a USB Mouse Jiggler to Keep a Target Computer from Falling Asleep (& Prank Friends Too) « Null Byte :: WonderHowTo
Null Byte's Hacker Guide to Buying an ESP32 Camera Module That's Right for Your Project « Null Byte :: WonderHowTo
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 4 (Auditing, Antivirus & Monitoring) « Null Byte :: WonderHowTo
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 3 (Application Hardening & Sandboxing) « Null Byte :: WonderHowTo
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 2 (Network Attack Defense) « Null Byte :: WonderHowTo
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 1 (Physical Attack Defense) « Null Byte :: WonderHowTo
The Man Who Helped Turn 4chan Into the Internet's Racist Engine
Serious Security: Rowhammer is back, but now it’s called SMASH – Naked Security
Cybersecurity tips for university students – Naked Security
1. Stick to HTTPS websites 2. Be cautious about scams 3. Log out or lock your computer when you’re not using it 4. Get yourself a good password manager
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
JWTweak - Detects The Algorithm Of Input JWT Token And Provide Options To Generate The New JWT Token Based On The User Selected Algorithm
White House Advises Mayors to Review the US cybersecurity
Anne Neuberger outlined as well the Administration’s ransomware strategy, which includes: disruption of ransomware infrastructure and actors by working closely with the private sector; international cooperation to hold countries who harbor ransom actors accountable; expanding cryptocurrency analysis to find and pursue criminal transactions; and the federal government’s review to build a cohesive and consistent approach towards ransom payments. Back in June, The Deputy National Security Advisor urged the US business leaders and corporate executives to take ransomware seriously, after the damages seen in the aftermath of the Colonial Pipeline and JBS ransomware attacks.
25 Gigabit Linux internet router PC build - Michael Stapelberg
Ethernet was slower only in one direction on one device | Jeff Geerling
Always start with the patch cables. Then look at your equipment. Then check your drivers and device CPU/statistics. Then check transceivers, then jacks, terminations, and finally cabling. Networking can be... fun.
Android backups with rsync | The bright side
Salus - Security Scanner Coordinator
Security Scorecards - Security Health Metrics For Open Source
The-Bastion - Authentication, Authorization, Traceability And Auditability For SSH Accesses
SecAware blog: Managing certainty
Expert Analysis: The Battle Against Ransomware
Healthcare Workers Allege Amazon Alexa Violates Privacy
"The physician may have a good argument for misrepresentation by Amazon, but there is an equally coherent argument that the physician - or anyone handling confidential/sensitive information, including attorneys … failed to implement commercially reasonable security." Teppler adds: "There are privacy issues involved with any 'smart' device or service, because it involves the exchange of information. It should come as no surprise that the 'smarter' the device or service, the more information it will collect, and likely seek to further monetize."
Researchers: Microsoft 'PrintNightmare' Patch Is Incomplete
Interpol Calls For New Ransomware Mitigation Strategy
Rainbow tables explained: How they work and why they're (mostly) obsolete | CSO Online
Jeremi Gosney, founder and CEO of distributed password cracking company Terahash, concurs. “Modern password cracking is highly dynamic, and requires agility, flexibility, and scalability. Rainbow tables are static, rigid, and not at all scalable—they are the antithesis of modern password cracking. Even if you don’t have the horsepower of GPUs, employing modern techniques will still net you a far higher hash yield than rainbow tables will.” Probabilistic candidate generation, rules, hybrid attacks, and now even machine learning candidate generation are far superior to rainbow tables, he says.
How to check for Active Directory Certificate Services misconfigurations | CSO Online
Certify and ForgeCert,
Database Upgrades : It’s been a long road getting from there to here
Erman Arslan's Oracle Blog: Recoverability Roadmaps & Remediation Options - Oracle, Systems, Apps Technology, Virtualization and Engineered Systems
Erman Arslan's Oracle Blog: OVM Manager / Weblogic -- CVE-2019-2725 / deserialization - remote code execution vulnerability
PrintNightmare vulnerability explained: Exploits, patches, and workarounds | CSO Online
Raspberry Digital Signage 16.0 released – Binary Emotions
Convergence & Complexity Go Hand In Hand — EtherealMind
VARs See You As Technical Debt | The Networking Nerd
Kaseya was warned about security flaws years ahead of ransomware attack | Engadget
Cybersecurity Game Aims to Train 25K Specialists by 2025
NCSF’s free online cybersecurity training game — called CyberStart — is intended to do just that by enticing high school and college students into the subject while teaching them the ropes.
Index PnP - An open-source pick-and-place machine for mid-scale manufacturing - CNX Software
Follow-up to the Kaseya supply chain attack | Born's Tech and Windows World
Setting up PCP and Grafana metrics with Cockpit — Cockpit Project
Open source tools and tips for improving your Linux PC's performance | Opensource.com
How to build a blockbuster internal IT talent program: 8 tips | The Enterprisers Project
1. Know your mission 2. Create a learning culture 3. Tap into what your team wants to learn 4. Focus on important non-technical skills 5. Secure adequate resources 6. Develop a brand that reflects a commitment to growth 7. Keep investing 8. Get started, even if you start small
Tips for Managing Encryption Keys
Ransomware attacks leave cybersecurity experts 'barely able to keep up'
What you need to know about security policies | Opensource.com
The ever-evolving IT job role: system administrator | Enable Sysadmin
REvil victims are refusing to pay after flawed Kaseya ransomware attack
Lessons in openness from Japan's "business reinvention" | Opensource.com
Throughout the 1990s, Japanese companies really put open organization principles into full practice, particularly adaptability in a changing market, expanded inclusivity and collaboration in product development globally, and transparency regarding where they could and could not compete globally. Japan has adapted itself from being an exporter of consumer gadgets to a global critical product component supplier.
10 Factors Behind the Popularity of Microservices: Part 1
The urgency of high availability and quick, flexible scaling Classic advantages of modularized programs for development and testing The continuing growth of third-party (cloud) compute services Cheap, high-capacity networks in data centers The dominance of RESTful APIs for interprocess communication The convenience of Platform as a Service (PaaS) The efficiency of containers for virtual applications Applications moving online in Software as a Service (SaaS) The productivity of small programming teams The race to speed up innovation through DevOps and rapid deployment
Open Policy Agent 0.30 lands, irons out some kinks • DEVCLASS
Insurance and Ransomware - Schneier on Security
Basically, the insurance industry incents companies to do the cheapest mitigation possible. Often, that’s paying the ransom.
Samsung Electronics Adopts International Open Source Standard – Samsung Global Newsroom
Automating performance analysis
Automate Kubeflow deployment – IBM Developer
Learning 1E's Tachyon: Using Inventory
Flashing the BIOS from the F12 One-Time Boot Menu | Dell US
vizex - visualize disk space and disk usage - Page 2 of 3 - LinuxLinks
Apply lean startup principles to your open source project | Opensource.com
The Old Computer Challenge and Why I Need It
New York City launches a cyberdefense center in Manhattan | Engadget
Coop-Sweden closes 800 stores after Kaseya VSA supply chain attack by REvil gang | Born's Tech and Windows World
Your phone vs. Supercomputers – Huan Truong's Pensieve
TODO: Disable the Print Spooler service on Domain Controllers - The things that are better left unspoken
VMware Tools v 11.3 fixes a Denial of Service vulnerability (VMSA-2021-0011, CVE-2021-21997, CVSv3 3.3) - The things that are better left unspoken
Preparing Active Directory for Windows 10 version 21H1 - The things that are better left unspoken
What are these *.ready and *.done files for in PostgreSQL? - Blog dbi services
What Happened in the Kaseya VSA Incident? - Lawfare
How I avoid breaking functionality when modifying legacy code | Opensource.com
Proprietary Software Security | Tux Machines
The Lawfare Podcast: Matt Tait Ransom"wears" All the Things - Lawfare
How to Use seq to Generate a Sequence of Numbers in Linux
IT for service providers biz Kaseya defers decision about SaaS restoration following supply chain attack • The Register
The Kaseya Ransomware Attack is a Really Big Deal - Lawfare
How to Build a PowerShell GUI for your Scripts
Create a Simple Graphical Interface for a PowerShell Script | Scripting Blog
I've Got a PowerShell Secret: Adding a GUI to Scripts | Scripting Blog
How to Create a GUI for PowerShell Scripts? – TheITBros
Microsoft warns of critical Windows ‘PrintNightmare’ vulnerability - The Verge
MacHound - An extension to audit Bloodhound collecting and ingesting of Active Directory relationships on MacOS hosts
AZ-700 Study Guide: Azure Network Engineer - Thomas Maurer
GitHub - ossf/scorecard: Security Scorecards - Security health metrics for Open Source
Kconfig-Hardened-Check - A Tool For Checking The Hardening Options In The Linux Kernel Config
ColdFire - Golang Malware Development Library
Bbscope - Scope Gathering Tool For HackerOne, Bugcrowd, And Intigriti!
CISA Emphasizes Urgency of Avoiding 'Bad' Security Practices
Another 0-Day Looms for Many Western Digital Users – Krebs on Security
Western Digital won’t fix a vulnerability found in older My Cloud OS3 storage devices | Engadget
Select Samsung enterprise Android devices will receive five years of software support - Gizmochina
MyBook Investigation Reveals Attackers Exploited Legacy, Zero-Day Vulnerabilities
YottaDB Dashboard - YottaDB
MATLAB, SAS, Stata and SPSS files in LabPlot – LabPlot
Oracle and Cloud Wars
Why Are There Never Enough Logs During an Incident ...
Aluminum Flashing Tape | Cool Tools
CISA Tool Helps Measure Readiness to Thwart Ransomware
Friday Thoughts on Going Back To the Office | The Networking Nerd
7 Unconventional Pieces of Password Wisdom
Passwords Aren't *All* Bad Complexity Rules Are Less Important Than You Think Screening New Passwords is a Must Ditch the Periodic Resets Make it Easier to Choose REALLY Long Passphrases Let Users Cut and Paste Passwords Stop Using Security Questions for Resets
List of data breaches and cyber attacks in June 2021 | IT Governance Blog
How to Clone/Backup Linux Systems Using - Mondo Rescue Disaster Recovery Tool
Microsoft Issues New CVE for 'PrintNightmare' Flaw
A Large Number of Third-Party Libraries from Apps Are Never Updated
What is Audit Failure In Event Viewer?
SQL Server: Fixing another huge MSDB database - 80GB+ - Blog dbi services
17 Linux commands every sysadmin should know | Enable Sysadmin
Ansible might be running slow if libyaml is not available | Jeff Geerling
How to create a Dockerfile with some dockerfile examples - LinuxTechLab
How I build my personal website using containers with a Makefile | Opensource.com
How To Enable Brotli Compression in Apache – TecAdmin
IBM's 18-month company-wide email system migration has been a disaster, sources say • The Register
Germany: The state hacks along – Matthias Monroy
The GDPR, Privacy and Monopoly | Electronic Frontier Foundation
Irish Ransomware Attack Recovery Cost Estimate: $600 million
Using a Medical Device Cybersecurity Bill of Materials
Rob Suárez,
Google Online Security Blog: Introducing SLSA, an End-to-End Framework for Supply Chain Integrity
Healthcare Exchange Standards: FHIR Security & Privacy Tutorial
John Moehrke
List of data breaches and cyber attacks in May 2021 – 116 million records breached - IT Governance UK Blog
Majority of Web Apps in 11 Industries Are Vulnerable All the Time
SQL Server 2019: What’s new in sp_configure and sys.configurations options? - Blog dbi services
Ansible Beginner's Guide: Getting Started With Automation
Ransomware a threat to national security, says Dutch counterterrorism office | NL Times
Is remmina useful for your daily work? - Fedora Magazine
Ransomware: Exploring the Hidden Costs | CSO Online
4 Habits of Highly Effective Security Operators
Habit #1: Operationalize Existing Frameworks into Your Daily Routine Habit #2: Leverage Internal Security Signals First Habit #3: Cultivate a Proactive Threat Hunting Posture Habit #4: Make Threat Intelligence Actionable
Cyberattacks Are Tailored to Employees ... Why ...
Mission Critical: What Really Matters in a Cybersecurity Incident
1. The Incident Response Plan Is Important as a Discussion Point Pre-Incident but Rarely Consulted During an Event 2. Logging Is Never Where It Needs to Be 3. Network Maps and IT Asset Inventories Can Make or Break a Recovery
What the FedEx Logo Taught Me About Cybersecurity
Hackers exploited two flaws in event that remotely wiped Western Digital devices | Engadget
Open Practice Library basics: Planning and Executing
Regulating AI around the World « Oralytics
Japan lags in cyber capabilities: British think tank report - Japan Today
5 Lessons from Steve Jobs for a Powerful Product Launch Event – Ideas
Use a “Twitter-Friendly” Headline for Your Product Launch Presentation Follow the Rule of Three Show Enthusiasm When You Launch Your Product Introduce the Villain Carefully Plan the Product Launch Presentation
Regula: Open source policy engine for IaC security - Help Net Security
Does Your Cyberattack Plan Include a Crisis ...
Tip 1: Be Prepared to Respond Quickly Tip 2: Establish a Virtual War Room to Monitor and Assess Tip 3: Embrace the Notion of Radical Transparency With Your Key Stakeholders Tip 4: Set Goals and Benchmarks but Be Flexible Tip 5: Admit Fault Quickly
Dark Reading | Security | Protect The Business
Its analysis shows that 79% of the time, developers don't update the third-party libraries they use in a codebase. Though third-party libraries are constantly changing — and what's secure and what's not secure keeps changing equally fast — developers by and large don't update them. Even in the case of more mature, actively maintained repositories, Veracode found that third-party libraries are added and never updated 73% of the time — compared with 79% for all repositories. Overall, 50% of libraries take longer than 21 months to update, and 25% are not updated for as long as four years — which was the time frame for the Veracode study.
Dark Reading | Security | Protect The Business
Why Security is Paramount in a Digital-First Economy?, IT News, ET CIO
Network-Bound Disk Encryption improvements in RHEL 8
JENKINS - Deploy Ansible Playbook with Jenkins plugin - Blog dbi services
Some Ideas About Storage Reliability « etbe - Russell Coker
5 biggest healthcare security threats for 2021 | CSO Online
7 ways technical debt increases security risk | CSO Online
How to migrate Java workloads to containers: 3 considerations | The Enterprisers Project
Scripting for Network Audit on a Cisco Device (with bonus) - RouterFreak
Liberating our mobile computing | MeanMicio
An Unbelievable Demo
12 open-source free self-hosted email marketing solutions
jmtd → log → LaTeX draft documents
the vulnerability remediation lifecycle of Alpine containers – Ariadne's Space
Kerckhoffs’s Law for Security Engineers
(22) Interview with a Site Reliability Engineer - YouTube
Ansible blockinfile oddity
The Week That Will Be - Lawfare
Finally! A Cybersecurity Safety Review Board - Lawfare
How to pass extra variables to an Ansible playbook | Enable Sysadmin
Docker command cheat sheet
Take the Advice of Ransomware Actors: Prevent Escalation and Lateral Movement
Why Ransomware Attacks Are Becoming A National Security Risk : NPR
(22) Why So Many People Lack Critical Thinking Skills - YouTube
Ansible Tutorial: Introduction to simple Ansible commands - LinuxTechLab
My gripes with Ansible
A primer on containers – Increment
What is an SBOM? - Linux Foundation
Tuning systemd services, logging, and device management in Linux - Linux Concept
Kogito: Laying the foundation for the next generation of cloud-native business automation
» Oracle cashing in on Java: this is what happens if developers use closed source non-OpenSource non-GPL licensed programming languages | dwaves.de
Secure Your Apache Web Server Best Practice - Unixcop
Automated Website Testing with Selenium
Simulating Veeam disk actions with DiskSpd - rhyshammond.com
Eyeing The Credentials: Mitigating The Leak – doOdzZZ'sNotes
Why a Zero-Day Attack Doesn’t Mean There’s Nothing You Can Do | Security & Compliance Blog | VMware
5 IT leadership principles to live by: Miami CIO of the Year winners share | The Enterprisers Project
1. Listen more than you speak 2. Trust and integrity are key to results 3. Aim high - even when it makes you uncomfortable 4. Never underestimate the power of a strong network 5. Lead with a people-first mindset
7 Best Free and Open Source Configuration Management Databases - LinuxLinks
6 Recommended Open Source Learning Management Systems (LMS)
Regulatory Alchemy: Turning Cybersecurity Guidelines Into Rules - Lawfare
Tmux Command Examples To Manage Multiple Terminal Sessions
7 Lessons From 10 Outages – The Downtime Project
Monitor your Internet with a Raspberry Pi | Jeff Geerling
Will open-source Postgres take over the database market? Experts weigh in - SiliconANGLE
Cloud 101 - Wasabi Hot Cloud Storage - Anto ./ Online
Using Ansible to automate Logical Volume Manager configurations | Enable Sysadmin
(19) systemd on Linux: Intro and Unit Files - YouTube
Webcast: Getting Started in Pentesting The Cloud: Azure - Black Hills Information Security
What is the difference between DNF and YUM? | 2DayGeek
Doc Searls Weblog · Redux 002: Listen Up
Our goal is to burn down Marketing As Usual. Here is the logic behind the ambition: Markets are conversations Conversations are fire Marketing is arson
Upgrading Homelab Kubernetes Cluster from 1.20 to 1.21 | Lisenet.com :: Linux | Security | Networking
Configure PXE Boot Server for Rocky Linux 8 Kickstart Installation | Lisenet.com :: Linux | Security | Networking
RapidDisk 7.2.1 now available – Random [Tech] Stuff
Web Servers vs. Application Servers | ServerWatch
MyBook Users Urged to Unplug Devices from Internet – Krebs on Security
Try Chatwoot, an open source customer relationship platform | Opensource.com
How to manage systemd units with systemctl | 2DayGeek
How to manage systemd units with systemctl | 2DayGeek
7 'dmesg' Commands for Troubleshooting and Collecting Information of Linux Systems
vVols, Oracle RAC, and VMware SRM – Dell EMC PowerMax with VMware
Some pretty useful Yum Tips & Tricks - LinuxTechLab
UpdateUpdate for BIOS/UEFI vulnerabilities in Dell systems | Born's Tech and Windows World
Windows 11: Hardware requirements | Born's Tech and Windows World
Chris's Wiki :: blog/sysadmin/NetworkCablesGoBad
Going Old School with Optimization Parameters in Oracle 19c
Financial Tips for Parents to Teach Their Children
How to accelerate workloads without vSphere Flash Read Cache
Thomas Rayner – Writing code & automating IT
Extra Dark Honey Sweetened Hot Cocoa Recipe
Linux sysadmins: 6 reasons you should write technical articles | Enable Sysadmin
5 Tips from Grandpa and Grandma on How To Be Frugal – BeingFrugal.net
Kidiosity- A Fun and Helpful Tool for Parenting | Penniless Parenting
Send Messages From Your Scripts To Multiple Messaging Platforms Using PingMe - Linux Uprising Blog
Squid proxy configuration tutorial on Linux - LinuxConfig.org
Tom Moynihan on why prior generations missed some of the biggest priorities of all - 80,000 Hours
Why is Terraform so Popular for DevOps?
Kubernetes: How Components Fit Together as an Architecture Diagram
CV vs. Resume: What's the Difference and How to Pick One? – Interviews
Dealing with Bad Behavior in Young Children | Penniless Parenting
Ansible tutorial for beginners on Linux - LinuxConfig.org
Ransomware is a Darwinian Problem That Will Never Be Solved - Architecting IT
Microsoft will end Windows 10 support in October 2025 | Engadget
US releases NSA leaker Reality Winner into supervised custody | Engadget
Meat supplier JBS paid $11 million to its ransomware attackers | Engadget
The Cybersecurity Stories We Were Jealous of in 2020
How to Reset an Active Directory Password with PowerShell
Chris's Wiki :: blog/tech/TLSTimeRepresentations
Windows 7 SP1/Server 2008/R2: Extended Support 2021 – Part 2 | Born's Tech and Windows World
Network: Simulate packet loss and latency with clumsy | Born's Tech and Windows World
Setting up Computer Security Incident Response Team (CSIRT)Rafeeq Rehman – Personal Blog
PDF Version of Book: Cybersecurity Arm Wrestling available for downloadRafeeq Rehman – Personal Blog
Perspectives on Information Security ArchitectureRafeeq Rehman – Personal Blog
Six Essential Ingredients for Building a Successful Security Operations Center (SOC)Rafeeq Rehman – Personal Blog
1. People (SOC Staff) with different levels of expertise in diverse areas including networking, operating systems, applications, operations management, scripting, Python, vulnerability management, incident handling, forensics and others. 2. Defined processes for tasks under the scope of SOC. While there are many SOC processes, effective incident detection and incident management is a key process for success of every SOC. A SOC may also rely on other IT systems/processes like asset management, change management, patch management etc. 3. Technology Stack for collecting log and other types of telemetry data, storing data, and processing/analyzing data. Main technologies used in SOC include Security Information and Event Management (SIEM) tool, log collection, network sensing, ticket/incident management, forensic tools, and vulnerability management tools. 4. SOC Governance structure that enables SOC management and continuous improvement while ensuring the business objectives of SOC are achieved. 5. Carefully selected Data Sources provide high value in threat detection. People need to be careful and selective in determining the type and amount of data that is fed into the technology stack. More is not always better! 6. Threat Intelligence is a must for the success of any modern SOC. It helps in proactive threat hunting and helps in automation, responding to threats at machine speed.
The Security Reference Architecture provides models for clients customize
vSphere 7 ESXi Secure Boot Options | ESX Virtualization
Terence Luk: What is Azure Key Vault?
Achieving Cyber Vigilance with Zero Trust | VMware Security Blog
Enterprise networks: The 5 most common configuration errors | Born's Tech and Windows World
1. Standard credentials 2. Multiple use of passwords 3. Open remote desktop services and standard ports 4. Delayed software updates 5. Logging turned off
SecAware blog: Stepping on the cracks
SecAware blog: News on ISO/IEC 27002
Bucky - An Automatic S3 Bucket Discovery Tool
Supply chain attack examples: 6 real-world incidents | CSO Online
1. Upstream server compromise: Codecov attack 2. Midstream compromise to ship malicious updates 3. Dependency confusion attacks 4. Stolen SSL and code-signing certificates 5. Targeting developers' CI/CD infrastructure 6. Using social engineering to drop malicious code
HITRUST explained: One framework to rule them all | CSO Online
Cyber Insurance Firms Start Tapping Out as ...
Create Your Own Free Website Checker - linuxwebdevelopment.com
Microsoft Word - CSFv9.2_Introduction SR.docx - CSFv9.4_Introduction.pdf
Use Ansible like a Programming Language - Blog dbi services
How the Internet Has Turned Into the Modern-Day Battlefield
Your Old Phone Number Can Be Used to Hack You, Study Finds
New Open Source Project Automates Data Deletion Requests by Email – Digital Lab at Consumer Reports
Your 10-Minute Guide to PKI & How Internet Encryption Works
Multiple Healthcare Provider Clients Affected by CaptureRx Ransomware Attack
Exclusive: White House launches new artificial intelligence website - Axios
Mubeng - An Incredibly Fast Proxy Checker And IP Rotator With Ease
CyberBattleSim - An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments
Waybackurls - Fetch All The URLs That The Wayback Machine Knows About For A Domain
CANalyse - A Vehicle Network Analysis And Attack Tool
Judge-Jury-and-Executable - A File System Forensics Analysis Scanner And Threat Hunting Tool
A Closer Look at the DarkSide Ransomware Gang – Krebs on Security
Reviving Old Recipe For Faraday Wax Keeps Vacuum Experiments Going | Hackaday
Cloud CLI - Blog dbi services
Remote Access Tools Deemed Cyber-Threats by Ponemon Institute
Patch Deployment: A Key Aspect of Any Good Cybersecurity Strategy
Five Great Reads on eDiscovery for May 2021
Ten Tips for Better ESI Expert Reports | Ball in your Court
Answer the questions you were engaged to resolve. Don’t overreach your expertise. Define jargon, and share supporting data in useful, accessible ways. Distinguish factual findings from opinions. Include language addressing the applicable evidentiary standard. Eschew advocacy; let your expertise advocate for you. Challenge yourself and be fair. Proofread. Edit. Proofread again. Sleep on it. Edit again. Avoid assuming the fact finder’s role in terms of ultimate issues. Listen to your inner voice.
Easy LPEs and Common Software Vulnerabilities
CheeseTools - Self-developed Tools For Lateral Movement/Code Execution
Qvm-Create-Windows-Qube - Spin Up New Windows Qubes Quickly, Effortlessly And Securely
U.S. Military Personnel Spilled Nuclear Secrets in Online Flashcards
Researcher’s First Hack Was a Martial Arts Movie-Inspired Prank
Central Ohio ISSA InfoSec Summit Summary | CQURE Academy
Microsoft’s Acquisition of Nuance - Implications for the Voice Authentication and Security Industry | Pindrop
How Are Cyber Insurance Companies Assessing ...
Cloud Compromise Costs Organizations $6.2M Per Year
$6.2M Per Year
Health Data Breach Tally's 2021 Surge Continues
Privacy Rights: GDPR Enforcement Celebrates Third Birthday
Cyber Insurance: Higher Premiums, Limited Coverage
Five Practical Steps to Implementing a Zero-Trust Network
1. Identifying and segmenting data 2. Mapping the traffic flows of your sensitive data and associate them to your business applications 3. Architecting the network 4. Monitoring 5. Automate and orchestrate
Office surveillance: Digital leash on workers could be crossing a line
Should we treat OSD compliance as a binary? – Blog FiascoBlog Fiasco
Using network bound disk encryption with Stratis - Fedora Magazine
tmt hint 01: provisioning options – Fedora Community Blog
Erman Arslan's Oracle Blog: Exadata X8M-2 & PCA X8-2 -- Part 2 Installation / Exadata X8M-2 installation (Imaging, install.sh steps, insights, notes and so on)
Chris's Wiki :: blog/sysadmin/LessFilteringLines
How to Make Your 1,000+ User WVD Deployment Highly Available
VDI Drones 3.2 has been released. Find out what’s new
ESXi to Libvirt, now with more Terraform. – blog.kroy.io
I’ll show you mine, if you show me yours
How Do You Plan to Respond to a Ransomware Attack? - RouterFreak
How to Verify Applied GPOs with the GPResult Tool
Understanding Cyber Resilience | Data Protection Hub
Jerikan+Ansible: a configuration management system for network
This MOS note is not available anymore??!?
Guidebook for open source community management: The Open Source Way 2.0
Cyberark Per Host Password Lookup In The Ansible Automation Platform | Greg Sowell Saves The World
Using Collections With Ansible Tower/Ansible Control | Greg Sowell Saves The World
The Privacy Act Project: Revisiting and Revising the Privacy Act of 1974 - Lawfare
Adapting to the Cyber Domain: Comparing U.S. and U.K. Institutional, Legal and Policy Innovations - Lawfare
The Cyberlaw Podcast: Is Apple Storing Its Dorian Gray Portrait Behind the Great Firewall? - Lawfare
Linux Directory structure explained : A reference guide - LinuxTechLab
7 Quirky 'ls' Command Tricks Every Linux User Should Know
ls -l --time-style=full-iso
Visualizing performance in Red Hat Enterprise Linux 8.4 web console
PowerShell Is Source of More Than a Third of Critical Security Threats
Raspberry Pi PoE+ HAT features 25.5W PoE+
Cyber insurance rates to increase 20-50% this year: Aon | Business Insurance
UK: Customers hit as ransomware incident blacks out Doncaster insurance firm
Running Modern Linux From A Single Floppy Disk | Hackaday
How to Work with Ansible Provisioner in Vagrant
(1) Hyperfine: The BEST Way To Benchmark CLI Tools - YouTube
dnssecuritytxt | A standard allowing organizations to nominate security contact points and policies via DNS TXT records.
Security contact via DNS
GitHub - woj-ciech/Shomap: Create visualization from Shodan query
How to Remove Lines from a File Using Sed Command
What the Best Mentors Do
Linux - Reset password expiration, age and history - LinuxConfig.org
grep -R -i passwd /var/log/auth.log
JENKINS - recover access to your Jenkins Admin Dashboard - Blog dbi services
Merging RVTools reports using Power BI -
Our cybersecurity 'industry best practices' keep allowing breaches | TheHill
FBI Issues Conti Ransomware Alert as Attacks Target Healthcare
Health care privacy law updates from Colorado, Washington
Adding arguments and options to your Bash scripts | Enable Sysadmin
AutoPentest-DRL - Automated Penetration Testing Using Deep Reinforcement Learning
IPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often Seized At Crime Scenes By Law Enforcement Or In A Corporate Investigation By Private Examiners
Ransomware gang behind Ireland attack also hit US health and emergency networks | Engadget
A Step-by-Step Guide to Getting Started with Ansible on Windows
VCP-DCV Objective 7.11.2 - Describe ESXi Updates | ESX Virtualization
NIST Seeks Input on HIPAA Security Rule Guidance Update
IT Modernization Grants Will Prioritize Cybersecurity
DHS confirms new cybersecurity rules for pipeline companies | Engadget
7 Frugal Meals That Are Easy to Prepare – BeingFrugal.net
How to Use Handlers in Ansible Playbook
Losing control to Kubernetes
More Healthcare Disruptions Tied to Vendor Incidents
Exclusive Interview: New HHS ONC Leader on Health Data Security
Home Audio/Visual Setup - The IT Hollow
How To Build a All Wood Standing Desk for Less then $400 - TDSheridan Lab
Determining Risk Less Badly – Jordan Potti – Security Things
Dell Technologies Introduces APEX as the "New Dell" - Architecting IT
HPE Introduces Alletra and the Data Services Cloud Console - Architecting IT
How to Benchmark Kubernetes Storage - Architecting IT
The Need to Benchmark Kubernetes Storage - Architecting IT
Storage Predictions for 2021 and Beyond (Part IV – CAS) - Architecting IT
Storage Predictions for 2021 and Beyond (Part V - Open Source) - Architecting IT
Storage Predictions for 2021 and Beyond (Part III - SDS) - Architecting IT
Storage Predictions for 2021 and Beyond (Part II - Systems) - Architecting IT
Storage Predictions for 2021 and Beyond (Part I - Media) - Architecting IT
The Rise, Fall and End of Violin Memory - Architecting IT
Improving Application Security with UndefinedBehaviorSanitizer (UBSan) and GCC | Oracle Linux Blog
An always free 4 vCPU 3.0 GHz 24 GB RAM on OCI - Blog dbi services
How to document your job – Blog FiascoBlog Fiasco
DHS will issue mandatory cybersecurity rules for pipeline companies | Engadget
http-sys vulnerability (CVE-2021-31166) also threatens WinRM service | Born's Tech and Windows World
Irish health service shut down amid ransomware attack - IT Governance UK Blog
Workaround for OneDrive login error 0x8004de40 | Born's Tech and Windows World
dsregcmd /leave dsregcmd /join
How do cyber attacks affect your organisation? - IT Governance UK Blog
ESXi 7.0 U2a Potentially Killing USB and SD drives! · vNinja.net
Lusser's Law and Applicability | APMdigest - Application Performance Management
Browser Monitoring in Minutes! | APMdigest - Application Performance Management
Build vs Die
When Hardware Drives Software Upgrades | The Networking Nerd
Insecure Protocols: SMBv1, LLMNR, NTLM, and HTTP | CSO Online
Career plan template - 80,000 Hours
Key parts of the career planning template: What does a fulfilling, high-impact career look like for you? (What are your career goals?) Clarify your views of which global problems are the most pressing Generate ideas for longer-term paths Clarify your strategic focus Determine your best-guess next career step Plan to adapt Get feedback, investigate key uncertainties, and make a judgement call Put your plan into action
6 lesser-known but seriously useful Linux commands | Enable Sysadmin
Microsoft cloud architecture models - enterprise resource planning | Microsoft Docs
Accessing USB Flash Drive from VMWare ESXi | Windows OS Hub
Passed Linux Foundation Certified System Administrator – UseIT | Roman Levchenko
Take a Screenshot of a User's Desktop with PowerShell | Windows OS Hub
Alaska Health Department Services Affected by Malware Attack
Press Release: Low-tech Attacks. Critical Infrastructure poorly secured - Attacks against Colonial Pipeline used Standard Access Tools | DeepSec In-Depth Security Conference
Attackers Were Inside SolarWinds in January 2019
RSA's CEO: For Maximum Resiliency, Unleash Chaos Monkeys
How to test image performance of Java libraries with JMH and IDEA IDE
How to setup SonarQube
Hording AD groups through wbinfo « On the third side
Shenandoah garbage collection in OpenJDK 16: Concurrent reference processing | Red Hat Developer
Getting the most out of Linux Bash history command
ransomware, real resolutions
Some quick thoughts on ransomware as a tractable problem. Create a superfund to hire ransomware developers and support staff. Pay them to do something productive, or at least non criminal. The only people with power over ransomware gangs are the protectors providing the safe havens they reside in. If you cannot make North Korea, China, Russia or even Ukraine, cooperate then there’s no way to eradicate them Ransomware is a billion dollar industry with a few major players reaping the rewards. The ransomware10, R10 gangs are pulling in tens, or hundreds, of millions. Those millions pay for “protection” The money is mostly spent inside the safe haven. Ransomware is a problem for the West. This is a strategic alignment with Russian (and Chinese) interests.
Data Lake, Data Lab, Data Hub: what’s the difference? | Ubuntu
The Best Note Taking Apps for Students to Install on Linux
CNA Financial reportedly paid $40 million to resolve a ransomware attack | Engadget
Analysis of the 2021 Verizon Data Breach Report (DBIR) | Daniel Miessler
8 things CISOs should be thinking about, but probably aren't | CSO Online
1. Ensuring that third-party partners maintain strong security 2. Investigating innovation opportunities 3. Understanding their enterprise's data footprint 4. Strengthening security team support and focus 5. Thinking ahead 6. Maintaining return on existing security investments 7. Finding ways to build enterprise management unity 8. Developing a truly effective method to sharpen threat awareness
Dark Reading | Security | Protect The Business
Using SDR to Build a Trunk Tracker - Police, Fire, and EMS Scanner - Black Hills Information Security
Microsoft Teams released, free for private use | Born's Tech and Windows World
`
Threat Modeling | Security Education Companion
How Not to Bomb Your Offer Negotiation - haseeb qureshi
Ten Rules for Negotiating a Job Offer - haseeb qureshi
Right now I’m talking with a few other companies so I can’t speak to the specific details of the offer until I’m done with the process and get closer to making a decision. But I’m sure we’ll be able to find a package that we’re both happy with, be
Das U-Blog by Prashanth: Manually Creating a Rudimentary Searchable Image Tagging System
Web App Pen Testing in an Angular Context - Black Hills Information Security
Japan’s Rikunabi Scandal Shows The Dangers of Privacy Law Loopholes | Electronic Frontier Foundation
Rikunabi
Outliving Outrage on the Public Interest Internet: the CDDB Story | Electronic Frontier Foundation
Surveillance Self-Defense Playlist: Getting to Know Your Phone | Electronic Frontier Foundation
This guide will help users understand a wide range of topics relevant to mobile privacy, including: Location Tracking: Encompassing more than just GPS, your phone can be tracked through cellular data and WiFi as well. Find out the various ways your phone identifies your location. Spying on Mobile Communications: The systems our phone calls were built on were based on a model that didn’t prioritize hiding information. That means targeted surveillance is a risk. Phone Components and Sensors: Today’s modern phone can contain over four kinds of radio transmitters/receivers, including WiFi, Bluetooth, Cellular, and GPS. Malware: Malicious software, or malware, can alter your phone in ways that make spying on you much easier. Pros and Cons of Turning Your Phone Off: Turning your phone off can provide a simple solution to surveillance in certain cases, but can also be correlated with where it was turned off. Burner Phones: Sometimes portrayed as a tool of criminals, burner phones are also often used by activists and journalists. Know the do's and don’ts of having a “burner.” Phone Analysis and Seized Phones: When your phone is seized and analyzed by law enforcement, certain patterns and analysis techniques are commonly used to draw conclusions about you and your phone use.
Alternative Ways To Perform Basic Tasks
Mental Health Month | Diary of a Network Geek
Google Online Security Blog: Making the Internet more secure one signed container at a time
NSA: Connecting OT to the net can lead to "indefensible levels of risk"
"indefensible levels of risk"
Reasonable IR Team Expectations – tisiphone.net
Ransomware Attack Leads to IT Shutdown for Irish Hospitals
“The real issue with hacks such as the event that impacted Irish Healthcare is patients’ sensitive data and associated records are potentially being exposed and released into the view of unauthorized viewers."
Groups Call for Alignment of HIPAA Privacy Rule, Other Regs
Scumbag ransomware attackers hit Irish Health Service • Graham Cluley
'No sense' other agencies affected by attack - Ryan
Cyber-crime: Irish health system targeted twice by hackers - BBC News
Colonial Pipeline take-away for CISOs: Embrace the mandates | CSO Online
Cyberinsurance giant AXA hit by ransomware attack after saying it would stop covering ransom payments • Graham Cluley
DFIR-O365RC - PowerShell Module For Office 365 And Azure AD Log Collection
Red-Kube - Red Team K8S Adversary Emulation Based On Kubectl
5 Question on Cybersecurity — EtherealMind
Linux 101: What are the Linux systemd equivalents of runlevels? - TechRepublic
However, systemd takes a much more logical approach to runlevels. Here's how systemd targets track with the old-school runlevels. poweroff.target is shutdown or power off, so it's akin to runlevel 0. rescue.target launches the rescue shell session, so it's like runlevel 1. multi-user.target launches the system in non-GUI, multi-user mode, so it's like run levels 2, 3, and 4. graphical.target launches the system into a GUI, multi-user mode, so it's like runlevel 5. Finally, reboot.target shuts down or reboots the system, so it's like runlevel 6. Most of your systems will use runlevels 3, 4 or 5, which translates to either multi-user.target or graphical.target. These targets are defined in the systemd startup scripts in /etc/systemd/system and are generally found in the install section, as in WantedBy=multi-user.target. And those are the systemd equivalents of sysvinit runlevels. Hopefully, this helps to demystify systemd just a bit for you.
IT job hunt: 3 tips to get a recruiter's attention | The Enterprisers Project
1. Be creative – but personalize your approach 2. Look for opportunities in unexpected places 3. Think and speak as if you already have the job
NSA, ODNI and CISA Release 5G Analysis Paper — EtherealMind
Ransomware: Stop Counting on Cyber Insurance | Data Protection Hub
How to use commands in a search bar in Teams - SharePoint Maven
El Carro: The Oracle Operator for Kubernetes - Blog dbi services
Starting with Simple Ansible Playbooks - Blog dbi services
Chart: Cybersecurity Now a Top Corporate Priority
Colonial Pipeline shutdown highlights need for better OT cybersecurity practices | CSO Online
The Cyber Cold War Is Here | The Nation
Kubernetes configuration patterns, Part 2: Patterns for Kubernetes controllers | Red Hat Developer
Kubernetes configuration patterns, Part 1: Patterns for Kubernetes primitives | Red Hat Developer
Why You Should Replace 'ls' With 'exa' Linux Command For Listing Files
How to benchmark your websites with the open source Apache Bench tool - TechRepublic
How to set up a hex editor on Kali Linux
How To Use Linux KVM To Optimize Your Windows 10 Virtual Machine - Front Page Linux
Soft unbricking Bay- and Cherry-Trail tablets with broken BIOS settings - Hans' hacking log — LiveJournal
curl -G vs curl -X GET | daniel.haxx.se
Biden administration, Congress unite in effort to tackle ransomware attacks | TheHill
Ireland shuts down health IT system after ransomware attack - Japan Today
Health care institutions have been frequent victims of ransomware attacks. In Los Angeles, Hollywood Presbyterian Medical Center revealed in 2016 it paid $17,000 to hackers to decrypt important data.
Everything You Need to Know About the New Executive Order on Cybersecurity - Lawfare
Biden Signs Executive Order on Cybersecurity - Lawfare
Cyberspace Is Neither Just an Intelligence Contest, nor a Domain of Military Conflict; SolarWinds Shows Us Why It’s Both - Lawfare
How the U.S. Government Can Learn to See the Future - Lawfare
Israel’s Version of Moving Fast and Breaking Things: The New Cybersecurity Bill - Lawfare
Guide to Understanding File Permissions in Linux - Low End Box
InfoSec Handlers Diary Blog - Ransomware Defenses
Ireland refuses to pay ransom demand in attack on its national health service - The Verge
'We will not be paying any ransom' over cyber attack
Ireland’s Health Service Executive hit by ransomware attackSecurity Affairs
Chris's Wiki :: blog/sysadmin/MetricsDownsamplingNotIdeal
10 Steps to Cyber Security - NCSC.GOV.UK
(29) Medical Devices Cybersecurity - YouTube
Commercial Plumbing: What Business Owners Need to Know – Business
A Step By Step Guide To Deep Cleaning Without Breaking The Bank | Penniless Parenting
Shit Just Got Real – The Felder Report
How to find WWN and WWPN of HBA card in Linux | 2DayGeek
Doc Searls Weblog · How the cookie poisoned the Web
Systemd Service Hardening | Linux Journal
LFCA – Useful Tips for Securing Data and Linux – Part 18
iOS Forensics: how to perform a logical acquisition with libimobiledevice | Andrea Fortuna
How to Install RedNotebook 2.12 in Ubuntu 19.10, 18.04 | UbuntuHandbook
sudo add-apt-repository ppa:rednotebook/stable sudo apt update sudo apt install rednotebook
Insurer AXA halts ransomware crime reimbursement in France
My keyboard - May 2021 | Hund
BASHing data: overview
Rustls: memory safety for TLS [LWN.net]
New-SelfSignedCertificate: Creating Certificates with PowerShell
FragAttack: Attack on WLAN devices | Born's Tech and Windows World
What’s in my desk? — Nathan Baker | Cool Tools
TuTuShop Under Table Drawer, Hidden Self-Adhesive Pencil Tray Drawer,Under Desk Holder Storage Box, Stationery Pencil Storage Drawer Organizer for Office/School/Kitchen (2 Pack White+Grey)
Despite Heightened Breach Fears, Incident Response ...
The 7 Guiding Principles for Developer Engagement – The New Stack
"As you move forward, remember: start small, start now, and keep at it!" The Seven Guiding Principles for Developer Engagement Understanding: Incorporation: Coordination: Participation: Transparency and authenticity: Accessibility: Inclusion:
kcp: Kubernetes Without Nodes and Why I Care :: rm-rf.ca
Automating the testing process for SystemTap, Part 2: Test result analysis with Bunsen - Red Hat Developer
Use knowledge graphs to discover open source package vulnerabilities - Red Hat Developer
scan multiple log subdirectories for the latest log files and tail them Using cut, ls, sh, tail, tr, xargs
ls /var/log/* -ld | tr -s " " | cut -d" " -f9 | xargs -i{} sh -c 'echo "\n---{}---\n"; tail -n50 {}/`ls -tr {} | tail -n1`'
Poor Disk Performance
The Mosquito and the Hurricane: Jim Whitehurst on the Past, Present, and Future of IBM |
“Men are only as good as their technical development allows them to be.” –George Orwell
Mindmap Demystifying the “SVCHOST.EXE” Process and Its Command Line Options - Koen Van Impe - vanimpe.eu
How To Use Nmap - A Comprehensive Guide: Basics To Advanced
What is the OSI model?
Security Incident Leads Scripps Health to Postpone Care
Chinese Military-Civil Fusion and Section 1260H: Congress Incorporates Defense Contributors - Lawfare
Doc Searls Weblog · A half-century of NPR
LFCA: Learn Cloud Costs and Budgeting – Part 16
4 Linux terminal multiplexers to try | Opensource.com
Digital transformation: 4 ways to build in security | The Enterprisers Project
1. Take a proactive security stance 2. Remove silos and do audits 3. Prioritize executive communication on security 4. Set users up for success
IT leadership: How to spot a collaboration superstar in interviews | The Enterprisers Project
1. How do you provide feedback to a colleague who is struggling or performing poorly? 2. What project are you most proud of? 3. Share an example of a team project that failed 4. How do you influence people who do not report to you? 5. Tell me about a time you had to work with a colleague with whom you didn’t get along
Do Not Miss These 10 Steps in Application Security Assessment
1. Have a Clear Application Security Policy In Line with Your Business 2. Discover and Manage the Assets 3. Controls Analysis 4. Threat Intelligence 5. Scanning the Applications Continuously 6. Penetration Testing 7. Managing False Positives 8. Attack Probability Determination 9. Application Security Risk Assessment 10. Result Documentation
Terence Luk: Azure Server-side Encryption (SSE) and Azure Disk Encryption (ADE) - Part 2 of 2
Terence Luk: Azure Server-side Encryption (SSE) and Azure Disk Encryption (ADE) - Part 1 of 2
Azure Server-side Encryption (SSE) and Azure Disk Encryption (ADE)
CSI Topology – Configuration How-To – CormacHogan.com
NVMe Storage Server Project - The Tech Journal
Comparing VM Encryption performance between ESXi 6.7U3 + vSAN and ESXi 7.0U2 + vSAN | Electric Monk
How I Passed The #CISSP #vExpert #VCDX @kmcnam1 -
A first look at vSphere VM Service – CormacHogan.com
Use the ACME DNS-Challenge to get a TLS certificate - Marco Franssen
Put your ssh experience in Windows on Steroids - Marco Franssen
[blog 005]# git commit – techaspire.com.au
jQuery events contributes to clean Javascript - Marco Franssen
5 key qualities of successful CISOs, and how to develop them | CSO Online
A modern CISO speaks the language of the business They equally need to understand the mission of their company, articulate how their work supports that mission, provide actionable insights to leadership, and create a security-focused culture throughout their organizations. A modern CISO is a collaborator To be effective, cybersecurity needs the support and expertise from other parts of the business, as diverse as IT and communications, internal audit, human resources, marketing and even cultural change programs.” A modern CISO is emotionally intelligent Having empathy and understanding about what is worrying them helps here and ensures we are genuinely interested and engaged. This leads to a more positive outcome.” A modern CISO has strategic focus Focusing on strategic priorities rather than reacting to inbound information is therefore a common and noteworthy challenge for CISOs today, Papadopoulos adds. “However, I’ve seen terrific CISOs who excel at this in a few ways: through having a concise, documented strategy or shortlist of priorities, by getting top stakeholders to agree and share ownership of the priorities so they become externally driven rather than just the priority of the CISO themselves, and by spending time in peer-to-peer conversations with other CISOs where they can focus on their most important issues rather than reacting to other peoples’ most important issues.” A modern CISO is tenacious
Researchers Explore Active Directory Attack Vectors
This Is the NSA’s 650-Page Guide to the Internet
When Stretching Layer Two, Separate Your Fate — Ethan Banks
Cheerleading Mom Is Accused of Creating ‘Deepfakes’ of Teens to Harass, Threaten Them
Hauppauge WinTV-HVR-950 - LinuxTVWiki
extract_xc3028.pl
America Has Been Through An Opioid Crisis Before
Everything You Need to Know About the Great Semiconductor Shortage
The Last Time the Suez Canal Was Blocked a Utopian Communist Micronation Was Formed at Sea
How to Make Your Video Camera Look Amazing - Wahl Network
How I Use an Elgato Stream Deck for Work - Wahl Network
Import Into ServiceNow CMDB Via Ansible ServiceNow Collection | Greg Sowell Saves The World
Why do you need a password to download older patch bundles?
Tips and tactics of today's cybersecurity threat hunters | CSO Online
Vulnerability Management: Essential Components
Amlsec - Automated Security Risk Identification Using AutomationML-based Engineering Data
OpenEDR - Open EDR Public Repository
5G - 101 - Koen Van Impe - vanimpe.eu
Vulmap - Web Vulnerability Scanning And Verification Tools
GRecon - Your Google Recon Is Now Automated
Kenzer - Automated Web Assets Enumeration And Scanning
Watcher - Open Source Cybersecurity Threat Hunting Platform
OpenCSPM - Open Cloud Security Posture Management Engine
MOSINT - OSINT Tool For Emails
Wynis - Audit Windows Security With Best Practice
EagleEye - Stalk Your Friends. Find Their Instagram, FB And Twitter Profiles Using Image Recognition And Reverse Image Search
Aura - Python Source Code Auditing And Static Analysis On A Large Scale
Sigurlx - A Web Application Attack Surface Mapping Tool
BigBountyRecon - This Tool Utilises 58 Different Techniques To Expediate The Process Of Intial Reconnaissance On The Target Organisation
ByteDance-HIDS - A Cloud-Native Host-Based Intrusion Detection Solution Project To Provide Next-Generation Threat Detection And Behavior Audition With Modern Architecture
Sarenka - OSINT Tool - Data From Services Like Shodan, Censys Etc. In One Place
Writehat - A Pentest Reporting Tool Written In Python
Horusec - An Open Source Tool That Improves Identification Of Vulnerabilities In Your Project With Just One Command
Horusec
Tips on Enhancing Supply Chain Security - HealthcareInfoSecurity
Data breaches and cyber attacks quarterly review: Q1 2021
Ldsview - Offline search tool for LDAP directory dumps in LDIF format
UAC - Unix-like Artifacts Collector
Maigret - OSINT Username Checker. Collect A Dossier On A Person By Username From A Huge Number Of Sites
Watson - Enumerate Missing KBs And Suggest Exploits For Useful Privilege Escalation Vulnerabilities
SecretScanner - Find Secrets And Passwords In Container Images And File Systems
KICS - Find Security Vulnerabilities, Compliance Issues, And Infrastructure Misconfigurations Early In The Development Cycle Of Your Infrastructure-As-Code
OSCP-Exam-Report-Template-Markdown - Markdown Templates For Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP Exam Report
Server Security Best Practices | ServerWatch
Windows Privilege Escalation: SeBackupPrivilege
Active Directory Enumeration: PowerView
Wireshark for Pentester: Password Sniffing
Empire for Pentester: Active Directory Enumeration
Thoughts on writing better documentation | stewart a.
Introductory Considerations to Cyber Resiliency | Data Protection Hub
Ransomware Recovery Costs Near $2M
To better defend digital assets, follow physical security's playbook | CSO Online
Perform Linux memory forensics with this open source tool | Opensource.com
Defenseless | University of Virginia School of Engineering and Applied Science
Simplifying In-Place Upgrade from Oracle Linux 7 to 8 with Leapp | Oracle Linux Blog
Leapp
Exa – A Modern Replacement for ls Command
Encrypting and decrypting files with OpenSSL | Opensource.com
From URGENT/11 to Frag/44: Analysis of Critical Vulnerabilities in the Windows TCP/IP Stack | Armis
How to Install Apache Tomcat 9 with Nginx Proxy on Debian 10
NSA: OT Security Guidance in Wake of SolarWinds Attack
These include: Cryptographically protecting all access vectors and logging all access attempts from vendors or any outsourced OT asset support, remote connections, internal access, especially via open, unmanaged networks, and direct physical access. Disconnecting all remote access connections until there is active monitoring in place. Creating an OT network map and device settings baseline, and validating all equipment on the network. Assessing and prioritizing OT network cybersecurity needs to identify required mitigations and then deploying cyber-hardening strategies.
Active Directory Enumeration: BloodHound
Homemade Daily Shower Cleaner Spray
Chris's Wiki :: blog/sysadmin/DNSDynamicUpdatesToUs
7 Modern-Day Cybersecurity Realities
Are the Cloud Apps You Build Really Secure? Companies Can Shift Left but Still Must Shift Right WAFs and Gateways Won't Fully Secure APIs Traditional Patch and Vulnerability Management Tools Won't Secure APIs Basic Awareness Training Falls Way Short -- Especially For Engineers Just Buying a New Tool Doesn't Make the Company Secure Companies Rolling Out IoT Products Don't Always Focus on Security
An example of ORA-01152: file ... was not restored from a sufficiently old backup - Blog dbi services
ORA-01152
How to Find (and Remove) Unlinked GPOS in Active Directory
7 Ways Data Governance Can Benefit Your Business – Around the Web
1. Rely On Consistent Data 2. Boost Data Quality 3. Access to Complete and Accurate Data 4. Improve Decisions Making Process 5. Enhance Business Planning 6. Boost Financial Performance 7. Increase Business Profits
In Appreciation: Dan Kaminsky
Guide: How to Setup Ansible (Ubuntu, RHEL, CentOS, macOS)
Cost of ransomware more than doubles in a year
Building Intrusion Detection Honeypots Online Course | Chris Sanders
Chris's Wiki :: blog/sysadmin/SSHNonAnnoyingMFAQuestion
15 open source GitHub projects for security pros | CSO Online
1. ELF Parser 2. YARA 3. PageBuster 4. AuditJS 5. Mihari 6. Regexploit 7. Awesome Cobalt Strike Defence 8. Boomerang 9. OWASP Zed Attack Proxy (ZAP) 10. Shadrak 11. Photon 12. Harlogger 13. MozDef 14. Lynis 15. Autopsy / The Sleuth Kit
Buying cyber insurance in 2021? Expect greater scrutiny, higher premiums | CSO Online
Ransomware Attack Vectors shift as New Software Vulnerability Exploits Abound
Profil3r - OSINT Tool That Allows You To Find A Person'S Accounts And Emails + Breached Emails
The GitOps Journey
Set-ADUser: How to Change User Properties in Active Directory with PowerShell | Windows OS Hub
IRTriage - Incident Response Triage - Windows Evidence Collection For Forensic Analysis
PentestBro - Combines Subdomain Scans, Whois, Port Scanning, Banner Grabbing And Web Enumeration Into One Tool
Gotestwaf - Go Test WAF Is A Tool To Test Your WAF Detection Capabilities Against Different Types Of Attacks And By-Pass Techniques
Mapping Your Way To Compliance With Cybersecurity Frameworks | CSO Online
PCI recommends CIS standards for hardening The DoD Cloud Computing Security Requirements Guide references CIS Benchmarks as an acceptable alternative to the STIGs and SRGs, Section 5.5.1 The CIS Controls are referenced by the National Governors Association and NIST FedRAMP lists CIS Benchmarks if U.S. government configuration guidelines aren’t available for a specific platform
Why senior management needs to make cloud backup a priority
Columbo - A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets
ThreatMapper - Identify Vulnerabilities In Running Containers, Images, Hosts And Repositories
ThreatMapper
End of Life of Flash? | >_
Shift Left: From Concept to Practice
16 years - A Reflection - CormacHogan.com
Terence Luk: PowerShell script to remove users in an Active Directory group from all Microsoft Teams' Teams in an organization
Grassroots Oracle: Kicking the tyres on Oracle APEX 21.1
Ubuntu: list USB devices
lsusb > ~/my-usb-devices.txt sudo dmesg | grep usb > ~/dmesg-usb-info.txt usb-devices > ~/my-usb-devices-output.txt
The 8 Best Self-Hosted Proxy Servers | FOSS Linux
Security Researcher Dan Kaminsky Passes Away | SecurityWeek.Com
Ping command basics for testing and troubleshooting | Enable Sysadmin
List of data breaches and cyber attacks in March 2021 – 21 million records breached
Chris's Wiki :: blog/linux/LocalDNSCacheMaybe
Organisations turn the tide on ransomware attackers - IT Governance UK Blog
Without the incentive to negotiate with the attacker, organisations can restore their systems from backups and accept that a data leak is inevitable.
Fundamentals: Is Switching Latency Relevant? « ipSpace.net blog
Free Exercise: Build Network Automation Lab « ipSpace.net blog
1990s Warnings About Cyber War That Nobody Heard | flyingpenguin
3 must-read books on ISO 27001 - IT Governance UK Blog
Metasploit Tutorial for Beginners
CrossLinked - LinkedIn Enumeration Tool To Extract Valid Employee Names From An Organization Through Search Engine Scraping
Working From Home : Here come the hit pieces!
Vulnerablecode - A Free And Open Vulnerabilities Database And The Packages They Impact And The Tools To Aggregate And Correlate These Vulnerabilities
Vulnerablecode
How to test scripting in PowerCLI with vCenter simulator (VCSIM)
Infosecurity.US - https://infosecurity.us - Dan Kaminsky
Tscopy - Tool to parse the NTFS $MFT file to locate and copy specific files
UK organisations have faced 172,000 cyber attacks so far this year
Updating your data protection documentation following Brexit - IT Governance UK Blog
Healthcare Risks: Unprotected Databases, 'Shadow IT'
Second Medical Researcher Sentenced in Hospital IP Theft Case
Where Is the Safest Place for You to Store Bitcoin? – Around the Web
Another killer woodpecker - Security Boulevard
Way back in 1977, a computer scientist from the University of Nebraska coined “Weinberg’s law:” If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization. The problem is that since Weinberg made his law, software has become a lot like buildings – an integral part of our civilization which can have serious, even deadly, impacts when it fails. And the woodpeckers have been evolving – getting bigger, smarter, and in some cases state sponsored.
HashiCorp is the latest victim of Codecov supply-chain attack
Facebook Breach Means More Munitions for Fraudster ATO attempts | Pindrop
- CERIAS - Purdue University
Explaining Threats, Threat Actors, Vulnerabilities, and Risk Using a Real-World Scenario | Daniel Miessler
Improving the Vulnerability Reporting Process With ...
[SANS ISC] How Safe Are Your Docker Images? - /dev/random
The cybersecurity researcher Dan Kaminsky has diedSecurity Affairs
Artificial Intelligence and Discrimination risks in the healthcare sector
How to Use Sysbench for Linux Performance Testing? – Linux Hint
Best Java EE Frameworks| APN News
(5) 10 BEST Tips & TRICKS with a sample CABLE TIES - YouTube
(5) Breadboarding tips - YouTube
Pentesting: What I should have done – DiabloHorn
The Lawfare Podcast: DHS Leadership Talk Cybersecurity - Lawfare
The Cyber Regulators Are Coming for the Cloud - Lawfare
How to build an active-active-active cluster with RHEL 8 and Percona MySQL | Enable Sysadmin
Why and When to Upgrade Servers | ServerWatch
LFCA: Learn Basic Network Troubleshooting Tips – Part 12
How to Install Jupyter Notebook on Ubuntu 20.04 / 18.04 - SpeedySense
Patching all my environments with the April 2021 Patch Bundles
3 Ways to Check Your Wi-Fi Password in Ubuntu | UbuntuHandbook
Oracle 19c Installation with 19.11.0 RU, OJVM and some other fixes
How cybercriminals are targeting healthcare organizations [Q&A]
Starlink is a global ISP built at ZERO COST to SpaceX, enabling NASA's Artemis launch
SQL Server: Get email notifications for Error Log entries - Blog dbi services
The Insider’s Guide To Evangelizing Good Design | Scott Berkun
SOC 2 Attestation Tips for SaaS Companies
PXE-boot server – Summary – Part 5/5 – Devops
PXE-boot server – Build your own PE (Preinstallation Environment) – Part 4/5 – Devops
PXE-boot server – dhcp & tftp server setup – Part 3/5 – Devops
PXE-boot server – Setup media-share function for OpenMediaVault – Part 2/5 (skippable) – Devops
The Weight of Light: A Collection of Solar Futures | Center for Science and the Imagination
Cities of Light: A Collection of Solar Futures | Center for Science and the Imagination
PXE-boot server – Introduction – Part 1/5 – Devops
Cybersecurity Awareness Training - Open Source Presentation & Slides - TreeTop Security
I cannot print or scan via USB on Ubuntu 20.04 or later or on its derivative (Linux) | Brother
Ubuntu Brother Printer-Scanner Network Setup | Kitson Consulting
Using a Brother network scanner with Linux · Just a pile of Old Computer Junk
AutoML – using TPOT « Oralytics
Hackers stole driver's license numbers from Geico's website | Engadget
How to Install OpenMAINT on Ubuntu 20.04
[Howto] Using systemd timers instead of /etc/cron entries – /home/liquidat
Basics: Backup Lifecycle | Data Protection Hub
Microsoft unveils its own Java distribution | InfoWorld
Building a better battery analyzer with Arduino | Arduino Blog
How to write a cyberthreat report executives can really use | CSO Online
Consider your audience The report you write to the CIO is different than the one to the CEO or a board, because you’re dealing with two different levels of knowledge,” says Bruce deGrazia, program chair for cybersecurity management and policy at the University of Maryland Global Campus. Or they may share their threat reports with board members but only in certain circumstances. “If it’s a high-level threat report, a good proactive CISO will distribute it widely,” says Jon Oltsik, an ESG senior principal analyst, an ESG fellow, and the founder of the firm’s cybersecurity service. Form, function, and timing Although there’s no single template for crafting a threat report, “it should look like whatever you think people will read," says deGrazia. "Senior managers get hit with lots and lots of paper, so whatever format it’s in, it has to get their attention.” Timothy R. Campo, who as director of Applications & Security at (ISC)2 is the senior-most security person in the organization, has aligned his threat reports to the best practices outlined in the NIST 800-53 framework. Campo also issues cyberthreat reports as urgent issues arise. For example, he distributed a report following news of the SolarWinds hack explaining the lack of risk to (ISC)2. “We had zero threat, but I had to lay it out in a way that was clear,” he says, noting that his report also outlined some proactive steps he decided to take as a result of the SolarWinds breach. What to include Threat reports should include information about threats that could exploit vulnerabilities within the organization, how the security team is mitigating vulnerabilities, how its defending against threats and any additional actions that will be taken. “Executives and the board really care about the things that impact them. That’s the art of writing these reports: The CISO has to know enough to say there are attacks going on but they’re not impacting us but there are other things that could hurt us,” Oltsik explains. “So if I were writing a cyberthreat report, it would be very concise, include what the incident is, who has been affected, what we know about it, whether we’re vulnerable—yes/no—and if yes, what do we need to do to mitigate that risk. And all of that would be [communicated] in business terms.”
Strong Security Comes in Small Packages | CSO Online
“Small and midsize businesses tend to be more agile and have the benefit of fewer degrees of separation between business and IT,” says Wolfgang Goerlich, an advisory CISO at Cisco Secure. “That means security professionals have a direct line to understanding business objectives and can ensure security measures stay in lock-step with growth plans.” Three factors contribute to support for the business and achieving security outcomes: Sufficient security staff A secure development approach IT and security collaboration “Being able to draw a line from business objectives to security initiatives helps immensely,” says Goerlich. “That means working together collaboratively to eliminate any areas of inefficiency.”
A Networking Perspective On Zero Trust Architecture (ZTA) — Ethan Banks
Zero Trust Architecture (ZTA)
Cypheroth - Automated, Extensible Toolset That Runs Cypher Queries Against Bloodhound's Neo4j Backend And Saves Output To Spreadsheets
BSidesSF 2020 - Transform Your Presentation Skills - Anne Ricketts and Hilary Spreiter
Trinity Health Data Breach: What You Need Know – NBC Connecticut
Cyberattacks on Health Insurers Continue - HealthcareInfoSecurity
Spraygen - Password List Generator For Password Spraying
Educating Hospital Board Members on Cybersecurity
Advice for Combating the 'Next' SolarWinds Attack
Sish - HTTP(S)/WS(S)/TCP Tunnels To Localhost Using Only SSH
The Joy of Tech comic... Lesser-known romantic emojii meanings...
Combating Sleeper Threats With MTTD
Prepare Your Organization for MFA Compromise | SlashNext
The Cloud Migration Gotchas.. ~ The Technology chronicle!!!
Linux Foundation launches free service to verify software authenticity
sigstore
List Of System Cleaning Tools For Ubuntu | Itsubuntu.com
HttpDoom - A Tool For Response-Based Inspection Of Websites Across A Large Amount Of Hosts For Quickly Gaining An Overview Of HTTP-based Attack Surface
Terence Luk: How to perform Content Search for Microsoft Teams IM messages
Complement your VDI environment with NSX: dFW. -
Microsoft Report: Firmware attacks on the rise | Born's Tech and Windows World
Patchday Review & Issues (April 2021) | Born's Tech and Windows World
Get better at programming by learning how things work
Advanced Design VMware vSphere 7.0 Exam (3V0-21.21) Study Links – vcdx133.com
Notepad++ Backup or Migrate
Guide To Mastering OpenSCAD Costs Roughly The Same As OpenSCAD | Hackaday
Dirty Tricks: The Latest in Ransomware Tactics | CSO Online
How to stay protected Since ransomware keeps getting dirtier, and harder to detect, consider these best practices to minimize your risk of attack: Use multi-factor authentication (MFA) Monitor for the abuse of administrative tools and privileges Encourage employees to use complex passwords, managed through a password manager Be mindful of access and give user accounts and administrators only the access rights they need Patch regularly and stay up to date
How the Biden Administration Can Make Digital ...
Remediate Insecure Configurations to Improve Cybersecurity | CSO Online
Who Invented the Personal Computer? “Apple Was Literally Following Us Around” | flyingpenguin
Mapping “America First” Revival of the KKK | flyingpenguin
How to sort and organize files recovered by PhotoRec | Andrea Fortuna
It’s Time To Get History Accurate About Power in Silicon Valley | flyingpenguin
Google Online Security Blog: A New Standard for Mobile App Security
Wireshark For Pentester: A Beginner’s Guide
Omdia Research Spotlight: XDR
Extended Detection and Response (XDR) technology is quickly taking the enterprise cybersecurity industry by storm. To meet Omdia's criteria to be classified as a "comprehensive" XDR solution, a product must offer threat detection and response functionality across three key platforms: Endpoints (often referred to as Endpoint Detection and Response or EDR) Networks (often referred to as Network Traffic Analysis or NTA, more recently as Network Detection and Response or NDR) And cloud computing environments (occasionally referred to as Cloud Detection and Response or CDR).
The Top 3 Most Common Cloud Attacks and How to Avoid Them | CSO Online
Misconfigured Storage Buckets Metadata Service Exploitation Through SSRF Credential Leakage and Overly Permissive Access
Federal Reserve Chairman Says Cyber-Risk a Top ...
How to Create an Incident Response Plan From the ...
Enable Adobe Flash on Chrome after End of Life - The Tech Journal
How I Use Home Assistant: Part 4 — Automatically Enable and Disable Sonos Night Mode with Node-RED · vNinja.net
How I Use Home Assistant: Part 3 — Morning Coffee · vNinja.net
How I Use Home Assistant: Part 2 — Light Color Changes for Calendar Based Events with Node-RED · vNinja.net
How I Use Home Assistant: Part 1 — My Setup · vNinja.net
Download A Portion Of Youtube Video with Youtube-dl And FFmpeg - OSTechNix
Additional information for your zone configuration. | c0t0d0s0.org
Tiered storage with ZFS | c0t0d0s0.org
Increasing ZFS pool sizes | c0t0d0s0.org
Improved debugging in LDAP tools and nscd | c0t0d0s0.org
How to use Ansible to configure a reverse proxy  | Enable Sysadmin
How To Install SpiderFoot on Ubuntu 20.04 LTS - idroot
AWS Certified Developer Associate Exam - Tips to pass! - mwpreston.net
Resources to prepare for the AZ-140 Configuring and Operating Windows Virtual Desktop on Microsoft Azure exam - ivobeerens.nl
Ansible Tower/Ansible Control Survey To Template Demo | Greg Sowell Saves The World
WASI, Bringing WebAssembly Way Beyond Browsers - Linux.com
Dealing with Difficult Users - RouterFreak
Securing Workloads and Containers at the Ground Level | Security & Compliance Blog | VMware
4 Open Source Tools to Add to Your Security Arsenal
Doxygen Z3 LibFuzzer Fuzzing Engine Gcov Code Coverage Tool
Chris's Wiki :: blog/linux/ZFSPerDatasetStats
Refreshed 100TB Production Oracle DB to 10 x Non-Prod DB’s in 20 Mins! | Long White Virtual Clouds
FBI cleans web shells from hacked Exchange servers in rare active defense move | CSO Online
Supermicro X9DRi-LN4F+ BIOS Password Bypass | JonKensy.com
9DRi-LN4F+ v1.20a
FREE VMware VCTA Study Guide | ESX Virtualization
Make your data boss-friendly with this open source tool | Opensource.com
Security at the Edge: hardware accelerated AI-based cybersecurity with Canonical Ubuntu and the BlueField-2 DPU | Ubuntu
How to use Ansible to send an email using Gmail | Enable Sysadmin
Ansible Basics Workshop day @dbi services - Blog dbi services
Bruce Charlton's Notions: Philip K Dick discussing the (Christian) self limitations of his character Angel Archer who was based-on Ursula Le Guin - from The Exegesis
Chris's Wiki :: blog/tech/NVMeGettingTermsStraight
Tips to improve domain password security in Active Directory | CSO Online
What Bernie Madoff Taught Every Investor | The Motley Fool
1. It's easy to follow the bandwagon over the cliff 2. Know what you're investing in 3. Diversify A road paved with good intentions
Develop a Linux command-line Tool to Track and Plot Covid-19 Stats | Linux Journal
How to Test Website Loading Speed in Linux
curl -s -w 'Testing Website Response Time for :%{url_effective}\n\nLookup Time:\t\t%{time_namelookup}\nConnect Time:\t\t%{time_connect}\nPre-transfer Time:\t%{time_pretransfer}\nStart-transfer Time:\t%{time_starttransfer}\n\nTotal Time:\t\t%{time_total}\n' -o /dev/null http://www.howtoforge.com
Chris's Wiki :: blog/sysadmin/DMIVendorPeculiarities
How to review Apache tomcat access logs – Linux Hint
K8s on Windows/VirtualBox - Blog dbi services
2021-02-03 CERIAS - Lessons Learned – Fifty Years of Mistakes in Cybersecurity - YouTube
Measuring Your Red Team – Jordan Potti – Security Things
What’s new in vSphere 7.0 Update 2?
StarWind Free NAS & SAN For VMware vSphere Released | ESX Virtualization
Owning Your Own Copyrights in Open Source | James Bottomley's random Pages
Skyline Health Detector | Adventures in a Virtual World
Setting up UEFI HTTP boot with libvirt | Enable Sysadmin
Tools for Monitoring Disk Activity in Linux – Linux Hint
Should firms be more worried about firmware cyber-attacks? - BBC News
Why MSPs Need to Shift from Cybersecurity to Cyber Resilience | Webroot
Reducing the Time to Discovery: How to Determine if You Have Been Hacked | Webroot
How to identify your personal strengths - 80,000 Hours
Better Active Directory Reporting with PowerShell • The Lonely Administrator
Linked: Why Introverts Can Be the Best Public Speakers
Introducing adutil - A tool to ease configuration of AD authentication for SQL on Linux/Containers - Microsoft Tech Community
Practitioner To Researcher – JerryGamblin.com
Exploited in the Wild? What Does That Even Mean? – JerryGamblin.com
Of the 16 announcements by P0, only 6 of them have publicly available proof of concept code and only the Exchange CVEs have been weaponized as far as I can tell. That means a lot of companies have spent a lot of resources rushing emergency patches out to their systems to defend against zero-days that make huge news headlines like these:
Cybersecurity Training Launched by Cybersecurity Center for State Officials
The trainees will learn what cybersecurity is, why it is important and how cyberattacks work. They will also find out how to use multi-factor authentication, practice password safety, and regular software patching, encrypt files and messages to protect themselves.
What Day Had The Most CVEs Published? – JerryGamblin.com
Biden's Infrastructure Plan: 3 Cybersecurity Provisions
1. Electrical Grid Improvements 2. Addressing Supply Chain Issues 3. Research and Development
Definition of HAR File and Its Importance in Cybersecurity
HTTP Archive Format
About Data Encryption Software - And the Dark Side of This Moon
(16) Linux Essentials - Understanding File & Directory Permissions - YouTube
Android Triage: a really useful forensic tool by Mattia Epifani | Andrea Fortuna
10 Awesome Awk Command Examples – Linux Hint
“You shouldn’t treat knowledge like it’s a competition” | flyingpenguin
Comprehensive Guide on ffuf
Comprehensive Guide to AutoRecon
FDA's Kevin Fu on Threat Modeling for Medical Devices
Form Validation in Django – Linux Hint
Use of Django Request and Response Objects – Linux Hint
Feds charge man with planning to blow up an Amazon data center | Engadget
Using Archive.org for OSINT Investigations – We are OSINTCurio.us
A new headache - ransomware extortionists emailing your customers
Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily • Graham Cluley
Businesses! Beware The Vengeful IT Contractor!
Average ransomware payouts shoot up 171% to over $300,000
Ten Minute Tip: Image Geolocation – Part 1 – We are OSINTCurio.us
A New Approach to Multi-cloud Security | CSO Online
1. Common framework 2. Application awareness 3. Integrated architecture
DNS over HTTPS, DNS over TLS explained: Encrypting DNS traffic | CSO Online
What if We Made Paying Ransoms Illegal? | Daniel Miessler
I think making it illegal just means a loss of visibility.
Wyse 5070 Extended VyOS Router Build : homelab
The Consumer Authentication Strength Maturity Model (CASMM) v5 | Daniel Miessler
Ten Minute Tip: Image Geolocation Part 2 – We are OSINTCurio.us
Google Online Security Blog: Rust in the Android platform
9 Modern-Day Best Practices for Log Management
Detach Logs From Their Device and System Origins Log at Different Points Take Cover in the Cloud Add Images of the Storage Media to the Forensic Data Mix Don't Shut Down Compromised Machines So Fast Know Which Info in Log Files Is Useful Test the Usefulness of Your Logs Purge Responsibly Don't Overdo It
83% of Businesses Hit With a Firmware Attack in ...
Security on a Shoestring? More Budget Means More ...
American Distrust in Press: Deadly 1830s Cancel Culture | flyingpenguin
Manufacturing Firms Learn Cybersecurity the Hard Way
The different challenges and viewpoints mean that IT and OT groups should be collaborating on cybersecurity, but only 12% of groups are working together, says William Malik, vice president of infrastructure strategies at Trend Micro.
Exec Order Could Force Software Vendors to Disclose ...
The proposal on the table contains several recommendations, including the notification requirements for service providers. Vendors would still be required to preserve digital records for investigating hacks and work with the FBI and the Homeland Security Department's Cybersecurity Infrastructure Security Agency (CISA) when responding to incidents. Congress has tried unsuccessfully in the past to pass a national data breach notification law.
[SANS ISC] Simple Powershell Ransomware Creating a 7Z Archive of your Files - /dev/random
Password Rules | Diary of a Network Geek
[SANS ISC] Jumping into Shellcode - /dev/random
KGB Spy in 1961 Used X-Ray to Crack U.S. Top-Secret Lock | flyingpenguin
Show CPU Details Beautifully in Linux Terminal With CPUFetch - It's FOSS
Understanding the Linux Virtual Directory Structure - Make Tech Easier
Questions to ask in a job interview that reveal company culture
Tell me about a time a team member changed your mind? Tell me about someone you are proud of. Do you fully disconnect during holidays and vacations? Describe a recent success or win. Tell me about a disagreement or conflict on the team. How did you start your last team meeting? What is your ideal person for this role? Who have you promoted and why? Tell me about the last person you recognized. How do you focus on your own growth and development?
PodSecurityPolicy Deprecation: Past, Present, and Future | Kubernetes
Ransom Gangs Emailing Victim Customers for Leverage – Krebs on Security
The U.S. Government Needs to Overhaul Cybersecurity. Here’s How. - Lawfare
Adopting a zero trust strategy will change how the government views its networks for the better. In the case of SolarWinds, the intruder read and stole credentials, and then used those stolen credentials to leverage and travel through unrestricted communications paths between servers—systems that had never tried to communicate with other servers before, and never should have been able to do so.
GlobalTrends_2040.pdf - globaltrends_2040.pdf
5 obscure but useful Linux commands for sysadmins | Enable Sysadmin
nmtui os-prober shuf split watch
TiddlyWiki | Personal, non-linear, Note Taking Application on Linux – CubicleNate's Techpad
What is the HEIC File? – Linux Hint
7 signs you survived the best era of IT | Enable Sysadmin
#1 - You used to "burn" DVDs/CDs #2 - You know what a floppy disk is #3 - You recognize the sound of a modem #4 - You witnessed the arrival of the "new Personal Computers" #5 - You programmed in BASIC on your hobby computer #6 - You know what a punched card is #7 - Your first video game was an Atari Needs to add BBS
Hardened ROS with 10 year security from Open Robotics and Canonical | Ubuntu
(15) How to Homelab: Considerations for adding a Domain to your Gear - YouTube
SQL Server connectivity issue - troubleshoot TLS configuration - Blog dbi services
Upgrade / Migrate / Consolidate - Oracle Database 19c - doug-perf.pdf
RFC 8996 - Deprecating TLS 1.0 and TLS 1.1
SAML Raider Release 1.4.0 – Compass Security Blog
This World Backup Day, Our Customers Do the Talking - Webroot Blog
The SolarWinds hack timeline: Who knew what, and when? | CSO Online
Four Essential SASE Security Must-haves | CSO Online
SASE must function as part of an integrated security platform SASE must feature enterprise-grade security SASE should leverage third-party validated research and services SASE security should be a part of a holistic security strategy
Getting a Grip on Basic Cyber Hygiene with the CIS Controls | CSO Online
An action plan for basic cyber hygiene includes the Safeguards in IG1 and an accompanying campaign, that has the following attributes: Covers both organizational and personal behavior Actions are specific and easily scalable Effect on preventing, detecting, or responding to attacks can be stated No detailed domain knowledge or execution of a complex risk management process is necessary to get started Safeguards can be supported with a marketplace of tools for implementation and measurement Actions provide an “on-ramp” to a more comprehensive security improvement program
4 steps to better security hygiene and posture management | CSO Online
There are several reasons for this: Cyber-risk management continually increases. In a recent ESG survey, 84% of business, IT, and security managers said that cyber-risk is greater than it was two years ago due to a growing dependence on technology, an increasing attack surface, and a progressively dangerous threat landscape. Software vulnerabilities are vast and unrelenting. Alarmingly, 70% of IT and security professionals claim that the volume of software vulnerabilities can be overwhelming. This is because it takes lots of time and money to scan for vulnerabilities, understand which vulnerabilities are likely to be exploited, prioritize patches, work with IT operations on patch management, etc. Oh, and we are talking about thousands of software vulnerabilities across the enterprise at all times. Security hygiene and posture management is a manual slog. Nearly half (46%) of cybersecurity decision makers say that continually monitoring security hygiene and posture across the enterprise is their biggest cyber-risk management challenge. Why? Think of the parable of the blind men and the elephant: Each man touches the elephant in one place, uses this experience to form an opinion of what the elephant looks like, and, no surprise, their descriptions differ wildly. The only way to get a more comprehensive picture is through the sharing of all individual data points. Unfortunately, the tools used for security hygiene and posture management are like the blind men as they look at things like assets, configurations, user privileges, software vulnerabilities, or effectiveness of security controls. CISOs need a team of analysts and spreadsheets to get a complete picture of the security hygiene and posture management elephant. This, too, takes resources and is prone to errors. The SolarWinds hack introduces even more complexity. Before the SolarWinds hack, 47% of cybersecurity decision makers said that monitoring risks associated with IT vendors was their biggest cyber-risk management challenge. Based on many anecdotal conversations, I'm sure this percentage is a lot higher today. Because of SolarWinds, CISOs are reassessing their IT vendor and third-party risks and plan on more stringent requirements moving forward. This means more oversight that spans from purchasing through testing, deployment, and ongoing operations.
5 Fundamentals for Effective Security Design | CSO Online
Five Fundamentals for Effective Security Design The approach to network security needs to evolve. Here are five fundamental principles and practices that every organization needs to consider to get in front of and stay ahead of their current security challenges: A unified security fabric is essential to establish and maintain control over every edge. It must be able to span the distributed and evolving network to detect threats, correlate data, and seamlessly enforce policy. This isn’t about selecting a single vendor, rather about choosing the right vendors. Priority needs to be given to those vendors that leverage application programming interfaces (APIs) and common standards to support interoperability—especially those that allow policy decisions to be made outside of their solution. Deployed security solutions also need to have access to common datasets across all network edges, endpoints, and clouds, enriched with real-time global and community threat intelligence shared from every area of the organization. This common intelligence framework enables holistic analyses of the state of security and performance, identifies emerging threats, and enables unified response across the organization. An integrated security framework needs to support and enable advanced data analysis, combined with the ability to automatically create new protections across the full attack cycle when those analytics detect previously unknown threats. This system should also be able to function autonomously within simpler environments and be linked to extended detection and response (XDR), security information and event management (SIEM), and security orchestration, automation, and response (SOAR) solutions for increasingly advanced network operations center (NOC) and security operations center (SOC) environments This security fabric needs to be able to rapidly launch a coordinated threat response across the entire ecosystem the moment a threat is detected. This breaks the attack sequence before its objectives can be realized. Leveraging machine learning (ML) and artificial intelligence (AI) tied to dynamically generated playbooks makes this possible without introducing slowdowns or human error. Because change is the only constant in today’s digital world, a security fabric needs to be dynamic, meaning that it must be designed to scale up and out as the network it is securing evolves and adapts. This requires deep integration between security and the network components and functions so organizations can continually innovate and expand networking and operations ecosystems without a lag in protections.
10 pioneering women in information security | CSO Online
Judy Parsons Mavis Bately Hedy Lamarr Renee Guttmann Donna Dodson Dr. Dorothy Denning Rhonda MacLean Becky (Rebecca) Bace Dr. Chenxi Wang Maria Cirino
Booming dark web gig economy is a rising threat | CSO Online
Reco - audio recording app designed for elementary OS - LinuxLinks
Configuring RHEL 8 for compliance with crypto-policy related to Cipher Block Chaining
FFmpeg 4.4 Released with Hardware Accelerated AV1 Decoding, VDPAU Accelerated HEVC and VP9 Decoding - 9to5Linux
An introduction to firewalld rules and scenarios | Enable Sysadmin
How to use FreeRADIUS for SSH authentication - TechRepublic
Comparing SSH Keys - RSA, DSA, ECDSA, or EdDSA? | Teleport
Linux Capacity Planning Part -2 - DEV Community
Linux Capacity Planning Part -1 - DEV Community
LFCA: How to Monitor Basic System Metrics in Linux – Part 8
Use Apache Superset for open source business intelligence reporting | Opensource.com
Librem 5 and Librem 5 USA: What are the Differences? – Purism
The Librem 5 is $799 while the Librem 5 USA is $1999
Moving some ZFS filesystems to the ‘trash’ and removing all their snapshots – sanoid – Dan Langille's Other Diary
Trufflehunter: A New Tool to Sniff Out DNS Usage — RIPE Labs
::meta synthax::: Switching to FAI (Fully Automatic Installer) for creating Vagrant Boxes
6 OpenSSL command options that every sysadmin should know | Enable Sysadmin
Ansible Playbook to Install and Setup Apache on Ubuntu
Servant Leadership and Standing Out | The Networking Nerd
How to Add External Users to Microsoft 365 for Collaboration | Alexander's Blog
What Contractors Need to Know About Microsoft Cloud Compliance (Commercial vs. GCC vs. GCC High)
Ticker Is A Terminal Stock Watcher And Position Tracker (With Cryptocurrency Support) - Linux Uprising Blog
Show USB Devices Event History Using Usbrip In Linux - OSTechNix
(16) My Personal Website Will Now Be A Gemini Capsule - YouTube
Learning Binary Reversing: Radare2 vs. GDB | Hurricane Labs
How to Install Ansible AWX on Debian 10
Azure Sentinel Cybersecurity Maturity Model Certification (CMMC) Workbook Redux – Azure Cloud & AI Domain Blog
So You Want to Hire a CISO? | LinkedIn
"38% of respondents say CISOs change jobs when they are offered higher compensation packages from other organizations." This answer ties back to my previous point about hiring security leadership; if you don't invest in them, someone else will.
Detecting At-Risk Software Infrastructure – Community Data Science Collective
How to Play DVDs on Fedora Linux [Quick Tip] - It's FOSS
What lies after LTS? Two years of Ubuntu 14.04 in ESM | Ubuntu
How To Install GNS3 on Ubuntu 20.04 LTS - idroot
How to Check a Server for TLS Support on Linux
OpenZFS 2.1-rc1 Released With Distributed Spare RAID "dRAID" - Phoronix
Creating a backup of data stored in a Linux virtual machine | Enable Sysadmin
How to Generate Self-Signed SSL Certificates using OpenSSL
What is a Buffer Overflow Attack – and How to Stop it
Running the UniFi Network Controller in a Docker Container – Jon's FOSS Blog
IBM, Red Hat face copyright, antitrust lawsuit from SCO Group successor Xinuos • The Register
Xinuos
Windows containers on Kubernetes with MicroK8s | Ubuntu
::meta synthax::: Playing with cri-o, a container runtime built for Kubernetes
5 tips to help you prepare for technical certification exams | Enable Sysadmin
1. Be informed 2. Be prepared 3. Manage your time 4. Understand the environment 5. Use the documentation
Protect Your Unix and Linux Endpoints From Cyber Attacks
How to Secure Unix and Linux Endpoints From Cyber Attacks
How to Protect Windows Endpoints From Cyber Attacks
How to Secure Windows Endpoints Against Cyber Attacks
On the road to Jakarta EE 9 with Open Liberty betas – IBM Developer
8 steps to developing an Ansible role in Linux | Enable Sysadmin
Install and review SpiderFoot network penetration testing tool - LateWeb.Info
Six steps to managing SSH Key Sprawl in multi-cloud operations | Security Info Watch
SSH keys are commonly used across three primary applications 1. Linux: Most public cloud workloads run on Linux and SSH has emerged as the de facto credential to secure remote access. In terms of security risks, exposing access or credentials over the open internet can make them vulnerable to attackers. 2. DevOps: SSH has become a tether between IT operations and developers, facilitating collaboration and security for automated build and release processes. 3. Remote work: Fully and hybrid remote work models are here to stay. SSH allows users to configure and manage systems from anywhere. Security and risk professionals within the organization must have complete and regular visibility into how SSH keys are being used, by whom and the level of access they grant. 6 step to manage 1. Discover and map keys: The first step in eliminating SSH key sprawl is to discover existing keys within your network and bring them into a centralized repository. Once you have gathered all your keys, you can start to map key-user relationships to better understand what they grant access to. Using a network-based mechanism to discover keys takes the heavy-lifting out of inventory and mapping trust relationships to associated users (private keys), servers and service accounts. 2. Analyze your risk: Once discovered, SSH keys must be thoroughly analyzed for potential vulnerabilities, either in configuration or usage. For instance, you will want to make sure that keys are only configured for root-level access when it is necessary. This phase is all about finding ways to reduce your potential risk exposure and achieve better ‘crypto-hygiene’ for auditability. Look closely for root-level access permissions, forgotten keys, orphaned public keys with no known private key and weak keys with shorter key lengths. 3. Remediate vulnerabilities: Once you have identified your risk exposure, you can take action to reduce it. This is not a one-time effort though – continual monitoring and reporting are essential in identifying new risks as they surface, such as rogue keys created out-of-band. With a complete and accurate inventory of all SSH key pairs, you can start to rotate or replace weak and outdated keys, remove duplicate keys or keys with unnecessary root access, and clean up unused or orphaned keys. If someone leaves the company, you can remove their keys from your servers to keep things clean and secure. 4. Create fresh key pairs and rotate them regularly: The best practice approach is to delete all untracked keys and replace them with freshly generated key pairs. Establish a streamlined process that allows specific authorized users to easily create and deploy keys through a simple, yet controlled workflow. Once new key pairs have been generated, they should be rotated regularly at pre-defined intervals to maintain compliance with internal or external policies and reduce the additional risk exposure that ‘stale’ keys create. Whether key rotation is triggered by the user via UI/API or automatically by the system (forced rotation), the backend process of provisioning new keys and removing the old keys on remote servers should be automated. 5. Control SSH keys and access: Now that you have deployed fresh SSH key pairs to target systems, it is important to define permissions for each key and control who has SSH-based access to which systems. This can only be achieved with a proper SSH key management tool, which allows you to centrally assign or revoke access to SSH hosts based on specific users and groups while orchestrating keys in the backend to facilitate those controls. 6. Continuously monitor: Unknown SSH keys pose a continuous threat to your organization. Achieving 100% control is not possible, but it is possible to stay ahead of threats by regularly conducting audits and continually monitoring your key inventory. It also helps to maintain an ongoing audit log of important events, such as key rotation, generation and provisioning.
The 7 Best Ways to Batch Rename Files in Linux
1. Using the Ubuntu Rename Command 2. Rename Using the Perl Rename Utility 3. Batch Rename Files in Linux With qmv 4. Bulk Rename Linux Files Using Vimv 5. Batch Rename Linux Files With Emacs 6. Rename Multiple Files Using Thunar File Manager 7. Bulk Rename Files Using Smart File Renamer
Interview With Jim Hall, Founder of FreeDOS - TechRound
Parenting Tips: How to Communicate With Teenagers | Penniless Parenting
1. Remember That You Are Not Only a Parent but Also a Friend to Your Child 2. Understand That Your Child is Growing up 3. Have Dinner Together 4. Arrange Family Gatherings 5. Be an Example 6. Make Agreements 7. Do Not Expel Him to Work Ahead of Time 8. Resolve Сonflicts in Time
How to Backup/Restore MySQL/MariaDB and PostgreSQL Using 'Automysqlbackup' and 'Autopostgresqlbackup' Tools
Linux on Oracle Cloud Infrastructure: Networking your cloud made easy with short training videos | Oracle Linux Blog
(16) DevSecOps Learning - YouTube
https://docs.oracle.com/cd/E19253-01/819-5461/gbchp/index.html
How I Beat the Berlin Rental Market With a Python Script
How to Configure FirewallD in RHEL, CentOS and Fedora
AMD Admits Their Zen 3 CPUs Are Vulnerable To Spectre-STL Attacks - LinuxReviews
Excellent Utilities: scrcpy - display and control Android devices - LinuxLinks
Best Linux Backup Software For Desktops And Servers
Happy Backup Day | IT-Hure
How to Create a Directory in Ansible – Linux Hint
Top Tips for Securing Your Linux System in 2021.
University of California victim of ransomware attack | TheHill
StreamPi Home Page
Why Is There a Chip Shortage? Covid-19, Surging Demand Cause Semiconductor Shortfall
Digital Sign Solution with Screenly on the Raspberry Pi – CubicleNate's Techpad
LCD Chalkboard Smart Sign, Raspberry Pi Powered – CubicleNate's Techpad
GitHub - marin-m/SongRec: An open-source Shazam client for Linux, written in Rust.
Tcpdump cheat sheet with examples
Automating Linux patching with Ansible - Blog dbi services
What Is a Cybersecurity Legal Practice? - Lawfare
Failures Plague SSDs – The SSD Guy
t
Origami Maths – Face Graph of a Hypercube | Tinkerings
The internet has become a tool for authoritarian repression | Engadget
5 everyday sysadmin tasks to automate with Ansible | Opensource.com
Install a Multi-Master Kubernetes Cluster with Ansible | Lisenet.com :: Linux | Security | Networking
Getting bytes to disk more quickly — 2021 — Blog — GNU Guix
Running Oracle Linux in public clouds | Oracle Linux Blog
https://docs.oracle.com/cd/E19253-01/819-5461/gammt/index.html
Pack A Dryer Sheet In Your Luggage So Clothes Smell Fresh Upon Arrival - foXnoMad
Evidence-Based Doomsday Prepping and Personal Finance — My Money Blog
Enterprise Cybersecurity Measurement - Lawfare
New wave of ‘hacktivism’ adds twist to cybersecurity woes - Japan Today
VUW Accidentally Wipes Desktop Computers | News | Critic Te Arohi
What is cloud native? | Ubuntu
(6) Creating A Dmenu Script For Web Bookmarks And History - YouTube
How to Install Tomcat 10 on Debian 10 – TecAdmin
How I do my Computing — bandali
bandali's personal site
Who’s on First? Understanding Architecture Roles, Pt 1 | by Diana Kelley, SecurityCurve | Mar, 2021 | Medium
Vulnerability Scanning Requirements for Containers - Vulnerability_Scanning_Requirements_for_Containers.pdf
Why do we call these “DuPont” connectors? – Matt's Tech Pages
Raising Security Awareness in Your Organization
History of ZFS – Part 1: The Birth of ZFS | Klara Inc.
Best Free and Open Source Intrusion Prevention for SSH - LinuxLinks
fail2ban denyhosts
Acer reportedly hit by $50 million ransomware attack | Engadget
curl is 23 years old today | daniel.haxx.se
NIST’s Ron Ross: ‘The Adversary Lives in the Cracks’
How the adversaries "live in the cracks"; The urgency to change defensive strategies and tactics; How to approach systems security engineering going forward.
PACS Flaws Put Data at Risk for 18 Months - HealthcareInfoSecurity
Surgeries Are Being Cancelled Across Melbourne Due to a Cyber 'Incident' 
How to Buy an Ethical Digital Assistant in the Era of Listening Devices | OneZero
Privacy Legislation Progresses in 5 More States
Texas Medical Center Breach Affects 640,000 - HealthcareInfoSecurity
Enable Adobe Flash support for the VMware Horizon Administrator console - ivobeerens.nl
Deploying Encrypted Images for Confidential Computing | James Bottomley's random Pages
Orca’s “State of Public Cloud Security” report reveals how most cloud security breaches happen • Graham Cluley
These free tools from Recorded Future can make you a security intelligence expert • Graham Cluley
Active Directory Pentesting: Lab Setup
Comprehensive Guide on Autopsy Tool (Windows)
Comprehensive Guide on Dirsearch (Part 2)
Comprehensive Guide on Dirsearch
Burp Suite for Pentester – Fuzzing with Intruder (Part 3)
Burp Suite for Pentester – Fuzzing with Intruder (Part 2)
Burp Suite for Pentester – Fuzzing with Intruder (Part 1)
GitHub - upmc-enterprises/ATNA2FHIR: ATNA (DICOM) AuditMessage to FHIR AuditEvent converter
Comprehensive Guide on FTK Imager
pfSense Firewall Configuration Audit with pfAudit - /dev/random
A Quick Introduction To fzf (Interactive Command-Line Fuzzy Finder) - Linux Uprising Blog
Backup with these DeDuplicating Encryption Tools - LinuxLinks
Who Pays The Price of Redundancy? | The Networking Nerd
Linux perf-top basics: understand the % - Blog dbi services
Oracle Database Appliance: ODA patch 19.10 is out - Blog dbi services
PowerShell Forensics (from my session at Microsoft Ignite)
How Raising the Minimum Wage Can Accelerate Human Job Loss to Automation | Daniel Miessler
What Stevie Ray Vaughan Can Teach Us About Security Design | Techdirt
Visualize multi-threaded Python programs with an open source tool | Opensource.com
Cybersecurity
The root password for this server is...
Goodbye KMail, Hello Thunderbird
Japan’s KAI Industries Has Developed the World’s First Disposable Paper Razor - Spoon & Tamago
Third French hospital hit by cyberattack
How I stand working with Windows VMs
ZenTao: an open-source project management system for coders
Why Compliance Is No Longer King for Financial ...
Avoiding a 1984-Like Future
We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.
SASE 101: Why All the Buzz?
1. They must own their network or contract with a substantial telecom network. They are delivering services over a network, which must, therefore, be rock-solid. 2. They must be a player in the software-defined wide area network (SD-WAN) world. SD-WAN makes it easier than traditional networking approaches to administer traffic across a network and provides a better user experience. 3. They must have network security chops, including expertise in intrusion detection, firewalls, content filtering, and secure web gateways. Those capabilities are necessary for offering security to branch offices. 4. They must adhere to a zero-trust concept: Never trust, always verify. No network user gets access to an application without verification.
Why Do Windows Drive Letters Start With ‘C’? Why Not A Or B?
vmadm: helping me manage my local libvirt VMs
Devastating chip shortages could hit smartphones soon, too | PCWorld
Build a router with mobile connectivity using Raspberry Pi | Opensource.com
Preventing CSRF Attacks | Teleport
Remotely monitor freezer temperatures with Raspberry Pi - Raspberry Pi
Why Vulnerable Code Is Shipped Knowingly
Often lost in the chaos of this cultural shift to a "need for speed" SDLC approach is the misalignment between DevOps and security practitioners' goals. Both teams must strive to balance their respective goals: getting new features out the door and minimizing software risk. We know this misalignment contributes to vulnerable code being shipped more often than it should be, but what most people don't realize is that this is happening knowingly, and quite often.
Rancher, up and running, on EC2 - 1 - One node - Blog dbi services
Standardized Personal Finance Advice: Reddit Flowchart Version — My Money Blog
GHSL-2020-048: Remote Code Execution in Apache Velocity - CVE-2020-13936 - GitHub Security Lab
7 Cool Cyberattack and Audit Tools to be ...
Threagile Git Wild Hunt Mr.SIP Strafer - Elasticsearch O365Squatting AttackForge Cotopaxi - run DICOM through it?
OPNsense set up and configure DNS Over TLS (DoT)
The inventor of the cassette tape has died | Engadget
Using Nmap results to help harden Linux systems | Enable Sysadmin
Alpine Linux Review: Ultimate Distro for Power Users | FOSS Linux
US-CERT Reports 17,447 Vulnerabilities Recorded in 2020
US-CERT Reports 17,447 Vulnerabilities Recorded in 2020 This marks the fourth year in a row that a record number of vulnerabilities has been discovered, following 17,306 in 2019.
Realistic Patch Management Tips, Post-SolarWinds
Curtis Franklin, senior analyst of enterprise security management at Omdia, says companies must have patch management technology to help automate the process now, "because it's gotten really beyond human-scale at this point."
Summary: The Pentester's BluePrint | Daniel Miessler
30 Books That I Will Re-Read For The Rest of My Life | Daniel Miessler
Safely Disposing of the Needle in the Haystack: Managing the Cyber Risks of Healthcare IoT ~ Cyber Thoughts
During the early months of the Covid-19 outbreak, healthcare professionals were overworked and under-supplied. Governments were in chaos and squabbling over even the simplest of safety measures. Frontline facilities overflowed with terrified patients. A nurse adjusts a face mask she’s been wearing for days. The message “smile for me” that she scribbled on in marker, is now as faded and hollow in message, as she feels in her ability to help the sick. She leans against a wall and checks her phone, hoping for a message from her family. She’s too afraid to go home in case she spreads the disease to her children, so she sleeps in the staff break room, along with her colleagues. Text messages are the only tether she has to hope. An email pops into her mailbox. The subject line reads: “ALL STAFF: CORONAVIRUS AWARENESS”. The message notifies all medical personnel of facility wide online seminars to discuss new treatment measures and safety requirements. Exhausted, she clicks the link and registers for a seminar and thinks nothing more of another pointless bureaucratic task completed. In the hours that follow, criminals use her credentials to access patient record systems, medical imaging suites and even internet-connected patient telemetry and treatment devices. By morning, every system critical to patient care is locked down with ransomware. The hospital is rendered useless. As administrators work to relocate patients to equally overloaded hospitals, medical staff resort to 1950’s paper-and-pen communication methods, slowing patient care by minutes and even hours. Those lost ticks of the clock, cost the lives of several patients with pre-existing heart conditions. This has actually happened in a hospital shuttered after a coronavirus-themed attack.
Ryuk: Protecting Clinical Engineering from Ransomware Attack ~ Cyber Thoughts
How Employee Training Influences Corporate Culture – Business
3 Tips For Successfully Running Tech Outside the IT ...
Oversight Make Marketing Part of Incident Response Enable a Security Mentality in Marketing
How to Avoid Getting Killed by Ransomware
Step 1: Payload Delivery Step 2: Establish Command and Control Step 3: Discover and Spread Step 4: Encrypt and Extort
Living Frugally in 2021 – BeingFrugal.net
5 reasons why the cost of ransomware attacks is rising | CSO Online
1. Downtime costs 2. Costs associated with double extortion 3. IT upgrade costs 4. Increased costs from paying a ransom 5. Cost of reputational damage
Unbreak My Heart | What I Learned for Building Better Medical Devices While Troubleshooting My Pacemaker | Veronica Schmitt
Automate disabling of IPMI over LAN access on HPE iLO | rudimartinsen.com
What’s The Deal With Snap Packages? | Hackaday
The Tool to Help Track and Manage Your Cybersecurity Program | CSO Online
The State of Healthcare Cybersecurity During Covid-19 | CSO Online
CyberRatings.org - Unbiased ratings for cybersecurity technologies
Medical Imaging Leaks Highlight Unhealthy Security ...
How to Better Secure Your Microsoft 365 Environment
Kia Denies Ransomware Attack as IT Outage Continues
Learn SAML: The Language You Don't Know You're ...
Learn SAML: The Language You Don't Know You're ...
How to Create a Security-first Mindset | CSO Online
Align security with business objectives and outcomes. Forget short-term ROI metrics. Set the tone at the top. Continuously assess risk. Create a shared responsibility model for employees.
33 hardware and firmware vulnerabilities: A guide to the threats | CSO Online
CPU side-channel attacks Spectre variant 1 - CVE-2017-5753 Spectre variant 2 - CVE-2017-5715 Meltdown variant 3 - CVE-2017-5754 - Rogue Data Cache Load (RDCL) Meltdown-GP - CVE-2018-3640 - Rogue System Register Read (RSRE) Meltdown-NM - CVE-2018-3665 - LazyFP Spectre-NG - CVE-2018-3639 - Speculative Store Bypass (SSB) Spectre-PHT - CVE-2018-3693 Meltdown-RW Foreshadow-OS - CVE-2018-3620 - L1 Terminal Fault Foreshadow-VMM - CVE-2018-3646 Foreshadow-SGX - CVE-2018-3615 Meltdown-PK and Meltdown-BND -(Protection Key Bypass) and (Bounds Check Bypass) Spectre-PHT-CA-OP, Spectre-PHT-CA-IP and Spectre-PHT-SA-OP - Pattern History Table (PHT) Spectre-BTB-SA-IP and Spectre-BTB-SA-OP -Branch Target Buffer (BTB) Fallout - CVE-2018-12126 - Microarchitectural store buffer data sampling (MSBDS). part of a new class of side-channel attacks against CPUs that Intel calls Microarchitectural Data Sampling (MDS) RIDL - CVE-2018-12127 and CVE-2018-12130 - microarchitectural load port data sampling (MLPDS) and microarchitectural fill buffer data sampling (MFBDS). Zombieload - CVE-2019-11091 - microarchitectural data sampling uncacheable memory (MDSUM). Starbleed - impacts FPGA PLATYPUS - side-channel attack that abuses the running average power limit (RAPL) interface that's used to measure power consumption in CPU cores and is present in all Intel CPUs developed since 2011 DRAM memory Rowhammer attacks Rowhammer - physical effect with security implications that occurs inside SDRAM chips when the same physical row of memory cells is read for a large number of times in rapid succession -- an action dubbed hammering. Rowhammer.js - Rowhammer attack via JavaScript Drammer - CVE-2016-6728 - Rowhammer-type exploit demonstrated in 2016 against Android devices. Flip Feng Shui - Rowhammer attack against virtual machines, where a malicious guest VM can flip bits in the physical memory affecting a different virtual machine in a controlled manner. ECCploit - demonstrates that Rowhammer-type attacks can work even against SDRAM chips that have error-correcting code (ECC) capabilities Throwhammer - A Rowhammer attack that can be exploited over a network by leveraging the remote direct memory access (RDMA) feature RAMBleed - first attack that has shown it is possible to use the Rowhammer effect to steal data from memory cells instead of simply modifying it. Wide-impact firmware vulnerabilities BlueBorne - A set of vulnerabilities announced in 2017 in the Bluetooth stack implementations of Linux, Android, Windows and macOS. KRACK - Key Reinstallation Attack, is an attack revealed in 2016 that exploited a weakness in the WPA2 wireless security standard BadUSB - allows reprogramming the microcontrollers in USB thumb drives in order to make them spoof other types of devices such as keyboards and used them to take control of computers or to exfiltrate data. Thunderstrike and Thunderstrike 2 - exploited vulnerabilities in the firmware of Apple's Macbook devices Thunderclap - execute privileged code on computers equipped with Thunderbolt ports. ROCA - The Return of Coppersmith’s Attack (ROCA) is an attack against the Trusted Platform Modules (TPMs) and Secure Elements (SEs) produced by Infineon Technologies. Intel Management Engine - Intel ME runs its own lightweight operating system which is completely separate from the user-installed operating system, which is why it has often been described as a backdoor in the security community.
6 board of directors security concerns every CISO should be prepared to address | CSO Online
1. Cyber accountability 2. Security status during COVID-19 and beyond 3. Security strategy 4. Benchmarking against industry best practices 5. Resilience to cyberattacks 6. Continuous compliance
26 Cyberspace Solarium Commission recommendations likely to become law with NDAA passage | CSO Online
The Sarbanes-Oxley Act explained: Definition, purpose, and provisions | CSO Online
Section 302: Public companies need to file regular reports with the Security and Exchange Commission. Top executives must personally vouch for the information contained in these reports and are responsible for establishing internal controls of data. Section 404: Annual financial reports must include a section on those internal controls assessing their effectiveness; any shortcomings discovered in those controls must be disclosed. Registered external auditors must vouch for management's assessment of the internal controls. Section 409: Any material changes in the financial conditions or operations of the company must be disclosed to the public in a timely manner. Sections 802 and 906: These are the sections that deal with penalties. We'll get into the details later in the article, but they forbid altering documents in a bid to impede an investigation and also make it illegal for anyone to certify a misleading or fraudulent financial report.
Gigabit Wireless - WiFi 6 - UniFi 6-LR | b3n.org
Exchange Hack News – Test tools from Microsoft and others | Born's Tech and Windows World
Top 7 security mistakes when migrating to cloud-based apps | CSO Online
1. Using VPN for remote access 2. Setting up the wrong cloud portfolio 3. Your security posture isn't appropriate for the cloud 4. Not testing disaster recovery plans 5. Not optimizing authentication for a cloud-majority portfolio 6. An out-of-date Active Directory 7. Failing to seek help
SystemRescue 8.00 Released with Linux 5.10 LTS, Xfce 4.16, and Improved exFAT Support - 9to5Linux
How to reboot a broken or outdated security strategy | CSO Online
CISSP certification guide: Requirements, training, and cost | CSO Online
Windows 10: Enable built-in process/DLL logging | Born's Tech and Windows World
Chris's Wiki :: blog/solaris/ZFSDedupTodayNotes
Some useful tips about /dev/tcp | Andrea Fortuna
2020 Books on Data Science and Machine Learning « Oralytics
Azure IO Performance for the RDBMS DBA- Part I
JBoss EAP 7 – Domain Configuration - Blog dbi services
AutoUpgrade One-liner – Databases Are Fun
How to Stop Hardcoding Your TDE Keystore Password – Databases Are Fun
Erman Arslan's Oracle Blog: OBIEE - Security Configurations & Custom SSO using a http Header or Cookie
MOS 1489438.1
Erman Arslan's Oracle Blog: OBIEE - Standalone HTTP Server configuration with OBIEE + Compression + Caching the response data
Payroll/HR Giant PrismHR Hit by Ransomware? — Krebs on Security
How SolarWinds Busted Up Our Assumptions About Code ...
EPIC - Virginia Governor Signs Consumer Data Protection Act
The Ultimate Guide to Secure, Harden and Improve Performance of Nginx Web Server
3 Metrics Every CISO Needs to Reduce Risk – and Build Budget | CSO Online
Visibility Start by determining how many log sources you own; then, measure how many of those sources are actually logging. After you determine how much of your environment you can see, you can then measure your detection content coverage mapped to industry frameworks such as MITRE ATT&CK® to understand how much visibility you have into known attack techniques. Tool Efficacy Measure how well your tools are working by looking at metrics around the number of issues or outages within a tool. Team Performance Look at metrics like false positive rate, anomalous safe rate, and true positive rate to determine where your team is spending the majority of their time and how well they understand your environment. Security Automation to increase Team Performance.
Hitting the Books: Elon Musk and the quest to build a better rocket engine | Engadget
Jeff Bezos' basic philosophy of Gradatim ferociter, Latin for “Step-by-step, ferociously.” “The good news is that I learned everything that can go wrong with turbopumps, and really how to fix them.” - Tom Mueller
Biden administration brings expertise, new attitude to cybersecurity | CSO Online
The most important cybersecurity topics for business executives | CSO Online
Data privacy. Data privacy topped the list at 35%, and this makes sense given regulations like GDPR and CCPA. Current cyberthreats. Nearly one-third (32%) of business and cybersecurity executives believe that executives want to know about current cyberthreats, and it is worth noting that this research was conducted before the SolarWinds hack. Cybersecurity culture and training. This was a priority for 29% of organizations, but that doesn’t tell the whole story.
3 ways to speak the board's language around cyber risk | CSO Online
“Presenting a full slate of risk scenarios to the board is not beneficial until the scenarios are ordered and prioritized using quantitative measurement that is in a familiar format for executives. The members of board committees are adept at managing financial measurements. The more a risk-management measurement resembles the financial statements and income projections that the board typically sees, the easier it is for board members to manage cybersecurity risk.”
USB Image Tool for Windows easily backs up and restores your complete VMware ESXi hypervisor on USB or SD flash drives, a simple/free clone for peace of mind before patching or upgrading | TinkerTry IT @ Home
KVM: Implementing linked clones with a backing file – Fabian Lee : Software Architect
What is the HITECH Act? Definition, compliance, and violations | CSO Online
SolarWinds: "IT's Pearl Harbor." | InsiderPro
Virginia data protection bill signed into law | CSO Online
New York issues cyber insurance framework as ransomware, SolarWinds costs mount | CSO Online
CompuCom MSP hit by DarkSide ransomware cyberattack
Linux Sponge - Soak Up Standard Input and Write to a File - Putorius
6 Ways to check user information in Linux | 2DayGeek
Introduction to database normalization: the first three normal forms - LinuxConfig.org
7 Useful Tips for Self-hosting a Ghost Blog With Docker
Ryuk ransomware develops worm-like capabilities, France warns
Understanding the Impact of Enabling Guest Access in Microsoft Teams | Alexander's Blog
Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708) - Help Net Security
CVE-2021-26708
How I Built a Web Scraper with Beautiful Soup and Used it to Land My First Job
Red Hat Enterprise Linux 8.1 achieves Common Criteria Certification - Help Net Security
How to perform a digital forensic analysis using only free tools | Andrea Fortuna
Zero Day Initiative — CVE-2020-3992 & CVE-2021-21974: Pre-Auth Remote Code Execution in VMware ESXi
Remember Why – Joseph Griffiths
Public entities care about three things: Revenue – Total money they take in (keeping / increasing) Profit – Money they keep after all expenses (keeping / increasing) Risk – Things that will impact their ability to make revenue or profit (reducing / neutralizing)
Using PowerCLI Image Builder CLI to build a new ESXi 7.0U1c image | Electric Monk
CyManII
Cybersecurity in 2021 Depends on These 6 Skills | CQURE Academy
Azure Active Directory Security PKI and Infrastructure Configuration Mistakes Forensic Analysis and Data Log Extraction Advanced Malware Analysis Effective Whitelisting in 2020 (and Effective Code Execution Prevention) Secure and Automated Infrastructure Management
Windows registry Transaction Logs in forensic analysis | Andrea Fortuna
Leading Experts - Adam Caudill
Q3 Ransomware Demands rise: Maze Sunsets & Ryuk Returns
Bill Sempf | The Trouble With Teaching Secure Coding
A Practical Introduction to Container Security
Full Cycle Teams in a FDA regulated setting | Bob on Medical Device Software
SolarWinds’s Security Practices Questioned by Lawmakers - Bloomberg
Oracle Database 21c New Security Features | Integrigy
WebLogic Vulnerabilities - PeopleSoft Impact (CVE-2020-14882 and CVE-2020-14750) | Integrigy
CVE-2020-14882 and CVE-2020-14750
My Certified Kubernetes Administrator (CKA) Exam Experience - mwpreston.net
Details on the New Desk Layout - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Oracle Database Upgrades : One Size Does Not Fit All
A layered approach to product design | The ORACLE-BASE Blog
Vulristics: Beyond Microsoft Patch Tuesdays, Analyzing Arbitrary CVEs | Alexander V. Leonov
Everything You Wanted to Know About Social Engineering - but didn’t know who to ask | CQURE Academy
OWASP ASST (Automated Software Security Toolkit) - A Novel Open Source Web Security Scanner
What the AT&T Breakup Teaches Us About a Big Tech Breakup | Electronic Frontier Foundation
Errata Security: We are living in 1984 (ETERNALBLUE)
"When the lie passes into history, it becomes the truth"
Healthcare Exchange Standards: COVID-19 Immunization Summary Document - use-case analysis
Fake-Sms - A Simple Command Line Tool Using Which You Can Skip Phone Number Based SMS Verification By Using A Temporary Phone Number That Acts Like A Proxy
List of data breaches and cyber attacks in February 2021 – 2.3 billion records breached - IT Governance UK Blog
Threatspec - Continuous Threat Modeling, Through Code
4 Ways Health Centers Can Stop the Spread of ...
1. Harden your foundation. 2. Compartmentalize your environment. 3. Filter your flow. 4. Authenticate, authenticate, authenticate.
6 best tools to monitor disk IO performance in Linux | 2DayGeek
iotop iostat vmstat atop dstat ioping
The power of low expectations
Review: The New weLees Visual LVM, a new style of LVM management, has been released | Linux Journal
Using the Python Rich library to display status indicators | Open-Source Routing and Network Simulation
Get a TLS certificate for your onion service
Tips for using tmux | Enable Sysadmin
The many lies about reducing complexity part 2: Cloud – R&A Enterprise Architecture
MUST READ: Fast and Simple Disaster Recovery Solution « ipSpace.net blog
How Ansible Configuration Parsing Made Me Pull My Hair Out « ipSpace.net blog
Build Your Virtual Lab Faster with My Network Simulation Tools « ipSpace.net blog
How long does it take to redeploy an ODA X8-2M? - Blog dbi services
JENKINS Quick overview on Jenkins and Jenkins X - Blog dbi services
How to quickly download the new bunch of 21c Oracle Database documentation? - Blog dbi services
Oracle 21c Security : ORA_STIG_PROFILE and ORA_CIS_PROFILE - Blog dbi services
A typical ODA project (and why I love Oracle Database Appliance) - Blog dbi services
Validate your SQL Server infrastructure with dbachecks - Blog dbi services
NTP is not working for ODA new deployment (reimage) in version 19.8? - Blog dbi services
How to configure additional listeners on ODA - Blog dbi services
What security does a default OpenBSD installation offer? (by solene@)
Berkshire Hathaway 2020 Annual Letter by Warren Buffett — My Money Blog
How I cut GTA Online loading times by 70%
Charlie Munger Daily Journal Annual Meeting 2021 Full Video, Full Transcript, and Highlights — My Money Blog
Build a home thermostat with a Raspberry Pi | Opensource.com
15 ways to leave your cloud provider | Tech Exec
Notes on Addressing Supply Chain Vulnerabilities - The Mozilla Blog
How to Install and Use GVM Vulnerability Scanner on Ubuntu 20.04
Response: FrizN – Linux kernel – The curious case of CVE-2020-14381 — EtherealMind
Chris's Wiki :: blog/sysadmin/SubdomainsAndDNSZones
An Exploration of JSON Interoperability Vulnerabilities
3 Excellent Free Books to Learn about ClojureScript - LinuxLinks
How to check memory utilization in Linux - nixCraft
2020 sees ransomware increase by over 400 percent
Test, test and test some more: The importance of disaster recovery testing
Digital forensics is the best offense and defense for cyber attacks
Online vs offline: How COVID-19 has forced the world to go digital
5 ways to talk about cybersecurity with anyone
Cloud misconfigurations take an average 25 days to fix
Sysadmin university: Quick and dirty Linux tricks | Enable Sysadmin
How I became a Kubernetes maintainer in 4 hours a week | Opensource.com
Advancing the organization towards hyper versatility and perpetual innovation
AIREX Manufacturing Energy Efficiency Products
Building a Cybersecurity Strategy
Six Key Cybersecurity Engineering Activities for Building a Cybersecurity Strategy
5 tips for choosing an Ansible collection that's right for you | Opensource.com
Gab data breach may include 70GB of data on 15,000 users | Engadget
Attackers collaborate to exploit CVE-2021-21972 and CVE-2021-21973 - Blueliv
2020’s Tax Burden by State
10 Useful Websites for Learning PostgreSQL Database System
Microsoft to cut perpetual Office support by 50%, raise price by 10% | Computerworld
Reducing support for Office LTSC and 2021 to five years makes the software less attractive in any comparison with Office 365/Microsoft 365. Perpetual licensing's biggest advantage over subscriptions is cost, but that advantage relies on the customer upgrading relatively infrequently. By offering an upgrade every three years and limiting support to five years, Microsoft has forced customers who want or need perpetual licensing to deploy every version. There's no way to skip an upgrade because there's no overlap in support for versions n and n+2.
The Raspberry PI Cheat Sheet – Raspberry PI User
ISO 8601: the better date format | Blog | Kirby Kevinson
Gaming Rack Design and Construction – CubicleNate's Techpad
Privileged access is the Achilles heel of enterprise security
While 83 percent of enterprises give privileged access to third party organisations or contractors, with 31 percent frequently giving privileged access to third parties, 11 percent take at least a month to remove access once an employee or contractor leaves the organization.
7 essential cyber security tips for small businesses
Adopt Smart Password Protocols Use Layered Security To Your Advantage Make Sure All Employees Are Properly Trained Backup All Your Data Use Firewalls And Encryption Have Employees Protect Personal Devices Always Be Prepared For An Attack
Millions of medical images openly available online
Building an agile IT budget
The importance of TLS/SSL decryption in a zero-trust model
Solaris 11.4 and user_reserve_hint_pct | c0t0d0s0.org
I caused the guy who created Bitcoin to go into hiding -- by accident
How cybercrime has adapted to the pandemic
How To Find Number Of CPU Cores From Commandline In Linux
3 solid self-review tips for sysadmins | Enable Sysadmin
Starting LaTeX on Ubuntu with the User Friendly Gummi
Friction Finders | The Networking Nerd
6 resources and 3 tips to help you enter the world of Linux containers | Enable Sysadmin
Korean Style Roasted Fennel and Sweet Potatoes Recipe | Penniless Parenting
Releasing Windows 10 Build 19042.844 (20H2) to Beta and Release Preview Channels | Windows Insider Blog
Why not rely on app developer to handle security? – Michał Górny
SQL Assessment API
Step by Step Guide to Setup LDAPS on Windows Server - Microsoft Tech Community
SQL Injection | Impact of SQL Injection | - Dot Net Guide
Intro into security principles in the context of database systems - Microsoft Tech Community
Introducing adutil - A tool to ease configuration of AD authentication for SQL on Linux/Containers - Microsoft Tech Community
Pi-KVM: an inexpensive KVM over IP - briancmoses.com
Assessments | Microsoft Docs
That grumpy BSD guy: RFC7505 Means Yes, Your Domain Can Refuse to Handle Mail. Please Leave Us a TXT If You Do.
Oracle Database Appliance: what have you missed since X3/X4/X5? - Blog dbi services
DHS Secretary Mayorkas announces new initiative to fight 'epidemic' of cyberattacks | TheHill
8000 PostgreSQL clusters on one host? - Blog dbi services
Learn ODA on Oracle Cloud - Blog dbi services
Learn ODA on Oracle Cloud
Best Gigabit Routers | b3n.org
10 helpful Windows 10 hotkeys you might not know about » OnMSFT.com
Ctrl+Shift+Win+B
Lessons Learned From the SolarWinds Supply Chain Hack | LinuxInsider
Sysprof and Podman – Zen and the Art of GNOME
Finnish IT Giant Hit with Ransomware Cyberattack | Threatpost
How to use Django Serializers – Linux Hint
How to Break from a Bash While Loop? – Linux Hint
Creating Bash Infinite Loop by Example Scripts – Linux Hint
Create Bash Functions with Arguments – Linux Hint
azruntime: Manage Azure Infrastructure with Python | Open-Source Routing and Network Simulation
Upgrade to vCenter 7.0 and Decommission External PSC – The Wifi-Cable
Monitoring Linux system resources using SAR (System Activity Report) - LinuxTechLab
What is Systemd in Linux? - TREND OCEANS
India's New Cyber Volunteers Program Explained: A Dark Future Or Safe Internet?
Planning For The Worst Case You Can’t Think Of | The Networking Nerd
CI/CD With VMWare And Ansible | Greg Sowell Saves The World
Managing Leaders, Or Why Pat Gelsinger Is Awesome | The Networking Nerd
abcde: Downloading Album Art...
Linux System Monitoring Fundamentals | Linode
Senate Intelligence Holds Hearing on the SolarWinds Breach - Lawfare
Introducing Crowdsec: A Modernized, Collaborative Massively Multip
abcde.conf · GitHub
http://www.andrews-corner.org/linux/abcde/getalbumart.html
SSH Certificates Security Hardening | Teleport
DistroWatch.com: Put the fun back into computing. Use Linux, BSD.
How to Modify Docker Images
What Percentage of Income Do People Really Donate to Charity? — My Money Blog
Baked Salmon Recipe
Rosemary-Garlic Roasted Potatoes Recipe | Ree Drummond | Food Network
The complete guide for NMAP Command - TREND OCEANS
What Is Penetration Testing and How Does It Improve Network Security?
How secure boot and trusted boot can be owner-controlled
The PinePhone continues to evolve
Chris's Wiki :: blog/solaris/ZFSPartialUpgradeOption
4 Good Open Source Log Monitoring and Management Tools for Linux
1. Graylog 2 2. Logcheck 3. Logwatch 4. Logstash
How to measure the average CPU utilization of a Linux process
Easy Honey Butter Brussels Sprouts Recipe | Penniless Parenting
apt - "The following packages have been kept back:" Why and how do I solve it? - Ask Ubuntu
sudo apt-get --with-new-pkgs upgrade
Best Data Backup Applications for Linux – Linux Hint
Blogging is futile — Starting a GNU Screen session via SSH's ~/.ssh/config
Python “tricks” I can not live without | by Sebastian Opałczyński | Jan, 2021 | Level Up Coding
Monitor Mikrotik Router with Grafana and Prometheus (mikrotik-exporter) | Lisenet.com :: Linux | Security | Networking
Tools and Utilities Update | Data Protection Hub
Migrating Two Factor Auth - Alan Pope's blog
How Ansible got started and grew | Opensource.com
Handling secrets in your Ansible playbooks | Enable Sysadmin
VLC's open-source history: 20 years, 3.5 billion downloads - Protocol — The people, power and politics of tech
Provide secure remote access to on-premises applications with Azure AD Application Proxy – Microsoft Systems, Cloud and azure professionals
Strategy and tactics and Powerpoint | Seth's Blog
Linked: Hidden Dangers of Microsoft 365's Power Automate and eDiscovery Tools
Achieving 100Gbps intrusion prevention on a single server | the morning paper
Building an Anycast Secondary DNS Service
Troy Hunt: Controlling Smart Lights Using Dumb Switches with Shelly and Home Assistant
Troy Hunt: IoT Unravelled Part 5: Practical Use Case Videos
Troy Hunt: IoT Unravelled Part 4: Making it All Work for Humans
Troy Hunt: IoT Unravelled Part 3: Security
Troy Hunt: IoT Unravelled Part 2: IP Addresses, Network, Zigbee, Custom Firmware and Soldering
Troy Hunt: IoT Unravelled Part 1: It's a Mess... But Then There's Home Assistant
PSA: Be wary of installing anything with SELinux set to permissive
A New CPU is Coming - Better Be Prepared - Blades Made Simple
Scaling the Active Directory Log Search with PowerShell • The Lonely Administrator
Searching Active Directory Logs with PowerShell • The Lonely Administrator
PowerShell Puzzles and Challenges • The Lonely Administrator
An Active Directory Change Report from PowerShell • The Lonely Administrator
Get Group Policy Links with PowerShell • The Lonely Administrator
Nature vs. nurture: Does parenting even matter in child development?
How Google Cloud's Kelsey Hightower became one of the most respected people in cloud computing - Protocol — The people, power and politics of tech
Investigators suggest hackers exploited weak password security to breach Florida water facility
How to Find What IP Addresses are Connected to Linux
Parallel shells with xargs: Utilize all your cpu cores on UNIX and Windows | Linux Journal
First Malware Infecting Apple M1 Chip Appears: Here's What We Know
How to check the speed of your ssh connection - Webleit.info
California DMV warns 20 months of records may have been exposed | Engadget
Open-Source Kernel Security Technologies.
8 tips for reliable Linux system automation | Enable Sysadmin
1. Reduce network dependencies 2. Reduce software dependencies 3. Arrange automation jobs 4. Keep jobs short 5. Avoid non-essential operations at runtime 6. Use the right tools 7. Track failures 8. Use comments effectively
The U.S. Needs a Cyber State of Distress to Withstand the Next SolarWinds - Lawfare
Nutrition for kids: Guidelines for a healthy diet - Mayo Clinic
How to plan your career - 80,000 Hours
10 container guides for sysadmins | Enable Sysadmin
10 Linux Hardening Tips for Beginner SysAdmins
10 Top Open Source API Gateways and Management Tools
Significant vulnerabilities that crippled IT world this decade (2010-2020) - nixCraft
The top 20 sysadmin guides and tutorials | Enable Sysadmin
The Turris Omnia Security-Focused Open Source Router
Twake - A Modern Open-Source Collaboration Platform
sbx2-w3-medical-device-security-considerations-case-studypdf.pdf
Jeanie Larson 2017
sbx2-w3-medical-device-security-considerations-case-studypdf.pdf
Jeanie Larson 2017
Patching all my environments with the January 2021 OJVM Bundles
Preventing Supply Chain Attacks like SolarWinds - Linux Foundation
We can: Harden software build environments Move towards verified reproducible builds Change tools & interfaces so unintentional vulnerabilities are less likely Educate developers (such as the free courses from OpenSSF on edX) Use vulnerability detection tools when developing software Use tools to detect known-vulnerable components when developing software Improve widely-used OSS (the OpenSSF is working on this) Ask for a software bill of materials (SBOMs), e.g., in SPDX format. Many software producers aren’t ready to provide one yet, but creating the demand will speed progress Determine if subcomponents we use have known vulnerabilities Work towards providing SBOM information if we produce software for others Implement OpenChain
How to Create a KVM Virtual Machine Template
How to flatten PDF documents - Tutorial
Digital Hoarding: Ubuntu Mirror - Alan Pope's blog
Florida city attacked by a hacker trying to poison its drinking water | Engadget
Hacked water plant computer used shared passwords and Windows 7 OS | Engadget
» TeamViewer – the ultimate security problem? | dwaves.de
Patient records stolen from Florida and Texas hospitals get published on the dark web - SiliconANGLE
How to Resize Images Using Python
How to Create an Ansible Test Environment using LXD - buildVirtual
Pi4 slow USB drive fixed
Automating responses to scripts on Linux using expect and autoexpect | Network World
Improve your software product delivery process performance using metrics (I) – Toscalix
Destination status quo - Carmen Bianca Bakker
Extracting the list of O'Reilly Animals
The 10 Best and Useful Tips To Speed Up Your Python Code
Learn And Code Confusion Matrix With Python
How to adopt DevSecOps successfully | Opensource.com
Solve a charity's problem with the Julia programming language | Opensource.com
Restic Backups, A Flexible & Powerful Backup Solution - Front Page Linux
DevSecOps: Image scanning in your pipelines using quay.io scanner | Enable Sysadmin
Some Vue + Django tips
Double helping of Pi Hole – whizzy.org
Google Introduces A Database To Easily Track & Manage Open-Source Vulnerabilities - It's FOSS News
(3) Introduction to Terraform - Deploying Oracle Linux on Oracle Cloud Infrastructure - YouTube
(3) System Monitoring with mpstat on Oracle Linux 8 - YouTube
Driving the organization towards Digital Innovation Excellence: 5 key dimensions to consider
1. Secure your business productivity competitiveness against peers, and from here your ability to push out differentiated digital value understood as digital products and services. We've already concluded that your rate of innovation is four times the market. 2. A unified software development and delivery capability with full business alignment is at the core of your strategy, this means that you are one of just 20% of organizations that have a development culture ensuring the competitive advantage of the business. This clearly separates you from the pack! 3. A unified automation strategy will underpin cross-team collaboration models, help ensure automation consistency and drive a culture of re-use. It can also help you drive a culture of discipline and a policy driven approach to security, governance and compliance allowing the organization to take advantage of leading-edge innovation. Again, this can put you in the top quartile of European organizations in terms of software delivery capabilities and automation prowess. 4. Through a hybrid cloud strategy you can help your organization’s digital resiliency by laying the foundation for an intelligent architecture that supports integration, security, portability and controls. You are also able to maximize the ROI of existing IT investments and drive a fluid data-led organization by orchestrating all data assets and ensuring data compliance. 5. Finally, to maintain competitive status the app delivery engine should be based on cloud native tenets to support rapid release and perpetual product development patterns. Running integrated cloud native operations across the organization will be key here to truly operate with efficiency and ensure speed-to-delivery alignment between teams and business functions. Today only one in five organizations are driving their cloud native activities formalized as well-governed, joined up programs spanning the entire business.
5 reasons why you should develop a Linux container strategy | Enable Sysadmin
Openstack RDO && KVM Hypervisor: Setting up Tomcat 9.0.41 && mariadb-server 10.5 on Debian Bullseye/sid
How I hijacked the top-level domain of a sovereign state | Detectify Labs
tomboy-ng – Simple Note-Taking Application for Desktops
System administration is dead, long live system administration! | Enable Sysadmin
Turn your Raspberry Pi into a HiFi music system | Opensource.com
Using OpenSCAP to help achieve HIPAA compliance with Red Hat Enterprise Linux 8.3
Formatting tricks for the Linux date command | Enable Sysadmin
5 things we learned about Java in 2020 | Opensource.com
Not So Open Any More: Elasticsearch Relicensing and Implications for Open Source Search
How to Copy a Docker Image - Tutorial - buildVirtual
An introduction to hashing and checksums in Linux | Enable Sysadmin
building a simple KVM switch for 30€ | die-welt.net
About CVE-2020-27348 |
CVE-2020-27348
Solene's percent % : Vger security analysis
What can we learn from SQL's 50 year reign? A story of 2 Turing Awards
Bob’s 2021 Tech Predictions: What a Difference a Pandemic Makes | I, Cringely
How to Install Terraform on Ubuntu 20.04
Open Source Management & Strategy Training Program Launched by The Linux Foundation - Linux.com
WRT54G History: The Router That Accidentally Went Open Source
Deter burglars with a Raspberry Pi chatbot - Raspberry Pi
Analyzing Bugzilla Testcases with Bugmon - Mozilla Hacks - the Web developer blog
Oracle Linux 8: Containers made easy with short training videos | Oracle Linux Blog
Use Raspberry PI as FM Radio transmitter - peppe8o
Arduino Blog » Homemade machine puts a new spin on winding yarn
BIA or application catalog – Notes from MWhite
My List of Unusual Things in DNS :: packetmischief.ca
A Practical Guide to AWS Monitoring – Notes from MWhite
How To List Installed Packages Sorted By Installation Date In Linux
My handy guide to software development and testing | Opensource.com
Home working increases cyber-security fears - BBC News
Linux Kernel /etc/sysctl.conf Security Hardening - nixCraft
The Fall of Microsoft’s IIS and Microsoft’s Faked ‘Love’ of What’s Defeating IIS and Windows | Techrights
Implementing the ACSC "Essential Eight" baseline for security automation in Red Hat Enterprise Linux
How To Plot Unix Directory Structure Using Python Graphviz
(3) Docker Essentials (Part 7) - Creating Images - YouTube
(3) Docker Essentials (Part 6) - Accessing Containerized Apps - YouTube
(3) Docker Essentials (Part 5) - Making Containers Persist - YouTube
(3) Docker Essentials (Part 4) - Running Containers - YouTube
(3) Docker Essentials (Part 3) - Installing Docker on Windows 10, macOS, and Ubuntu - YouTube
(3) Docker Essentials (Part 2) - What is Docker? - YouTube
(3) Docker Essentials (Part 1) - Introduction - YouTube
7 fun Linux containers/image transports features | Enable Sysadmin
How To Secure the Linux Kernel .
World Economic Forum pegs cybersecurity failure as a major global risk - SiliconANGLE
4 open practices for a sustainable technology transition | Opensource.com
1. Transparency and trust 2. Knowledge evolution and adaptation 3. Collaborative innovation 4. Open business models
Popular mythology spread by IBM parrots elogind vs consolekit2 1.2.2 | systemd-free linux community
You cannot manage your supply chain – Open Source Security
Patch a vCenter Server High Availability (VCHA) environment - ivobeerens.nl
Installing Linux bash shell on Windows | Electric Monk
The U.S. Spent $2.2 Million on a Cybersecurity System That Wasn’t Implemented — and Might Have Stopped a Major Hack — ProPublica
The start of a crazy journey: the SunFire V245 – OSnews
Accepted Risks in Architectural Design
Google Proposes "Know, Prevent, Fix" Framework For Dealing With Security Vulnerabilities - Phoronix
Know, Prevent, Fix: A framework for shifting the discussion around vulnerabilities in open source | Google Open Source Blog
Google Proposes "Know, Prevent, Fix" Framework For Dealing With Security Vulnerabilities - Phoronix
How to Monitor Disk I/O performance in Linux | 2DayGeek
Visualizing System Performance with RHEL 8 Part 3: Kernel Metric Graphing with Performance Co-Pilot, Grafana, and Bpftrace
STIG Security Profile in Red Hat Enterprise Linux 7
BSD Now 388: Must-have security tool
Pf-badhost
The Unexpected Find That Freed 20GB of Unused Index Space | Haki Benita
Patient names and colonoscopy results from US hospitals posted by hackers to the dark web - The Verge
Patient names and colonoscopy results from US hospitals posted by hackers to the dark web - The Verge
"But it’s also dangerous when hospitals have data breaches — for 30 days after, more people die than usual, probably because people have to devote time to fix the systems rather than focusing entirely on medicine. "
Biden: US taking 'urgent' steps to improve cybersecurity | TheHill
Integrate devices and add-ons into your home automation setup | Opensource.com
Asymptotic awesomeness
It doesn’t matter if the first iteration produces something utterly useless, as long as I can improve it. The end goal is to get somewhere awesome, but the route may take me via appalling, awful, aggravating, annoying, adequate, acceptable, and alright.
How to Save Time Running Automated Tests with Parallel CI Machines | Linux Journal
Monitor HAProxy with Grafana and Prometheus (haproxy_exporter) | Lisenet.com :: Linux | Security | Networking
Home Networking Upgrade – UniFi UAP-AC-PRO UFOs – Jon's FOSS Blog
OpenWRT: USB storage | panticz.de
Windows Administrative Tools | Free Server Management Tools
Is the SolarWinds Cyberattack an Act of War? It Is, If the United States Says It Is. - Lawfare
The SolarWinds Hack Can Directly Affect Control Systems - Lawfare
Cyber ‘Deterrence’: A Brexit Analogy - Lawfare
Enumerating a new network with Nmap | Enable Sysadmin
On planning and estimating software development work
I find that planning, in detail, beyond a week or two is likely to be useless. After that, too much changes that affects what I need to do, and how. Note the caveat of “in detail”: it’s fine to plan something like “over the next decade I will implement a backup program”, but planning to develop backups in September, restores in October, and adding encryption the first week in November is folly.
Why the future of your business lies in your CISO’s hands | BT for global business
Korean Style Steamed Zucchini Side Dish Recipe -- Gluten Free, Paleo, Vegan, and Easy | Penniless Parenting
A Guide to systemd journal clean up process [With Examples]
A Role for the Vulnerabilities Equities Process in Securing Software Supply Chains - Lawfare
Ransomware: The Current Threat Landscape | New Jersey Cybersecurity & Communications Integration Cell
Crooks exploit VMWare ESXi flaws to encrypt disks of VMsSecurity Affairs
5 Most Notable Open Source Centralized Log Management Tools
Re-thinking safe-withdrawal rates and how much you'll need in retirement
Canonical Releases Ubuntu Core 20 for IoT/Embedded Devices with Full Disk Encryption - 9to5Linux
Considering privacy in a work from home world
Oh, the Irony! Chrome is Blocking Security Tool Nmap Downloads Considering it a Security Threat - It's FOSS News
Predicting Hard Drive Failure with Machine Learning - Datto Engineering Blog
Kasada | Protection from Automated Threats | Bot Mitigation
Ransomware provides the perfect cover - Help Net Security
How to Build a Web Traffic Monitor with Python, Flask, SQLite, and Pusher – Linux Hint
Python Script to Monitor Network Connection – Linux Hint
How to Create a Database in MongoDB Using Python – Linux Hint
Part 3 - Rancher Kubernetes Engine (RKE) Security Best Practice for Container and Runtime Security | StackRox
Part 2 - Rancher Kubernetes Engine (RKE) Security Best Practices for Authentication, Authorization, and Cluster Access | StackRox
Part 1 - Rancher Kubernetes Engine (RKE) Security Best Practices for Cluster Setup | StackRox
Knowledge meets machine learning for smarter decisions, Part 2 - Red Hat Developer
Knowledge meets machine learning for smarter decisions, Part 1 - Red Hat Developer
Tomaz's dev blog: Built-in "Xray" like UNO object inspector – Part 1
Configuration Database - Michael Jansen, Drive By Coding
GameStop & Mark-to-Market Taxation of Capital Gains | Tax Foundation
Why and How to Do Your Taxes with Open Tax Solver
The KISS Web Development Framework | Linux Journal
A typical web application would include all of the following building blocks: Front-end layout (HTML/CSS) Front-end functionality (JavaScript) Back-end server code (Java, C#, etc.) Communications (REST, etc.) Authentication Data persistence (SQL, etc.)
sig-security/CNCF_cloud-native-security-whitepaper-Nov2020.pdf at master · cncf/sig-security · GitHub
Forrester Report - Best Practices: Medical Device Security | Armis
Inside WallStreetBets, the Reddit army that's rocking Wall Street - CNN
12 Cybersecurity Predictions For 2021 Every Organization Must Consider
Arrest, Seizures Tied to Netwalker Ransomware — Krebs on Security
SolarWinds Cyberattack: Layered OT Security Creates Best Defense
Multi-OS PXE-booting from FreeBSD 12: Introduction (pt. 1) | eerielinux
Installing System Rescue (CD) to a flash drive | Daniel Lange's blog
How to Verify SHA256 Checksum of File in Linux
Intel Discontinues Optane Consumer SSDs. Is This Important? – The SSD Guy
Data classification at backup is a pointless placebo
Linux in Healthcare - Cutting Costs & Adding Safety | Linux Journal
How to Set Up ModSecurity with Apache on Debian/Ubuntu
Developing a Cybersecurity Scorecard - Developing a Cybersecurity Scorecard.pdf
20 Cybersecurity Metrics & KPIs to Track | SecurityScorecard
14 Cybersecurity Metrics + KPIs to Track | UpGuard
Another Sudo Root Privilege Escalation Vulnerability Got Patched, Update Now - 9to5Linux
Simple router setup with nftables - Sysadmins Guide
Best Way to Split Your Linux Terminal – Linux Hint
How to Install GVM Vulnerability Scanner on Ubuntu 20.04
10 Facts About Wikipedia That You Didn't Know
Money and Happiness: Happiness Keeps Increasing Past $75,000 a Year — My Money Blog
Doc Searls Weblog · How we save the world
Backup interchange format
Install and Configure a PXE Boot Server for Kickstart Installation on CentOS 7 | Lisenet.com :: Linux | Security | Networking
6 Ways to Productively Grow and Manage Your Business – Productivity
1. Ramp Up on Automation 2. Collaborate More Smoothly 3. Choose the Right Tasks at the Right Time 4. Cut Down on Interruptions 5. Stay Focused on Your Goals 6. Keep your Resources Close at Hand
Hyperion Works, LLC - Blogs : Converting a Clonezilla Image to a VirtualBox, KVM, or VMWare Virtual Machine Image
Converting a physical machine to a virtual machine | Just moozing
President Biden appoints 'world-class' cybersecurity team in wake of hacks | Engadget
How to Store a Linux Command as a Variable in Shell Script
Client Communication: 10 Ways to Create a Connection with Customers – Ideas
Concretedog: Playing with the Raspberry Pi Pico!
GitHub - Sycnex/Windows10Debloater: Script to remove Windows 10 bloatware.
Netlogon Domain Controller Enforcement Mode is enabled by default beginning with the February 9, 2021 Security Update, related to CVE-2020-1472 – Microsoft Security Response Center
9 Essential Properties of Backup
Retrospective for 2020 | The Frog Pond of Technology
Top 5 Frugal Bloggers of 2020  – BeingFrugal.net
Will a Tesla Save You Money on Gas? – BeingFrugal.net
Software Development 101: The Basics of Cutting Costs – Business
Windows 10: Upgrade Error 0x80244019 | Born's Tech and Windows World
Bill Sempf | Application Security This Week for January 17
Recipe Search with Typesense
Cybersecurity Ramifications of the 2021 Storming of the United States Capitol - TidBITS
We should all take to heart the words of Kelvin Coleman, executive director of the National Cyber Security Alliance, who said, “Any time there’s a physical breach of a space, I automatically assume it was a digital compromise as well.”
2020 – my year in review
2020 – My Year in Books 📚 – data-nerd.blog
What’s Your Work From Home DR Plan? | The Networking Nerd
A Python learning path for network engineers | Open-Source Routing and Network Simulation
10 Secrets That Make IT Networking Fun And Easy - RouterFreak
1. I may sound boring but believe me, you need to invest in continuous learning 2. Team bonding is the magic concoction 3. Digitize and automate, not only in your mind but in the workplace too 4. Protect the network or get ready to work non-stop for days 5. You are not a networking person if you have not done anything about network security 6. Relax a bit, not when the network is down but once you get it back up 7. Go out of your way to offer tech support to someone you like 8. Read and keep yourself updated IP routing Fundamental by Mark Sportack Computer Networking: A top-down approach (6th Edition) by Kurose and Ross TCP/IP network administration by Craig Hunt TCP/IP illustrated (2 Volumes) by Richard Stevens The Network Warrior by Gary A. Donahue 9. Share the issues you face with your best buddy 10. Writing down the technical issue in that secret diary of yours
Notepadqq: Notepad++ alternative for Linux - Trend Oceans
mattmillman.com on IPv6 once again – Matt's Tech Pages
8 steps to check your network interface information - The Linux Juggernaut
Self-hosting Kubernetes on your Raspberry Pi
Building Encrypted Images for Confidential Computing | James Bottomley's random Pages
Modernize your skills – a 6-year anniversary post – Patrick Kremer
Worldwide UDP:443 (EDT) DDOS on Citrix (NetScaler) Gateway | Born's Tech and Windows World
2nd backdoor found on infected SolarWinds systems | Born's Tech and Windows World
SUNBURST hack: Microsoft’s analysis and news | Born's Tech and Windows World
What I Learned from Re-Reading The Goal
WMI filters to target sites and non Domain Controllers – Dimitri's Wanderings
Taking Screenshots with PowerShell on Windows 10 | KC's Blog
HOWTO: Check your LAPS Implementation for Proper Security - The things that are better left unspoken
1. When you don’t delegate viewing the LAPS passwords, you’re fine 2. When you run Windows Server 2003 Service Pack 1 and up Domain Controllers, you’re fine 3. When all devices in scope have the LAPS Client Side Extension installed, you’re fine 4. When you don’t fiddle with the confidentiality bit, you’re fine 5. When your Active Directory replicates fine, you’re fine 6. When people can’t change the mS-MCS-AdmPwdExpirationTime attribute, you’re fine
AVJONE NC318 WiFi Smart Outlet Power Plug with Tasmota and 2xUSB Ports - Bootloader Blog
SolarWinds hack: Microsoft and others also affected? | Born's Tech and Windows World
SUNBURST malware: Analytic Tool SolarFlare, a ‘Kill Switch’ and EINSTEIN’s fail | Born's Tech and Windows World
SUNBURST malware was injected into SolarWind’s source code base | Born's Tech and Windows World
News in the fight against SUNBURST infection, domain seized | Born's Tech and Windows World
Sloppiness at SolarWinds responsible for compromised software? | Born's Tech and Windows World
Using the Elgato Stream Deck to change your screen resolution
https://www.usenix.org/system/files/sec19-torres-arias.pdf
New, free tool adds layer of security for the software supply chain | NYU Tandon School of Engineering
Reflections on the SolarWinds Breach - Lawfare
The New IOT Security Act Shows the Limits of Congressional Policymaking for Cybersecurity - Lawfare
Business Budgets: How to Estimate Project Costs – Business
Media Training: What Is It and Why Do You Need It? – Marketing
A professional media training course will cover a lot of ground. However, here are some quick tips to bear in mind for media appearances: Speak clearly and simply. One common problem among nervous speakers is the tendency to speak too fast. They also tend to use a lot of filler words (such as “um” and “er”) for fear of losing the listener’s attention. However, by speaking more slowly and clearly, you can often have the audience hanging on your every word. In on-camera interviews, try to maintain good eye contact with the host. You don’t want to seem bored by the conversation. And looking around too much can even make you seem shifty or evasive. Be sure to inject a good deal of your own personality into your responses. Part of the reason for the company to do a PR appearance is to let the public put a friendly face and a voice to the brand. Therefore, it’s best not to appear to be a script-reciting robot. It’s also a good idea to do some background research on the interviewer and the type of show they present. What types of questions do they tend to ask? Are there types of guests who seem to get a better or worse response from them? Which demographics of people tend to tune into their broadcasts?
How the world went from no COVID vaccines to two in under a year | Engadget
Scanning for Vulnerabilities with ClamAV | Linode
Setting Boundaries Before You’re Swamped | The Networking Nerd
It’s a testament to the resilience of a group of sanitation workers behind the scenes whose job it is to clean up after management and sales and do the jobs no one else wants to do.
How Long Should You Practice | The Networking Nerd
"A reporter once asked boxing legend Muhammad Ali how many sit-ups he did each day. I’m sure the reporter wasn’t expecting Ali’s answer. Ali replied with: I don’t know. I don’t start counting them until it hurts. Those are the only ones that count. That’s what makes you a champion.”" “Don’t practice until you get it right. Practice until you can’t get it wrong.”
Analyze monolithic Java applications in multiple workspaces with Red Hat's migration toolkit for applications - Red Hat Developer
Windows 10 20H2 Update Reportedly Damages SSD File Systems If You Run ChkDsk
EDIT: This article originally conflated the /r and /f commands. To clarify, the /f parameter is intended to fix errors on a disk, while /r locates bad sectors and recovers readable information, and includes the functionality of /f (without having to specify it separately). Users who are reporting problems (BSODs) claim it happens with the /f parameter, though in theory, it could happen with /r as well.
WildFly server configuration with Ansible collection for JCliff, Part 3 - Red Hat Developer
Top 14 SS Command Examples to Monitor Socket Connections
Bare-metal Kubernetes with K3s
How to install ESXi 7 Update 1
vSAN Fault Domains | Some Design Thoughts
The Ten Commandments of Backup
1. Plan for the Worst-Case Scenario 2. Use all Available Software Security and Encryption Options 3. Understand the Overlap Between Active Data Systems and Backup Retention Policies 4. High Availability is a Goal, Not a Technology 5. Backup and Disaster Recovery Strategies are Not the Same Thing 6. Backup Applies to Everyone in an Organization, so Include Everyone 7. One Backup is Never Enough 8. One Size Does Not Fit All 9. Test It. Then Test again. And Again… 10. Backup and Disaster Recovery Planning is a Process, Not a One-Time Event
Using Ansible to automate your Laptop and Desktop configs! - YouTube
Sweet and Sticky Garlicky Green Beans Recipe -- Gluten Free, Paleo, Vegan | Penniless Parenting
How to Keep Healthy and Save Money Doing it | Penniless Parenting
Why Schrems II Might Not Be a Problem for EU-U.S. Data Transfers - Lawfare
How to Install Reveal.js on Ubuntu 20.04 and Create a Simple Presentation - RoseHosting
UbuntuHak: FreeNAS home server backups Done Right
Linux Run Commands As Another User – TecAdmin
[Solved] No Bootable Medium Found Error in VirtualBox
Modern software strategy for manufacturing companies - KDAB
Allen K. Briggs Memorial Scholarship
Permanent Transitions: What COVID-19 Changes Are Here to Stay? – Business
GoComply with OSCAL & FedRAMP :: Introduction to oscalkit :: Šimon Lukašík — Technical Blog
7 best practice tips for managing remote teams | Enable Sysadmin
Using ThinkPad T410 as a server
30 Basic commands which every Linux user should know - Trend Oceans
How to Use Perf Performance Analysis Tool on Ubuntu 20.04
Enterprise Java Transformation Continues with Rollout of Jakarta EE 9
Become shell literate
Graphana and OpenWRT based router – Sloppy Linux Notes
How long does your IO take ? | Oracle Linux Blog
iTWire - Attackers hit US Treasury through Microsoft Office 365; SolarWinds opens door to others
iTWire - SolarWinds product used to attack private, public sector: FireEye claim
iTWire - Researchers underline care taken to craft SolarWinds trojan campaign
U.S. Agencies Exposed in Attack by Suspected Russian Hackers - Bloomberg
Hackers backed by Russian government reportedly breached US government agencies - The Verge
Suspected Russian hackers spied on U.S. Treasury emails - sources | Reuters
Updating Docker Containers With Zero Downtime
Everything You Need to Know about Linux OpenSSH Server
TreeSheets - free form data organizer - LinuxLinks
Taskline: manage your tasks with style
Anatomy of a Linux Ransomware Attack.
Hive Data Center: Server Colocation Montreal
iTWire - When did FireEye know its defences had been breached?
Suspected Russian hackers spied on U.S. Treasury emails - sources | Reuters
U.S. Treasury, Commerce Depts. Hacked Through SolarWinds Compromise — Krebs on Security
23 Fundamental apt-get and apt-cache Commands You Need to Manage Your System – Linux Hint
Security Researcher Reveals Solarwinds' Update Server Was 'Secured' With The Password 'solarwinds123' | Techdirt
US Says Recent Hacking Campaign Hit Government Networks | Voice of America - English
How to Disable IPv6 on RHEL/CentOS 8
DHS Cyber Warriors Issue Warning About Massive Hacking Campaign, Disclose They've Been Hacked A Day Later | Techdirt
Improving Cross-Browser Testing, Part 1: Web Application Testing Today - Mozilla Hacks - the Web developer blog
VMware vSphere 7 Security & Features | ServerWatch
What is Disaster Recovery? | ServerWatch
SCAP Security Guide: helping you to achieve security policy compliance
Container security requires more than securing your images – IBM Developer
Google details what happened during Monday's cloud outage | Engadget
How can I make Nginx Faster? – Linux Hint
Linux Stat Command Explained
That first CVE was a fun find, for sure.
Critical, Unpatched Bug Opens GE Radiological Devices to Remote Code Execution | Threatpost
SAL's NETWORK BOOT
Boost Up Productivity in Bash - Tips and Tricks | Linux Journal
Ending the “Dual-Hat” Arrangement for NSA and Cyber Command? - Lawfare
Four Ways for President Biden to Fix Cyber on January 21 - Lawfare
The Latest Skirmish in the Transatlantic Data Wars - Lawfare
Warren Buffett | The Billionaire’s Life and Accomplishments – BeingFrugal.net
CYBER CONFLICT DATASET
The Strategic Implications of SolarWinds - Lawfare
The operation was so devastating that SolarWinds employees appear to have engaged in a massive sell-off of stocks prior to public disclosure of the vulnerability.
The SolarWinds Breach Is a Failure of U.S. Cyber Strategy - Lawfare
5 Java Performance Optimization Tricks - DZone Performance
11 Simple Java Performance Tuning Tips – Stackify
Myths and misconceptions about financial independence and early retirement
PANTS: a progressive web-based open-source nutrition ingredients and calories manager
Microsoft confirms it found compromised SolarWinds code in its systems | Engadget
U.S. Cyber Command's First Decade - Lawfare
Sysadmin tales: Take a look back at an old school IT prank | Enable Sysadmin
Terraform vs Ansible: What's the Difference?
Ransomware Hits Dozens of Hospitals in an Unprecedented Wave | WIRED
Waves of attacks on US hospitals show a change in tactics for cybercriminals - The Verge
An introduction to Pluto [LWN.net]
Best Alternatives to Adobe Reader on Linux – Linux Hint
As Neil Gaiman says, “a book is a dream that you hold in your hands.”
How to resize ZRAM (compressed swap) managed by systemd/zram-generator
How to back up your music files on Linux
Say hello to PLATYPUS, the latest CPU security problem | GamingOnLinux
From best practices to community of practice: The Open Source Way journey
iTWire - Cyber security centre warns of RAT targeting healthcare sector
iTWire - New Windows ransomware RegretLocker encrypts virtual disks as well
21 Best Free Security Tools | CIO East Africa
Maltego OWASP Zed Attack Proxy (ZAP) Samurai Web Testing Framework Kali Linux Fierce Domain Scan The Harvester Hping John the Ripper Nessus NMap OpenVPN Ophcrack OWASP Python Security Project Wireshark ModSecurity Burp Suite Metasploit Aircrack-ng TAILS Qubes OS Signal
Ransomware attacks pose 2021 challenges for Congress | TheHill
Publicly known support credentials expose GE Healthcare imaging devices to hacking | CSO Online
How to Install and Configure Django on Linux System
Logical Volume Manager (LVM) versus standard partitioning in Linux | Enable Sysadmin
Proxmox vs VMware 2020 Comparison | ServerWatch
3 ways Kubernetes optimizes your IT budget | Opensource.com
Tips for Passing the ITIL Certification Exam – Technology
Here's the Average American's Mortgage -- and How to Pay Yours Off Faster
New research on household debt found that the average U.S. mortgage balance, as of October 2020, was $215,655.
How security and compliance automation can help achieve a more secure hybrid cloud
Secure your containers with SELinux | Opensource.com
A Basic Guide to Different Stages of Linux Boot Process
How to Use hexdump Command in Linux? – Linux Hint
A guide to security technologies in Red Hat Enterprise Linux
Cyber insecurity | Linux Format
Can you really COMBINE that code? | Joinup
Time management: must-have tools and strategies for sysadmins | Enable Sysadmin
Amazon Monitron, a Simple and Cost-Effective Service Enabling Predictive Maintenance | AWS News Blog
Introducing KOpeningHours
Encrypting directories with eCryptfs in linux - The Linux Juggernaut
How to audit permissions with the find command | Enable Sysadmin
Kubernetes Security Specialist Certification Now Available
Red Hat, DarwinAI To Bring COVID-Net Screening Tool To Hospitals – TFiR: News, Interviews & Analysis shows hosted by Swapnil Bhartiya, covering the confluence of Cloud Native Computing, AI/ML & Security.
Kmart, Latest Victim of Egregor Ransomware – Report | Threatpost
As Hospitals Cope With a COVID-19 Surge, Cyber Threats Loom | SecurityWeek.Com
Monitoring Disk I/O on Linux with the Node Exporter – devconnected
A Intro to SAML – Ask the Architect
AWS Audit Manager Simplifies Audit Preparation | AWS News Blog
One last trip down memory lane with the Raspberry Pi Zero
Vmware vs virtualbox: A Comparative Evaluation
The NDAA’s National Cyber Director: Justifications, Authorities and Lingering Questions - Lawfare
Renewing my thrill at work with Ansible | Enable Sysadmin
Minder - mind-mapping tool - LinuxLinks
Top 5 Linux Server Malware and Rootkits Scanners | FOSS Linux
The Internet Archive are keeping Flash creations alive with the open source Ruffle | GamingOnLinux
Managing Cybersecurity Program CostRafeeq Rehman – Personal Blog
Zotero: Open Source App to Help You Collect & Share Research
How To Install Django on Debian 10 - idroot
The emerging cybersecurity headaches awaiting Biden - Axios
OpenClinic GA: 500+ worldwide hospital Implementation with ~500 weekly downloads
Finding rogue devices in your network using Nmap | Enable Sysadmin
How this open source security tool halted significant DDoS attacks | Opensource.com
Re-format blah,YYYYMMDD,blah as blah,YYYY,MM,DD,blah
Everything You Need to Know About Bash For Loops in Linux
Mind Your Step: Going On Sabbatical
Capturing Decrypted TLS Traffic with Arkime - NETRESEC Blog
How to Back Up Your Data in Ubuntu – Linux Hint
Nginx SSL Setup in Linux – Linux Hint
How Do I Create a Reverse Proxy in Nginx? – Linux Hint
Top 10 Tools to Automate Linux Admin Tasks – Linux Hint
DIY Pi KVM: An easy and cheap KVM over IP for Raspberry Pi
Sleek: A simple To-do app that makes use of todo.txt file format
Don't Panic: Kubernetes and Docker | Kubernetes
Container Runtime Interface(CRI)
Patient records stored by electronic health company found exposed online - SiliconANGLE
Logitech K400+ Keyboard Water Spill Repair – CubicleNate's Techpad
Recommended Reading: Ted Lasso and the American decline | Engadget
RCS Messaging: Here's Everything Important You Need To Know
Set Up ParseDMARC on Ubuntu 20.04 to Analyze DMARC Reports
Building A Dashcam With The Raspberry Pi Zero W | Linux Journal
Manage Windows Servers with Ansible | Lisenet.com :: Linux | Security | Networking
The Time I Stole $10,000 from Bell Labs - ACM Queue
New containerd Security Hole Needs to Be Patched ASAP – The New Stack
FLOSSLinux: Preparing for release of Debian 10.7 over the weekend and CentOS / Scientific Linux 6.x and EPEL for 6 now EOL
ufw | panticz.de
WildFly server configuration with Ansible collection for JCliff, Part 2 - Red Hat Developer
The Best RedHat-based Linux Distributions
No 'bonenkai' this year ... and many employees won't miss them - Japan Today
bonenkai (forget-the-year party)
My Favorite Books of 2020 | Chris Sanders
Backup or replicate - what's better? | ESX Virtualization
AES and AES-NIElectric Monk | Electric Monk
Deploying a EC2 Instance with PowerShell to AWS | davidstamen
Terence Luk: Installing Microsoft .NET Framework 4.8 stalls at: "File security verification: All files were verified successfully. Installation progress:"
vSAN Trim/Unmap functionalityElectric Monk | Electric Monk
How to archive MS Teams - SharePoint Maven
Fix PowerShell Error: “The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel.” – Ingo Karstein
How to read and correct SELinux denial messages | Enable Sysadmin
Run Pi-hole as a container with Podman
Happy Happy 31st Anniversay - HCL Notes and Domino
12 Frugal Habits You May Already Possess – BeingFrugal.net
Versatile Saag Paneer Recipe with Wild Edible Options, Vegan Options | Penniless Parenting
In Praise of Chris Krebs - Lawfare
Let’s talk about trace flags - Microsoft Tech Community
Setup MySQL on Docker – Order Matters | eknori.de
How to detect Cobalt Strike activities in memory forensics | Andrea Fortuna
New Jersey law bars doxxing campaigns against judges, prosecutors and police | Engadget
Sentimentality When Decluttering After the Death of a Loved One | Penniless Parenting
Can Being Frugal Actually Keep You from Making Money? – BeingFrugal.net
Microsoft's Windows turns 35 today | Engadget
Homemade Gluten Free, Dairy Free, Refined Sugar Free Eclairs Recipe -- Frugal Fancy Food | Penniless Parenting
Patch Management Standard - Health Information & Technology
https://www.himssconference.org/sites/himssconference/files/pdf/20.pdf
Donald Trump fires election cybersecurity director Christopher Krebs | Engadget
CISOs offer insights into patch management strategies | Healthcare IT News
How to Run PowerShell as Administrator
YouTube went down | Engadget
How China’s Control of Information is a Cyber Weakness - Lawfare
Cyberattacks and the Constitution - Lawfare
QEMU Live Update | Oracle Linux Blog
New Intel Vulnerabilities Now Patched in All Supported Ubuntu Releases - 9to5Linux
Configure Logitech, Steelseries And Other Gaming Mice On Linux Using Piper - Linux Uprising Blog
Display Linux Commands Cheatsheets With Tealdeer Tool - OSTechNix
wireguard | panticz.de
8 Creative Ways to Ease Transition from Crib to Big-Kid Bed | Penniless Parenting
Create random files with random content with Java | eknori.de
4 Major Retirement Planning Mistakes Most Americans Make
1. Failing to maximize Social Security benefits 2. Counting on working in retirement 3. Not setting specific planning goals 4. Not planning for healthcare costs in retirement
How to visualize RADIUS connections
Using dnsmasq for your Homelab – Nixdevil.com
The Earliest Linux Distros: Before Mainstream Distros Became So Popular - It's FOSS
Best Practices for Deploying Hadoop Server on CentOS/RHEL 7 - Part 1
Setting Up Hadoop Pre-requisites and Security Hardening - Part 2
Securing Your Work From Home | The Networking Nerd
Patching Oracle Database Appliance to 19.9 - Blog dbi services
Erman Arslan's Oracle Blog: Weblogic -- Unsupported Major.Minor Version 52.0 , while making the custom application available to all clients
Java SE 15 = 59 (0x3B hex), Java SE 14 = 58 (0x3A hex), Java SE 13 = 57 (0x39 hex), Java SE 12 = 56 (0x38 hex), Java SE 11 = 55 (0x37 hex), Java SE 10 = 54 (0x36 hex),[3] Java SE 9 = 53 (0x35 hex),[4] Java SE 8 = 52 (0x34 hex), Java SE 7 = 51 (0x33 hex), Java SE 6.0 = 50 (0x32 hex), Java SE 5.0 = 49 (0x31 hex), JDK 1.4 = 48 (0x30 hex), JDK 1.3 = 47 (0x2F hex), JDK 1.2 = 46 (0x2E hex), JDK 1.1 = 45 (0x2D hex).
Serverless Security: Are You Getting it Right? – Notes from MWhite
Company made to change name that could be used for website hacks | Engadget
Funkyware: ITCetera: Adding IPv6 support to my home LAN
How To Install Kanboard on Ubuntu 20.04 LTS - idroot
ansible 2.10.x and Fedora/EPEL – Kevin's musings
How the Kubernetes scheduler works | Opensource.com
Kick Google Play Outside Your Smartphone With AuroraStore
A sysadmin's guide to containerizing applications | Enable Sysadmin
Run Your Own DNS over HTTPS (DoH) Resolver on Ubuntu with DNSdist
Beginner Python Tutorial: Analyze Your Personal Netflix Data – Dataquest
http://len.falken.ink/misc/writing-for-the-internet-across-a-human-lifetime.txt
Guide To Frontend Testing Using Django | Codementor
Using Netsh Commands for Wi-Fi Management in Windows 10 | ServerWatch
4 Cobol Misconceptions and My #5 | PaymentsJournal
Council Post: COBOL Is Our Friend: Don’t Believe The Common Misconceptions
What does a transformer? - Vincent Lequertier's blog
Senaite: An Open-source Enterprise-grade Laboratory Information Management System (LIMS)
USBGuard improvements in Red Hat Enterprise Linux 8.3: Protecting against rogue USB devices
COBOL and $2,020,202.02 | Big Dan the Blogging Man
spaces in ASCII(20) and EBCDIC(40).
5 surprising ways I use Jupyter to improve my life | Opensource.com
WildFly server configuration with Ansible collection for JCliff, Part 1 - Red Hat Developer
Gitpaste-12 Worm Targets Linux Servers, IoT Devices | Threatpost
Older Android phones won't support many secure websites by September 2021 | Engadget
How to create backups using Kup — Nitrux — #YourNextOS
Automate Windows Server Setup with Windows Unattended Install | Lisenet.com :: Linux | Security | Networking
How to move Request Tracker into a Linux container | Enable Sysadmin
Reclaim hard-drive space with LVM - Fedora Magazine
How to Secure Your Apache Server – Linux Hint
How open source makes me a better manager | Opensource.com
Linux Security Hardening for Beginners Part 03 – SSH Hardening - The Linux Juggernaut
In case you missed it: Automation in the Public Sector Q&A at AnsibleFest
The 10 Best Linux Web Caches For Better Performance
That (not so) awesome time the police raided my home
Build your own datacenter with PXE and Alpine
Script to install Samba with settings for FOG | FOG Project
iPXE - open source boot firmware [scripting]
iPXE - open source boot firmware [examples]
GitHub - AdrianKoshka/ipxe-scripts: Various chain/boot scripts for ipxe
Tiny PXE Server
Subsurface: An Open-source Multi-platform Diving Logbook for Divers
20 Awesome Nmap Command Examples in Linux
ction is especially useful when performing vulnerability tests or ethical hacking. It allows the sysadmin to know if the firewall of the target host is enabled or not. To know the status of a firewall, use the -sA flag as shown. $ nmap -sA 192.168.2.1 This initiates an ACK scan which examines whether packets can pass through un
DEF CON Safe Mode Biohacking Village - Dameff, Tully - How COVID19 Changed Cyber Disaster Medicine - YouTube
Experian’s data processing practices violate the GDPR - IT Governance UK Blog
LogonTracer v1.5 Released - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Adaz - Automatically Deploy Customizable Active Directory Labs In Azure
PowerShell-Red-Team - Collection Of PowerShell Functions A Red Teamer May Use To Collect Data From A Machine
APICheck - The DevSecOps Toolset For REST APIs
Nethive-Project - Restructured And Collaborated SIEM And CVSS Infrastructure
Scrying - A Tool For Collecting RDP, Web And VNC Screenshots All In One Place
Awesome Android Security - A Curated List Of Android Security Materials And Resources For Pentesters And Bug Hunters
Grype - A Vulnerability Scanner For Container Images And Filesystems
Adobe Flash – it’s the end of the end of the end of the road at last – Naked Security
FBI “ransomware warning” for healthcare is a warning for everyone! – Naked Security
How to Find Out Your Windows 10 Edition, Version, and Build Number | Alexander's Blog
Patch Lady – certificates lost @ AskWoody
Analysis: Tactics of Group Waging Attacks on Hospitals
US Hospitals Warned of Threat of Imminent Ransomware Attack
Memory Forensics: Using Volatility Framework
About Cybersecurity Management and Expectations – tisiphone.net
Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser | FireEye Inc
Cyberlaw Clinic and EFF publish Guide to Legal Risks of Security Research | Cyberlaw Clinic
FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals — Krebs on Security
I Actually Like Remote and Pre-recorded Presentations | Daniel Miessler
How to Write Well | Daniel Miessler
Summary Clear writing is only possible with clear thinking, so start with an outline. Fancy language communicates deception, so write like you’re talking to someone. Wandering sentences lose the reader, so be clear and direct. Flow creates impact, so alternate between short and long sentences.
Rising Ransomware Breaches Underscore Cybersecurity ...
Ransomware Wave Targets US Hospitals: What We Know ...
How Healthcare Organizations Can Combat Ransomware
Adopt a layered approach to cybersecurity: This strategic shift is vital in the defense against the growing number of sophisticated attacks, including ransomware. Doing this requires integrating various tools, including antivirus, firewalls and web filters, and screening for malicious activity to minimize the risk. Adopting a layered cybersecurity strategy reduces the vulnerabilities within the healthcare network. Rethink business continuity: For healthcare enterprises where data has life or death implications, it's critical that the business continuity plan reflects that fact. Backing up sensitive patient data weekly or even daily is not sufficient in healthcare, and organizations should look for a continuous backup solution that allows them to treat sensitive information appropriately. It's important to note that when it comes to business continuity, one size doesn't fit all. Also, attackers have gotten very sophisticated about targeting backups during ransomware attacks, so ensuring offline or otherwise protected backups of critical data are available is extremely important. Phishing training: With attacks often being initiated via email, healthcare organizations must undertake regular training to help raise awareness of the pitfalls. With people working 24/7 in distributed environments, training healthcare workers needs to be more flexible to ensure that no one is forgotten. It's important to educate employees on spotting suspicious links and being mindful of grammar, punctuation, spelling, and formatting errors, as these are often phishing red flags. Arming everyone with this knowledge and updating them regularly on the latest cyber scams reduces the likelihood of employees clicking on dubious links and can help ward off attacks. Strengthen employee passwords: Trojan malware often attempts to propagate through an environment using lists of common or compromised passwords. Emotet, one of the suspected Trojans involved in the UHS attack, does this. Hospitals must end the practice of sharing credentials and integrate a tool to continuously search for exposed, common credentials. If employee or admin credentials are compromised or using common passwords or derivatives of common passwords, it's easier for nefarious actors to initially access and propagate through corporate infrastructure. Make multifactor authentication mandatory: Sensitive systems and data should require more than one login layer for security. Organizations must add additional authentication mechanisms to deter hackers rather than hoping than one will suffice. Only permit remote access via a virtual private network: Healthcare organizations have many workers that aren’t on the front lines and are working remotely for the foreseeable future. Hospitals must mandate that employees use a VPN to access work-related systems or data from home to keep this information protected.
Tell Us How You Want to Modify and Repair the Devices in Your Life | Electronic Frontier Foundation
DeepSec 2020 Talk: No IT Security Without Free Software – Max Mehl • DeepSec In-Depth Security Conference
To Automate or To Reduce the Noise? - /dev/random
Advanced Copy - Add Progress Bar To cp And mv Commands In Linux - OSTechNix
Chris's Wiki :: blog/linux/CyberPowerPowerpanelSettings
Chris's Wiki :: blog/sysadmin/UPSIssuesLearningExperience
Enabling ClamAV on Nextcloud - Networkshinobi
GitHub - danmed/Docker-Compose-Backup: Create compose files from running containers
Learning To Listen For Learning | The Networking Nerd
Don't Contribute Anything Relevant in Web Forums Like Reddit
Building wave of ransomware attacks strike U.S. hospitals | Reuters
iTWire - Italian energy giant Enel hit by Windows NetWalker ransomware
Monitoring Temperature in Raspberry Pi – Linux Hint
Eight ways to protect SSH access on your system | Enable Sysadmin
How to Monitor Ubuntu Performance Using Netdata
Application acceleration in vSphere 7
Writing in Python – when work and life intersect – Patrick Kremer
How to Install Jira Agile Project Management Tool on Ubuntu 20.04
Ansible Playbook: Complete Beginners's Guide
AdGuard Home: Another Brick in the Ad-Blocking Wall | LinuxInsider
Software correctness is a lot like flossing • Hillel Wayne
A post-COVID IT roadmap -- FCW
Oracle Continues Building DTrace For Linux Atop BPF - Phoronix
How To Become The Ultimate DIY Parent | Penniless Parenting
Docker Content Trust – Set environment variables correctly | Born's Tech and Windows World
What is DevSecOps? Everything You Need To Know About DevSecOps
DEF CON Safe Mode Biohacking Village - Mitchell Parker Panel - Advancing Medical Device Security - YouTube
5 new sudo features you need to know in 2020 | Opensource.com
Oracle October 2020 Critical Patch Advisory - PL/SQL detailed changes - DBA - Rodrigo Jorge - Oracle Tips and Guides
Deploy Windows 10 20H2 Reference Image – gal.vin
FBI warns hospitals of 'increased and imminent' ransomware threat | Engadget
How to Install and Use Siege Benchmarking Tool on Ubuntu 20.04
Secure your Kubernetes secrets with smart cards and libssh - Red Hat Developer
TCP Analysis with Wireshark | Linux Journal
How to install the Kubernetes dashboard > Tux-Techie
Configure Ansible and Run ad-hoc Commands
Cyber Awareness Training a Must for Third-Party Contractors - Security Boulevard
Improving on the Typical SIEM Model - Security Boulevard
Ransomware's Next Target: Backup Data - Security Boulevard
The Nastiest Malware of 2020 | Webroot
Microsoft's Kubernetes Threat Matrix: Here's What's ...
Webcast: The SOC Age Or, A Young SOC Analyst's Illustrated Primer - Black Hills Information Security
Creating Adaptive Cards via Teams Incoming Webhooks Using PowerShell
How to Configure NGINX as TCP/UDP Load Balancer in Linux
5 Human Factors That Affect Secure Software Development
Developers Need Focused Attention Unfocused contribution rises when a developer is modifying multiple files or when the number of unique contributors to a file increase. Unfocused contribution is associated with a greater number of vulnerabilities. Bigger Teams Correlate to Less Secure Code Larger teams mean more weaknesses and vulnerabilities. It’s hard to say what the ideal team size is. But research shows that Chromium files with 9 or more developers were 68 times more likely to have a vulnerability, and Apache web server files with 9 or more developers were 117 times more likely. Excessive Work Hours Affect Performance Research-based guidelines in aviation and medicine indicate that people engaged in safety-critical work should not work more than 11 hours per day. It is well-known that human performance degrades significantly as people work long periods of time. The Time of Day Code Is Written Matters Code churned between midnight and 8 AM and noon to 4 PM have files with more vulnerabilities. Team Location Does Not Influence Code Security Research conducted by Microsoft found no difference in software security between teams in the same building, cafeteria, campus, locality, or even continent. Distributed teams and co-located teams had essentially the same number of post-release failures. This is good to know as we now live in a remote working environment.
WannaCry Ransomware Explained
COVID-19 has created demand for cyber security personnel - IT Governance UK Blog
Zero Day Initiative — CVE-2020-16939: Windows Group Policy DACL Overwrite Privilege Escalation
CVE-2020-16939
Employees Aware of Emailed Threats Open Suspicious ...
A survey of 1,000 employees finds 96% of employees are aware of digital threats, but 45% click emails they consider to be suspicious.
Sooty - A SOC Analysts Tool - Part I - Security Boulevard
Qualys severity vs CVSS - The Silicon Underground
Sysadmin Stories: PowerCLI - Optimizing Scripts
Erman Arslan's Oracle Blog: ODA -- All MMONs die at random times and DBs down / investigation
CISM certification guide: Requirements, prerequisites, and cost | CSO Online
Keeping A (log)Watchful Eye on Your VPS With logwatch - Low End Box
Healthcare Exchange Standards: Patient Generated Health Data
DeployHappiness | The Best Trick I’ve Learned This Year
The Five Love Languages- It's More Complicated Than You'd Think | Penniless Parenting
DIY wood crate shelves - The Silicon Underground
Forensic Investigation: Shellbags
7 steps to ensure a successful CISO transition | CSO Online
1. Be open, candid, and positive 2. Create a transition plan 3. Brief the new CISO on business and security activities 4. Provide documentation of security tools and practices 5. Be honest but factual about organizational and staffing issues 6. Involve stakeholders in the onboarding process 7. Step away, but follow up
Terence Luk: PowerShell script to extract ObjectGUID, convert to Base64 encoded string, and assign immutableID for Azure AD account for hard matching with AD Connect
Principal Component Analysis (PCA) in Oracle « Oralytics
How NLP is Transforming Cyber Risk and Compliance - Security Boulevard
Digital Forensic Basics: an analysis methodology flow chart | Andrea Fortuna
How to Leverage Nessus Scan Reports for Better Vulnerability Assessment - Blog | Tenable®
Proxmox device passthrough - Networkshinobi
Install Home Assistant on ESXi-ARM - ivobeerens.nl
Upload OVA to Proxmox/ KVM – JamesCoyle.net Limited
Importing OVA file to Proxmox 6.1.3 - Networkshinobi
Decoder++ - An Extensible Application For Penetration Testers And Software Developers To Decode/Encode Data Into Various Formats
Manuka - A Modular OSINT Honeypot For Blue Teamers
Putting open values into management practice | Opensource.com
Kubernetes the hard way | panticz.de
HPE addresses critical auth bypass issue in SSMC consoleSecurity Affairs
Hacking HTTP CORS from inside out: a theory to practice approach | by Lucas Vinícius da Rosa | InfoSec Write-ups | Oct, 2020 | Medium
Nessus Essentials with offline registration and plugin updates | Alexander V. Leonov
Cyberattacks against machine learning systems are more common than you think - Microsoft Security
Erman Arslan's Oracle Blog: ODA as a Weblogic Appliance ? Or is it better to consider PCA?
Analyse Linux (syslog, auditd, ...) logs with Elastic
Microsoft Teams phishing campaign targeted up to 50,000 Office 365 usersSecurity Affairs
The 20 Best Java Courses for Beginners and Experienced Programmers
DEF CON 28 Safe Mode BioHacking Village - Meg Doerr's 'Cybersecurity Informed Consent 4 Medical Devices' - Security Boulevard
Certifications: Preparing for and passing CCSP! - Syspanda
Risks cannot be eliminated, there will always be residual risk Human Life is the most valuable (ALWAYS) Security everyone’s responsibility If it’s not necessary to your business or function, get rid of it (otherwise it will create a liability for your organization) ISC2 exams are international, keep in mind that international based-answers are better than regional answers (Perfect example is GDPR which applies to multiple countries) If it can’t be measured, it can’t be managed Regulations & Laws should be treated as additional risks If you develop/design anything with Security as an initial consideration and throughout it’s lifecycle, it will make things easier & more cost effective Thorough testing (e.g. DAST/SAST) will always find a problem (Specifically in SDLC). Separation of duties will always be the best answer (No self audit) Chain of Custody should always be established first and maintained Risk Assessment is never-ending Think like a manager when answering most questions (In terms of governance), but have a thorough understanding of technology to be in a position to suggest potential solutions to problems. Top bottom Develop a security culture from Top to bottom (Always have buy-in from the top) Make sure you read the question thoroughly. Some of the questions are lengthily as they’re scenario based; however, focus on the key terms such as “Which one is the best, Which one is NOT” so you don’t jump ahead. You may mark questions during the exam and come back to them later, don’t waste your brain power in tackling confusing questions. Sometimes other questions might give you the answer or make your brain remember that particular concept better.
AutoGadgetFS - USB Testing Made Easy
Five worthy reads: Preparing an incident response plan for the pandemic and beyond - Security Boulevard
Book Review: Twilight of Democracy - Open Canada
“Democracy is not about instant gratification. It’s about sifting and balancing. In other words, the features that make democracy successful also make it dull, even alienating. But why is it in such acute crisis today?”
Formative assessment in the computer science classroom - Raspberry Pi
The No People - Furrygoat
Centralize and Automate your AppSec or Risk Being Buried Alive! - ZeroNorth
PowerShell: Check if Program or Update is Installed and Download with BITS and Install - The Grim Admin
Directory Traversal — Web-based Application Security, Part 8 - Security Boulevard
6 top risk factors to triage vulnerabilities effectively - Security Boulevard
Out of the 787 Common Vulnerabilities and Exposures (CVEs) published by Microsoft 2019, 731 of them had a severity rating of seven or above.
What Really Matters In Your Personal Finances — My Money Blog
If you’re young, how much you save If you’re retired, how much you spend How you behave when markets panic Your allocation between stocks and bonds How much you pay in fees
What is a database backup (back to the basics) - Blog dbi services
8 New and Hot Cybersecurity Certifications for 2020
Certified Data Privacy Solutions Engineer (CDPSE) Certified Information Privacy Technologist (CIPT) Certified Ethical Emerging Technologist (CEET) CyberSec First Responder (CFR) • Cloud security certifications from Amazon Web Services, Microsoft Azure, and Google. • Infrastructure certifications from vendors like Cisco and Palo Alto Networks. • Product certifications from vendors that apply to specific controls: vulnerability management, privileged access management, and security event information management. Certified Kubernetes Security Specialist (CKS) Certified Information Systems Security Professional (CISSP)
Open Education and Artificial Scarcity in Hard Times | Electronic Frontier Foundation
Cybercrime: It’s Not About How, But Why? | BehavioSec
Corporate Botnets: It is estimated that 70% of computers that belong to “botnets” (computers under the control of “botmasters”) are behind corporate firewalls. The average duration of a botnet-controlled computer is only three to six months; however, the recidivism rate for the same computers to return to botnet control is more than 50%. Outdated Software Vulnerabilities: From audits of large and small organizations, both public and private, more than 80% of computers, network devices, and related services applications have outdated software – with known or identifiable weaknesses either because of improper configuration or inventory lethargy. IT Staff Turnover: Additionally, the average tenure of an information technology or services staff member in a distinct functional role is less than one year; while related pay and benefits change only approximately every three to five years.
Weird: Wrong Subnet Mask Causing Unicast Flooding « ipSpace.net blog
A CISOs Guide to Digital Transformation
NSA Top Secret History of Computer Security | flyingpenguin
The Most Innovative ~$50 Graphics Card For Linux Users - Phoronix
New Report on Police Decryption Capabilities - Schneier on Security
Why ransomware has become such a huge problem for businesses - TechRepublic
Secure NTP with NTS - Fedora Magazine
DEF CON 28 Safe Mode BioHacking Village - Dena Medelsohn's & Jen Goldsack's 'Redefining Patient Safety' - Security Boulevard
Let’s build a high-performance fuzzer with GPUs! | Trail of Bits Blog
Considerations for Starting a NIST CSF Assessment  - Security Boulevard
Catching Lazarus: Threat Intelligence to Real Detection Logic - Part Two
How to check TLS/SSL certificate expiration date from command-line - nixCraft
Security and Compliance in vSphere 7
Internet Explorer: No more support for Microsoft accounts and apps | Born's Tech and Windows World
Powershell – List Domain users as local admins on member servers | geekdudes
Securing Postgres connections using Let’s Encrypt certificates | Logan Marchione
Getting Big Things Done - Marc's Blog
Checking SSL/TLS Certificate Expiration Date with PowerShell | Windows OS Hub
vSphere 7’s vCenter Server Identity Provider Federation feature allows for MFA - The things that are better left unspoken
Securing Internet-Connected Devices in Healthcare | Gurucul Solutions
Safeguarding Our Health Information in a Global Pandemic - Security Boulevard
Securing DevOps Using Deception and Denial - Security Boulevard
Why More Cybersecurity Threats Since WFH?
Implementing a zero-trust model: The key to securing microservices
Active Directory: Explained
Problem Solving - Lessons From Teaching Cybersecurity: Week 4
Cyber Risk Management: Protecting Data, Infrastructure and People | Axio
Montréal Public Transport Agency Discloses Ransomware Attack
The 11 Hottest Cybersecurity Certifications In 2020
Certified Information Security Systems Professional (CISSP) AWS Certified Security – Specialty Certified Cloud Security Professional (CCSP) ISACA Certifications – CISA, CISM and CRISC OT Security Certifications Palo Alto Networks - PCNSA and PCNSE Systems Security Certified Practitioner (SSCP) Certified Ethical Hacker (CEH) SANS Institute Certifications Cisco Identity Services Engine (ISE) AV-Test And MRG Effitas
Threat hunting (VI): hunting without leaving home. Creating our victim - Security Art Work
Boolean Math (NOT Logic) – CISSP Domain 3 – Professionally Evil Insights
☀ How to Build an Arduino Data Logger ☀ | Underwater Arduino Data Loggers
Got a problem? - NevBlog
4 Approaches to Securing Containerized Applications | Radware Blog
1. External threats – This very first one isn’t new; threats from external users from the internet transact with the application. This typical client-to-server traffic is also known as North-South traffic. 2. Lateral threats – In microservices, the focus shifts to the transfer of data packets from server to server, or microservice to microservice, within a data center or VPC. ​This internal communication is also known as East-West traffic. Securing East-West traffic is crucial to reduce surface available for malicious activity. ​ 3. API Security – APIs are the main vehicle for East-West data exchange between microservices, using different protocols – REST, gRPC, GraphQL or others. The threats to APIs vary and include unauthorized access, protocol manipulations, denial of service and a wide range of bot attacks​. 4. Open source – there are so many great tools, modules, and functions off the shelf; however, there’s no guarantee that they are tested or patched for security. 5. End-to-End encryption – Enterprises today are less tolerant of any form of cleartext communication and ​require SSL/TLS termination at the host level. This way, they avoid maintaining multiple certificates dispersed across multiple locations.
2020 Verizon Data Breach Investigations Report: Summary and key findings for security professionals
Top 10 Application Security Best Practices - Security Boulevard
Common Vulnerability Scoring System SIG
84% of Security and Development Professionals Believe ‘Security Champions’ Programs Can Improve Relationship Between Security and DevOps Teams - Security Boulevard
The Baseline – Quick Fixes
NSA details top 25 flaws exploited by China-linked hackersSecurity Affairs
These include: 1) CVE-2019-11510 – In Pulse Secure VPNs, ® 7 an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability. This may lead to exposure of keys or passwords. 2) CVE-2020-5902– In F5 BIG-IP® 8 proxy / load balancer devices, the Traffic Management User Interface (TMUI) – also referred to as the Configuration utility – has a Remote Code Execution (RCE) vulnerability in undisclosed pages. 3) CVE-2019-19781 – An issue was discovered in Citrix® 9 Application Delivery Controller (ADC) and Gateway. They allow directory traversal, which can lead to remote code execution without credentials. 4+5+6) CVE-2020-8193, CVE-2020-8195, CVE-2020-8196– Improper access control and input validation, in Citrix® ADC and Citrix® Gateway and Citrix® SDWAN WAN-OP, allows unauthenticated access to certain URL endpoints and information disclosure to low-privileged users 7) CVE-2019-0708 (aka BlueKeep) – A remote code execution vulnerability exists within Remote Desktop Services®10 when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests 8) CVE-2020-15505 – A remote code execution vulnerability in the MobileIron®13 mobile device management (MDM) software that allows remote attackers to execute arbitrary code and take over remote company servers. 9) CVE-2020-1350 (aka SIGRed) – A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. 10) CVE-2020-1472 (aka Netlogon) – An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller using the Netlogon Remote Protocol (MS-NRPC). 11) CVE-2019-1040 – A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. 12) CVE-2018-6789 – Sending a handcrafted message to an Exim mail transfer agent may cause a buffer overflow. This can be used to execute code remotely and take over email servers. 13) CVE-2020-0688 – A Microsoft Exchange® validation key remote code execution vulnerability exists when the software fails to properly handle objects in memory 14) CVE-2018-4939 – Certain Adobe ColdFusion versions have an exploitable Deserialization of Untrusted Data vulnerability. Successful exploitation could lead to arbitrary code execution. 15) CVE-2015-4852 – The WLS Security component in Oracle WebLogic 15 Server allows remote attackers to execute arbitrary commands via a crafted serialized Java object 16) CVE-2020-2555 – A vulnerability exists in the Oracle Coherence product of Oracle Fusion Middleware. This easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence systems. 17) CVE-2019-3396– The Widget Connector macro in Atlassian Confluence 17 Server allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection. 18) CVE-2019-11580 – Attackers who can send requests to an Atlassian Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution. 19) CVE-2020-10189 – Zoho ManageEngine Desktop Central allows remote code execution because of deserialization of untrusted data. 20) CVE-2019-18935 – Progress Telerik UI for ASP.NET AJAX contains a .NET deserialization vulnerability. Exploitation can result in remote code execution. 21) CVE-2020-0601 (aka CurveBall) – A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. 22) CVE-2019-0803– An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. 23) CVE-2017-6327– The Symantec Messaging Gateway can encounter a remote code execution issue. 24) CVE-2020-3118 – A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload an affected device. 25) CVE-2020-8515 – DrayTek Vigor devices allow remote code execution as root (without authentication) via shell metacharacters.
Patching all my environments with the October 2020 Patch Bundles
The Cybersecurity Maturity Model Certification: Are ...
Sopra Steria hit by cyber attack. IT services group suspected of falling victim to ransomware • Graham Cluley
Forensic Investigation: Pagefile.sys
Hacking Incident Has an Unusual Ending - HealthcareInfoSecurity
Cybersecurity’s Inconvenient Truth: The Nation State Threat
NTLMRawUnHide - A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format
Pwndoc - Pentest Report Generator
Zap-Hud - The OWASP ZAP Heads Up Display (HUD)
Use Banner Grabbing to Aid in Reconnaissance & See What Services Are Running on the System « Null Byte :: WonderHowTo
Beat the Toughest CMMC Level 3 Requirements: Logging and Alerting | Pivot Point Security
Beat the Toughest CMMC Level 3 Requirements: Email Spam Protection and Sandboxing | Pivot Point Security
Beat the Toughest CMMC Level 3 Requirements: End-to-End Encryption | Pivot Point Security
Beat the Toughest CMMC Level 3 Requirements: Multifactor Authentication | Pivot Point Security
Beat the Toughest CMMC Level 3 Requirements: Mobile Device Management | Pivot Point Security
3 Reasons You (Probably) Need to Rethink Your Cybersecurity | Pivot Point Security
The noise is deafening.  Complexity is unmanageable. Trust is fleeting.
Life of Maze ransomware | Securelist
ENISA Threat Landscape Report 2020 - Security AffairsSecurity Affairs
How to Setup and Manage Log Rotation Using Logrotate in Linux
Incremental backup with Butterfly Backup - Fedora Magazine
How to Turn Your Raspberry Pi into a Video Conferencing Station - Make Tech Easier
The Long Road to HTTP/3 · Scorpil
DevOps: Principles and Practice
How To Take A Screenshot Using Python & Selenium? | Codementor
Start your Red Hat training and certification journey with a skills path that's right for you
COBOL’s Enduring Usefulness and Digital Transformation | CIO
GoAccess (A Real-Time Apache and Nginx) Web Server Log Analyzer
Daisugi: The Japanese Forestry Technique of Creating a Tree Platform for Other Trees | Spoon & Tamago
The Cyberlaw Podcast: Fight Like a Canadian - Lawfare
We also talk about the unique Canadian talent for debate that is both bare-fisted and unusually polite.
Check your Unified Auditing Policies after upgrading to Oracle 19c
BSIMM11 Observes the Cutting Edge of Software Security Initiatives
Rdiff-backup - A Local and Remote Backup Tool for Linux
5 ways AI is improving healthcare post-COVID
1. Increasing Diagnosis Accuracy 2. Enabling Faster Care 3. Monitoring Patient Conditions 4. Reducing Healthcare Costs 5. Improving Medical Research
How to Install Mitre CALDERA and Configure Your SSL Certificate - Black Hills Information Security
Disk usage on ODA - Free MB and usable MB - Blog dbi services
The 4 pillars of Windows network security | CSO Online
1. Passwordless identity management 2. Patch management 3. Device control 4. Security benchmarks
EthicsfIRST: Ethics for Incident Response and Security Teams
How to build an ESXi on ARM Pi cluster? - ivobeerens.nl
It’s Time for the Eternal September to End
PatchChecker - Web-based Check For Windows Privesc Vulnerabilities
Privacy and security concerns increase with remote work
Why the concept of 'single pane of glass' in cybersecurity is a myth
A Different Kind Of Skillset | The Automation Blog
Open Up Wide with PowerShell • The Lonely Administrator
iTWire - Auto equipment maker KYB hit by Windows NetWalker ransomware
CSIS - Significant Cyber Incidents Since 2006
Avoiding the snags and snares in data breach reporting: What CISOs need to know | CSO Online
NSS Labs Shuttered
Building an Effective Ransomware Mitigation Strategy
Jennifer Ayers
Privacy Roundup #17 | Andrea Fortuna
”A child born today will grow up with no conception of privacy at all. They’ll never know what it means to have a private moment to themselves, an unrecorded unanalyzed thought. And that’s a problem because privacy matters. Privacy is what allows us to determine who we are and who we want to be.” – Edward Snowden
Webcast: Infosec Mentoring | How to Find and Be a Mentor & Mentee - Black Hills Information Security
DEF CON 28 Safe Mode Red Team Village - Jonathan Helmus' 'Student Roadmap To Becoming A Pentester' - Security Boulevard
debian-ansible -
My test setup for my Ansible roles
DEF CON 28 Safe Mode AppSec Village - Fredrick “Flee” Lee's 'What Bruce Lee Can Teach Us About AppSec' - Security Boulevard
Past vs present vs future platforms - NevBlog
Course Review: Reverse Engineering with Ghidra · System Overlord
Graylog Monitoring Server on Ubuntu Linux for Monitoring Server/Services
Born to Run: Is Running Outdoors Another Deeply-Embedded Human Desire? — My Money Blog
How to show dropped packets per interface on Linux - nixCraft
Linux security: Manipulating SELinux policies with Booleans | Enable Sysadmin
Manage your Linux backups with Rdiffweb | Opensource.com
Introduction to using firewalld on Oracle Linux 8 - YouTube
10 Practical Examples Using Wildcards to Match Filenames in Linux
Kiwi TCMS - SEDC Academy For Software Testing is running Kiwi TCMS
iTWire - Criminals leak Software AG data after Windows ransomware attack
How to Boost the Productivity with Sublime Text Snippets
ServiceNow Orders VMWare VMs Via Ansible Tower | Greg Sowell Saves The World
Oracle Certified Master's - Blogs: RAC12cR2 : 12cR2 RAC Installation Step by step on Oracle Linux 7.4
echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdb echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdc echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdd echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sde echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdf echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdg echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdh echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdi echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdj echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdk echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdl echo -e "o\nn\np\n1\n\n\nw" | fdisk /dev/sdm
Book Review: Calling Bullshit - Thomas LaRock
The chapters on numbers and nonsense, selection bias, and data visualization all struck a chord for me. The authors do a wonderful job of detailing their thoughts and using practical examples. And they don’t just tell you how to call bullshit, they remind you to do so in a respectful way, again with examples. Part of the problem when trying to refute bullshit tossed at you from your crazy uncle at Thanksgiving involves confirmation bias, a similar topic discussed in the social dilemma. You must find a way to separate identity from the topic being debunked.
LDAP Indexes – Stuff I'm Up To
B G P S T U F F . N E T
How to Reduce Windows.edb Huge File Size? | Windows OS Hub
Bill Gates Answers: "Why Should We Hire You?"
The Tech Informative Side Chat on HPE Integrated Lights-Out (HPE iLO) - The Tech Journal
Making Turkish Delight
parchment
Documentary Area - Simply the best Documentaries
The Difficulties of Tracking Running Processes on Linux :: Tech Notes by Natan Yellin
HP H240 (SAS3 HBA) 30 GBP from EU seller / 34 USD from US seller | ServeTheHome Forums
1. Download the offline SSA iso https://support.hpe.com/hpsc/swd/public/detail?swItemId=MTX_321a88714bff4279abf175b9bd 2. Boot from the ISO in SSA CLI mode 3. Get the serial numbers and copy the serial numbers ctrl all show 4. Set to HBA mode ctrl serialnumber=SERIAL modify clearconfigdata ctrl serialnumber=SERIAL modify clearnvram ctrl serialnumber=SERIAL modify bootvolume=clearprimary ctrl serialnumber=SERIAL modify bootvolume=clearsecondary ctrl serialnumber=SERIAL modify raidmode=off
Linux vulnerabilities: How unpatched servers lead to persistent backdoors - Security Boulevard
Infographic: The CIS Top 20 Controls Explained
DDLC - Detection Development Life Cycle - Security Boulevard
Can We Have “Detection as Code”? - Security Boulevard
Focus on Fixing, Not Just Finding, Vulnerabilities - Security Boulevard
6 MongoDB GUIs that Shine - LinuxLinks
Smokeping notes | Nelson's log
Oracle Database Appliance vs Oracle Cloud Infrastructure - Blog dbi services
What is the HIPAA Security Rule
Advanced Active Directory attacks: Simulating domain controller behavior - ManageEngine Blog
A Low Effort Guide to Keeping Tabs on Your Security Posture | Balbix
NERC Publishes Practice Guide for Assessing SVCHOST.EXE
Prune the Sprawl. Get Better AppSec. - Security Boulevard
What will CMMC compliance cost my business? - PreVeil
Tyler Technologies’ Clients Urged to Reset Remote Network Passwords after Ransomware Attack - Security Boulevard
Five worthy reads: The evolving employee experience - ManageEngine Blog
Cybersecurity Maturity Model Certification (CMMC) In-Depth - Security Boulevard
The Top 5 Needs of DAST Testing
Black Box Testing: What You Need to Know - Security Boulevard
The Best Way to Manage SSH Keys | Keyfactor - Security Boulevard
Are you listening to your logs? Part 4: Open ports - ManageEngine Blog
8 of the world's biggest insider threat security incidents
The Importance of Listening - Security Boulevard
Top 5 takeaways from the latest Kubernetes security report - Security Boulevard
1) 83% of organizations have a DevSecOps initiative 2) 29% of respondents consider the Security team to be responsible for Kubernetes security, followed by DevOps at 23% 3) 90% of respondents have experienced a security incident in Kubernetes environments 4) AWS Outposts, Microsoft Azure Arc, and Red Hat OpenShift are neck and neck for hybrid deployments 5) Nearly half of organizations have delayed deploying apps into production due to security concerns
Ransomware Cripples UHS Hospitals Across the Nation - Security Boulevard
WTTR.in | Weather Forecast in the Terminal – CubicleNate's Techpad
Lessons From Teaching Cybersecurity: Back to School Week 1
3 Years Later: The Equifax Breach - Security Boulevard
Networking fundamentals (for Network security professionals) - Security Boulevard
Storage Management Best Practices: Part 2 - Expand Storage with Ease - Security Boulevard
What the Building In Security Maturity Model (BSIMM) Says About the Role of SAST and SCA - Security Boulevard
Higher Education and CMMC: Seven top of mind questions.
1. Will fundamental research be exempted from CMMC? 2. Does my entire institution need to be CMMC certified? 3. How will primes flow down their CMMC level requirements to their subcontractors? 4. Who will pay for the costs to comply with CMMC? 5. When will university-based labs and other research facilities conducting DoD-sponsored research need to be CMMC certified? 6. How can university-based labs and other research facilities subject to CMMC mandates communicate across boundaries to non-CMMC certified labs, enclaves, campus services, etc? 7. How can I find answers to additional questions?
What is a Cyber Risk Assessment? | Axio
McSweeney: Soheil Rezayazdi And His Marvelously Nihilistic Password Security Questions - Security Boulevard
What is the name of your least favorite child? In what year did you abandon your dreams? What is the maiden name of your father’s mistress? At what age did your childhood pet run away? What was the name of your favorite unpaid internship? In what city did you first experience ennui? What is your ex-wife’s newest last name? What sports team do you fetishize to avoid meaningful discussion with others? What is the name of your favorite canceled TV show? What was the middle name of your first rebound? On what street did you lose your childlike sense of wonder? When did you stop trying?
Cybersecurity best practices: An open letter to end users - TechRepublic
When in doubt, don't do it. Such generalities could leaving you staring blankly at your monitor and unable to function, so here are specific security best practices. Don't click suspicious links. If you don't know if a link is suspicious, ask. Don't install any software on your PC or phone unless it comes from the operating system's built-in software store. Don't install browser add-ons unless they are sanctioned by your company. Don't visit websites that seem dodgy. What is a dodgy website? Products advertised on social media, sites that advertise products or services that sound too good to be true, sites that want to install applications on your computer, or any domain found on a list like the Fake Sites Database. If you absolutely must visit a dodgy site (say you're doing research for your marketing department and want to know why a product is listed as must have), do it on a tablet that can easily be reset to factory default and doesn't contain company data. Update your passwords with really strong ones that you can't memorize. I know that's a pain, but there's a solution: Ask your IT staff about how to use a password manager. Don't open email attachments that haven't been checked by your antivirus. Don't open text messages from unknown senders.
9 data security trends IT departments should expect in 2021 - TechRepublic
1. Remote work is the top concern. 2. Data breaches are four times more common for companies that allow access to company data. 3. Data classification alone is not sufficient. 4. Phishing schemes are spiking and becoming more harmful. 5. A third of employees hit by account takeovers. 6. Improved authentication methods. 7. Ransomware affected 28% of businesses. 8. VR/AR use nearly triples. 9. 86% of organizations are more concerned about data privacy.
Building Resilient IT Systems: Why Federal and Enterprise Leaders Should Consider NSTAC Recommendations - Blog | Tenable®
Deploying Your Industrial Cybersecurity: 4 Tips For Success - Blog | Tenable®
‘OT Anywhere’: Gain remote visibility into your OT infrastructure Achieve a single view of all your IT and OT vulnerability data Streamline your traditional OT security deployments The freedom to choose
A Day in the Life of a Business-Aligned Cybersecurity Leader - Blog | Tenable®
The SANS paper details the following as being among the most important responsibilities carried out by most CISOs: Act as the organization's representative with respect to inquiries from customers, partners, and the general public regarding the organization's security strategy. Act as the organization's representative when dealing with law enforcement agencies while pursuing the sources of network attacks and information theft by employees. Balance security needs with the organization's strategic business plan, identify risk factors, and determine solutions to both. Develop security policies and procedures that provide adequate business application protection without interfering with core business requirements. Plan and test responses to security breaches, including the possibility for discussion of the event with customers, partners, or the general public. Oversee the selection testing, deployment, and maintenance of security hardware and software products as well as outsourced arrangements. Oversee a staff of employees responsible for organization's security, ranging from network technicians managing firewall devices to security guards.
Writing Security Advisories: 5 Best Practices For Vendors - Blog | Tenable®
1. Disclose specific vulnerability details 2. Identify affected versions and devices 3. Clearly explain the remediation options 4. Format your information for both humans and machines 5. Improve accessibility with a centrally indexed dataset
Threat hunting (IV): hunting without leaving home. Jupyter Notebooks - Security Art Work
An Uncommon 20 Years of Commonly Enumerating Vulns
16 Reasons to use Third Party Cloud Security and not Salesforce Shield - Security Boulevard
1. With Shield, you are fully responsible for backing up data and tenant secrets. 2. Existing data is not automatically encrypted when you activate Shield. 3. Salesforce Customer Support may see protected data in plaintext if granted login access. 4. Some custom fields can’t be encrypted by Shield. 5. Shield can’t encrypt standard fields if portals are activate. 6. Shield can’t identify duplicate accounts and contacts when they’re encrypted. 7. Bounce processing doesn’t work if you encrypt the standard email field. 8. Campaign member search isn’t supported when you search by encrypted fields. 9. Reports charts and dashboard components that display encrypted field values might be cached unencrypted. 10. Shield’s self-service background encryption doesn’t support description fields, long and rich text area fields, and other data elements such as files and attachments. 11. Self-service background encryption can encrypt data once every seven days. 12. Encryption doesn’t run while statistics are being gathered. 13. Encrypted fields can’t be used in criteria-based sharing rules, external lookup relationships, or filter criteria for management tools. 14. Web-to-case is supported, but the Web Company, Web Email, Web Name, and Web Phone fields are not encrypted at rest. 15. Deterministic encryption isn’t available for custom data, date/time, long text area, rich text area, or description field types. 16. With SecurDPS from comforte, you don’t have to worry about any of the above.
Top 5 Cybersecurity Frameworks to Secure Your Organization | Axio
NIST CSF CIS 20 ISO/IEC 27001 C2M2 CMMC
How to Automate a Ransomware Response in 5 Steps - Siemplify
What's New in Security, Part 2 - The Akamai Blog
What's New in Web Security - The Akamai Blog
Automate Reporting Across Directory Endpoints - JumpCloud
7 Reasons to Schedule Your Next Penetration Test | Digital Defense, Inc.
1. Achieve Compliance from Regulators and/or Auditors with Penetration Testing 2. It’s a Security Best Practice to Pen Test after System Changes 3. Determine if Potential Vulnerabilities are Exploitable 4. Give Your Customers Security Assurance 5. Test Your Incident Response Preparedness 6. Demonstrate Security Posture to Key Stakeholders 7. Avoid the Cost of a Breach or Ransomware Attack
‘Inconvenient’ Cybersecurity Policies Put Healthcare Organizations at Risk - Security Boulevard
Understanding the Shared Responsibility Model | Radware Blog
Seven Active Directory Security Tips from The Experts | Enzoic
1. Meeting NIST Guidelines: Following Industry Best Practices 2. Hardening Passwords Part 1: Reducing Complexity and Eliminating Periodic Password Reset 3. Hardening Passwords Part 2: Using a Blacklist, and Why Static Isn’t Good Enough 4. MFA: Using it Effectively, When you can, Where you can 5. Have Two Accounts: Divide and Conquer 6. Disabling Local Accounts: Where Less Is More 7. Monitoring Your System: Knowing What is Normal
Personal and Medical Information of Children and Adults Stolen in DHS Data Breach - Security Boulevard
Why is Threat Detection Hard? - Security Boulevard
The Content Value Hierarchy (CVH) | Daniel Miessler
Orbital edge computing: nano satellite constellations as a new class of computer system | the morning paper
Color Table Series Part 3 : The Colortab package – texblog
Control the width of table columns (tabular) in LaTeX – texblog
Ryuk’s Return – The DFIR Report
Image processing in Java
U.S. GAO - Data Security: Recent K-12 Data Breaches Show That Students Are Vulnerable to Harm
Don't Become A Developer, But Use Their Tools - Packet Pushers
A first look at Tanzu Basic (part 1): introduction | viktorious.nl – Virtualization & Cloud Management
Questions for Job Hunters | Diary of a Network Geek
How many users? And how are they distributed at multiple locations? (IE. How many end users in what city and state?) How many people are going to be hired, ultimately, to be in the IT Department? (I generally think one support person per seventy-five or fifty end users is a good ratio, if I can swing it. I always seem to support more than that, but it’s a goal!) What servers are they running? What do they all do? Where do those servers reside? (ie. On-prem or offsite data center or cloud) Are they ALL virtual? On what? If VMware, what version? What OS are the virtual machines running? What kind of physical host or hosts are the virtual machines on? Is it a cluster? Is there shared storage (ie a SAN)? If there is more than one site, how are the sites connected? How is email being handled now? On-prem Exchange? Hosted? Office 365? What is the IT budget currently? How do they expect to see that expand? Where is the main business headquarters? What’s the commute if I’m coming from [part of town where I live]? How have they handled COVID-19? What problem am I being hired to fix? Why are they looking for someone? What does the compensation look like? What are the benefits? Is there a 401k and how much matching is there? What does the health insurance look like? Is there a bonus structure and how is that determined? How often are performance reviews done and what does that process look like?
The Fundamentals of Zero-Trust Security for Schools | EdTech Magazine
DEF CON Safe Mode AppSec Village - Mario Areias - Threat Modelling the Death Star - YouTube
Vulnerability Management Maturity Model Part II | Jonathan Risto | SANS Institute
40 Useful Examples of Linux PS Command for Aspiring SysAdmins
Linux permissions: SUID, SGID, and sticky bit | Enable Sysadmin
CS50x - Introduction to the intellectual enterprises of computer science and the art of programming.
IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle ThemSecurity Affairs
Categorization of System Vulnerabilities Inexperienced users: the greatest vulnerability The Flaws in Manufacturing Process Irregular Updates Shadow IoT Devices
Wherever You Do Business, CMMC is Coming | Pivot Point Security
How to Use PowerShell to Reboot Remote Computers
BleedingTooth Linux Exploit Can Lead to Remote Code Execution Within Bluetooth Range | HotHardware
BleedingTooth
Introducing the Open Governance Network Model - The Linux Foundation
iTWire - Dark web sec firm lists more than 800 ransomware attacks in last 12 months
bpytop might be the freaking-coolest way to monitor your Linux system | GamingOnLinux
Using the RVTools import feature in the VMC Sizer – Patrick Kremer
Microsoft closes vulnerability CVE-2020-17022 in HEVC codec library (10/15/2020) | Born's Tech and Windows World
CVE-2020-17022
Healthcare organizations growing more concerned about insider threats
Windows “Ping of Death” bug revealed – patch now! – Naked Security
Building an Information Security Program Post-Breach Part III | Joe Sullivan | SANS Institute
The G7 expresses its concern over ransomware attacksSecurity Affairs
Windows Incident Response: Settings That Impact The Windows OS
Windows Incident Response: #OSDFCON
The Ruthless Cyber Chaos of Business Recovery
Cyber insurance: A guide for businesses - IT Governance UK Blog
Azure Security Benchmark v2: What you need to know | CSO Online
Building a Ransomware Incident Response Plan - HealthcareInfoSecurity
A case for moving to an 'agile operating model'
France’s Health Data Hub to move to European cloud infrastructure to avoid EU-US data transfers | TechCrunch
VMware ESXi 7 No Coredump Target Has Been Configured.
Best Free and Open Source Linux Partitioning Tools - LinuxLinks
Software AG Continues Efforts Against $20M ...
Upgrade to Oracle 19c - performance issue - Blog dbi services
Senator Demands Answers on Universal Health Services Outage
AlienVault: End user Devices Integration-Lab Setup (Part 2)
SIEM Lab Setup: AlienVault
Health Data Breaches in 2020: Ransomware Incidents Dominate
Java: Check Version, Update or Uninstall Using PowerShell | Windows OS Hub
Product Management: Why internal product feedback matters – The curious Kabri
DRBD and LVM – Stuff I'm Up To
Nginx SSL Certificate Error – Stuff I'm Up To
Ansible, Windows and PowerShell: the Basics – Part 14, Registry Entries – Jonathan Medd's Blog
Ansible, Windows and PowerShell: the Basics – Part 15, Install Chocolatey Packages – Jonathan Medd's Blog
Getting Started with PowerShell 7 – Ebook Available – Jonathan Medd's Blog
AZ-400 Azure DevOps Exam Experience – Jonathan Medd's Blog
Top Ten Things That Should Be In Your Dot Files - Low End Box
IT That Should Just Work: vCenter 6.7 Resizing Disk Fails Invalid Operation for Device 0
Cruise provider Carnival confirms ransomware attack with data exfiltration | Born's Tech and Windows World
Running Falco and k3s at the edge with 64-bit ARM
Sales Tax Jurisdictions by State, 2020 | Tax Foundation
Ultra low cost webcam studio | Daniel Pocock’s personal blog
Oracle Database 12.1.0.2 certified on Oracle Linux 8 and RHEL8
Image Deduplicator - find duplicate images - LinuxLinks
Introducing VMware Cloud Disaster Recovery (VCDR) - CormacHogan.com
How To Harden a backup repository on Windows | ESX Virtualization
We might do a post on the same, but for Linux in the future. Tip 1 – Do not join in Microsoft Domain – In any case, do not join your Windows backup server to Microsoft AD. Just leave the server completely as a side system. Keep the default Workgroup or change to something else. Also, you should perhaps name the server with a generic name instead of “BackupSRV01” or something like this. Use a completely generic name that hackers won’t guess that this is the backup server. Tip 2 – Use Simple Approach – Use simple design and close all network ports via the internal firewall, except those needed for your backup software. Remove all unneeded components from the Windows server, such as web browsers, java, adobe reader and this kind of stuff. Maintain the server as usual with all Windows security patches and protect it with AV/Malware software. Tip 3 – Roles and Users – use the principle of least privilege. Give the minimal privilege needed for some operation to occur. You should make sure that all accounts do have a specific role and they are added to a specific group. If your organization has several backup admins, give each one specific account and put them in a group. Only give access to what is needed for the backup management or backup job. Limit users who can use Remote Desktop Protocol (RDP) and if possible, set-up a 2-factor authentication. Tip 4 – Set permissions on the repository folder – you should grant access on this directory only to the users of the backup software. After you add the user administrative account on the security tab of the disk(s) where backups will be stored, you can open the advanced security settings and change the owner. Tip 5 Disable remote RDP service – Quite often, the server hosting the backup is physical machine. It is an extra security layer that nobody can connect remotely to this server and that the physical location of this machine is protected. You should use physical access only or a KVM-over-IP switch to access this machine when located in remote datacenter. Tip 6 Clean Install of backup server stored as Image – even backup server should have backup of itself. After installing and configuring this backup server, install the backup software and configure the hardening options as listed above. Then use an image level backup software type Acronis, Ghost etc, and do a clean image backup of the system partition. Like this, if this machine gets corrupted and unbootable, you can restore the system partition with hope that the data disks (which should be separate volume) are fine.
5 Steps to Harden vSphere Security: Cybersecurity Awareness Month - YouTube
My Golden Image build using HashiCorp Packer – Retouw.nl
Web of Trust, Part 1: Concept - Fedora Magazine
Datalore by JetBrains: Online Jupyter Notebooks Editor With PyCharm’s Code Insight – PyCharm Blog | JetBrains
Excellent Free Tutorials to Learn Factor - LinuxLinks
Extracting Linux System and Hardware Info Using Python | FOSS Linux
Using eBPF Monitoring to Know What to Measure and Why - Container Journal
11 Best Free and Open Source Linux System Profilers - LinuxLinks
Combine Two JSON Files With PowerShell – Jonathan Medd's Blog
Threat hunting (IV): hunting without leaving home. Grafiki - Security Art Work
Ubiquiti Security Gateway failures | Nelson's log
Five Cloud Security Considerations for CISOs - Security Boulevard
01. Web and Email Are the Most Common Entry Points for Breaches. 02. SSL Is a Major Threat. 03. Enterprise Apps Need to Be Protected from Untrusted Devices. 04. SaaS is the New Trojan Horse. 05. Limited Visibility Is a Security Killer.
CMMC: The New Cybersecurity Standard for Defense Contractors - Security Boulevard
Most Workers Not Interested in Switching to a Cybersecurity Role
43% of Global Employees Are Not Sure What a Phishing Attack Is - Security Boulevard
Tyler Technologies finally paid the ransom to receive the decryption keySecurity Affairs
Windows 10 2009 (20H2): The Biggest Features Explained
Create an Ansible module for integrating your Google Calendar | Opensource.com
Encrypt Cloud Storage With Open Source Cryptomator
Cryptomator
Oracle Linux 7 Update 9 Released with Kernel 5.4 and More
11 Best Free and Open Source Linux Debuggers - LinuxLinks
JWT Heartbreaker offers remedy for weak JSON web tokens | The Daily Swig
iTWire - Germany's Software AG hit by Windows Clop ransomware
The Maw of Chaos - why time forecasting is so challenging?
jmtd → log → Type design
Manage your Business with a Complete Software Solution - LinuxLinks
How do you access the Dark Web Safely After Following The Simple Tips
How to Install Nessus on Kali Linux step by step Tutorial for Beginners
vPrioritizer - Tool To Understand The Contextualized Risk (vPRisk) On Asset-Vulnerability Relationship Level Across The Organization
Goals and Philosophy To overcome above challenges, vPrioritizer is designed with primary objectives as below: Centralized - must serve as single-pane-of-glass for vulnerability management Automated - any and every task which can be automated, must be automated Community Analytics - utilization of community analytics to mature the prioritization algorithm over the period of time
C41N - An Automated Rogue Access Point Setup Tool
How to Manage Your VMware vSphere Environment with PowerShell | ESX Virtualization
Using Ansible To Create DNS Certificates And Install Them On F5 Big IP Loadbalancers | Greg Sowell Saves The World
Using Ansible to interact with web endpoints | Enable Sysadmin
PXE Install Ubuntu 16.04. Using PXE Linux to install Ubuntu 16.04 Server
GitHub - philhagen/sof-elk: Configuration files for the SOF-ELK VM, used in SANS FOR572
Essentialism: The mindful pursuit of quality
McKeown's philosophy comprises three steps. 1. Explore and evaluate. An essentialist, he says, exposes herself to new ideas. She's curious. She explores the world and everything it has to offer. As she does, she evaluates the objects and opportunities that come her way, trying to identify those that are most aligned with her goals. 2. Eliminate. It's not enough to explore and evaluate, though. An essentialist also has to learn to say no. As he explores and evaluates, he has to reject anything that distracts him from his purpose. “It's not enough to simply determine which activities and efforts don't make the highest possible contribution,” McKeown says. “You sill have to actively eliminate those that do not.” This step is tough for me. 3. Execute. Finally, an essentialist must take action. He needs to develop a plan and follow through with it. From the book: “This is not a process you undertake once a year, once a month, or even once a week…It is a discipline you apply each every time you are faced with a decision.”
Building an Air Quality Sensor – Scott Gruby's Blog
Ten things you should know about Azure AD Administrative Units - The things that are better left unspoken
Introducing the Privileged Identity Management Tools PowerShell module (PIMTools) | Jan Egil Ring powershell.no
5 Lessons About Software Security for Cybersecurity Awareness Month - Security Boulevard
1. Lack of developer participation in and engagement with security training is a problem. 2. It???s nearly impossible to have effective AppSec without integrating into developer workflows. 3. Open source code is pervasive, vulnerable, and typically not checked for security. 4. You could be pulling in more open source code than you think. 5. The majority of open source flaws are pulled into the code indirectly.
Video Conference Equipment Breakdown | The ORACLE-BASE Blog
Build a resilient cybersecurity framework by transforming your IT team into a security team - ManageEngine Blog
Must-Read: The 10 Best Cybersecurity Books You Need to Know About
Mary Aiken’s ‘The Cyber Effect’ Christopher Hadnagy’s ‘Social Engineering’ Kevin Mitnick and His ‘Ghost In The Wires’ Sandworm by Andy Greenberg Kim Zetter’s ‘Countdown to Zero Day’ ‘Hack-Proof Your Life Now! The New Cybersecurity Rules’ Augenbaum’s ‘The Secret to Cybersecurity’ ‘Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World’ Brian Craig and His ‘Cyberlaw: The Law of the Internet and Information Technology’ Buchanan’s ‘The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations’
Small Businesses and Consumers Grossly Underestimate Danger of Cyberattacks - Security Boulevard
Java Ransomware (Literally): Not Even Your Coffee Maker Is Safe - Security Boulevard
VMware vSphere 7.0 Update 1 is now GA, here's how to download it any which way! | TinkerTry IT @ Home
Setup an NGINX Ingress Controller on Kubernetes - Blog dbi services
Upgrades : You have to do them. When are you going to learn? (TLSv1.2) | The ORACLE-BASE Blog
Building an Information Security Program Post-Breach Part II | Joe Sullivan | SANS Institute
10 Years Since Stuxnet: Is Your Operational ...
Inside Job: Former Worker Allegedly Holds Records for Ransom
Disagree Agreeably
I don't think I've ever heard the words "disagree agreeably" put together like that, but I instantly knew what he meant. It seems to me that the world would be a more pleasant and productive place all around if more of us would commit to disagreeing agreeably, instead of tending towards assuming the worst, over-reacting, and flaming each other when working through contentious issues.
Best Crustless Apple Pies Recipe - How to Make Crustless Apple Pies
Best Bloomin' Apples Recipe - How to Make Bloomin' Apples
Best Gluten-Free Pumpkin Bars Recipe-How To Make Gluten-Free Pumpkin Bars—Delish.com
Business continuity: things to consider - Security Art Work
Guidelines for putting together a good report - Security Art Work
Cloud: building from security - Security Art Work
Threat hunting (III): hunting without leaving home. Kibana - Security Art Work
Threat hunting (II): hunting without leaving home - Security Art Work
What happened, Tiki-Wiki? XSS vulnerabilities, no thanks - Security Art Work
Threat hunting (I): hunting without leaving home - Security Art Work
Protect your network with open source tools | Opensource.com
The Beginner Guide to Regular Expressions
Essential components of a Linux-based air-gapped network | Enable Sysadmin
AnsibleFest highlights Ansible momentum as IT automation becomes an enterprise imperative
OpenWrt and SELinux [LWN.net]
US House Passes IoT Cybersecurity Improvement ActSecurity Affairs
FERC, NERC joint report on cyber incident response at electric utilitiesSecurity Affairs
New to Chatbots? Understand Your Security Risk - Blog | Tenable®
5 Steps for Becoming a Business-Aligned Cybersecurity Leader
Step 1: Make sure you understand your organization's business objectives for the year. Step 2: Consider how those business objectives shape technology decisions. Step 3: Work with business stakeholders to ensure your cybersecurity metrics incorporate business context. Step 4: Prioritize your cybersecurity processes based on the learnings you've gained from the above steps. Step 5: Communicate using benchmarks that make sense to your business stakeholders.
Multiple Vulnerabilities in CodeMeter Leave Managed Industrial Control Systems Open to Attack - Blog | Tenable®
US Cybersecurity Agency CISA Alert: Foreign Threat Actors Continue to Target Unpatched Vulnerabilities - Blog | Tenable®
CVE Product CVSSv3 Tenable VPR* Disclosed CVE-2019-11510 Pulse Connect Secure 10.0 10 Apr 2019 CVE-2019-11539 Pulse Connect Secure 7.2 9.6 Apr 2019 CVE-2019-19781 Citrix Application Delivery Controller and Gateway 9.8 9.9 Dec 2019 CVE-2020-0688 Microsoft Exchange Server 8.8 9.8 Feb 2020 CVE-2020-5902 F5 BIG-IP 9.8 9.9 Jul 2020
Communicating Business Risk: Why Existing Cybersecurity Metrics Fall Short
Application-level Purple Teaming: A case study
False Confidence is the Opposite of Cyber Resilience | Webroot
Introducing LDAP C2 for C3
Universal Health Services (UHS) hospitals hit by Ryuk ransomware attackSecurity Affairs
Cyber Resilience for Business Continuity | Webroot
4 Ways MSPs Can Fine-Tune Their Cybersecurity Go-To-Market Strategy | Webroot
1. Build an Offering That Aligns with Your Customer’s Level of Cyber Resilience 2. Leverage Multi-Layered Security 3. Determine the Right Pricing Model 4. Rethink How You Engage Prospects
University Hospital New Jersey paid a $670K ransomSecurity Affairs
IoTMap - Research Project On Heterogeneous IoT Protocols Modelling
Why master YARA: from routine to extreme threat hunting cases. Follow-up | Securelist
VulnDB - Vulnerability Intelligence
How to Attack Web Applications with Burp Suite & SQL Injection « Null Byte :: WonderHowTo
NBlog - the NoticeBored/SecAware blog: NBlog Sept 24 - status of ISO27001 Annex A
NBlog - the NoticeBored/SecAware blog: NBlog Sept 27 - 2021 infosec budget
The Mysterious Case of the Missing 250-Ton Chinese Power Transformer
Frp - A Fast Reverse Proxy To Help You Expose A Local Server Behind A NAT Or Firewall To The Internet
File Integrity Monitoring (FIM): Your Friendly Network Detective Control
Roger Severino, Lead HIPAA Enforcer, on Fighting Hackers
How to perform a CNI Live Migration from Flannel+Calico to Cilium — Cilium
Which database version can be used with Grid Infrastructure 19c?
Understanding operational 5G: a first measurement study on its coverage, performance and energy consumption | the morning paper
Best Thanksgiving Egg Roll Recipe - How to Make Thanksgiving Egg Rolls
2020 Vulnerability Fujiwhara: The Writing on the Wall – RBS
Remote Audits: Continuous Compliance in WFH - Security Boulevard
White Paper – The Skill Set Technologists Need to Implement a Privacy Risk Management Framework
Kube-Score - Kubernetes Object Analysis With Recommendations For Improved Reliability And Security
Network Boot To The Rescue | Showmax Engineering
SystemRescue - PXE network booting
Nextcloud 20: One private cloud to rule them all | ZDNet
Build multi-architecture container images using argo workflow
The 50 Best Programming Blogs and Websites To Follow in 2020
20 Years of FreeBSD Foundation: Interview With Deb Goodkin, Executive Director
Windows 10: Disable Bing in the search | Born's Tech and Windows World
Consensus is Harder Than It Looks - Marc's Blog
8 Simple Study Tips to Help You Learn More Efficiently – Education
SCREEN_KILLER - Tool To Track Progress For Reporting (Capture Screenshot, Commands And Outputs) During Pentest Engagement And OSCP
Your cyber security risk mitigation checklist - IT Governance UK Blog
Install firewalls Install antivirus software Patch management Conduct a cyber security risk assessment Create an information security policy Encrypt sensitive data Create a remote working policy Conduct vulnerability scans Conduct penetration tests Create a business continuity plan
7 overlooked cybersecurity costs that could bust your budget | CSO Online
1. Staff acquisition and retention 2. Cloud spend 3. Third-party advice and analysis 4. Incident response 5. Replacement cost 6. Cybersecurity training 7. Cyber insurance
Building an Information Security Program Post-Breach | Joe Sullivan | SANS Institute
Better, Faster AND Less Expensive Vendor Risk Assessments: Here’s How It Works | Pivot Point Security
Up Your AppSec Game | OWASP Top 10 Versus the OWASP ASVS—When to Use Which? | Pivot Point Security
the OWASP Top 10 is intended to be simply an awareness document to help you avoid coding the most blatant and dangerous vulnerabilities into your applications The OWASP ASVS, on the other hand, is intended to be a definitive reference standard for secure web application development. It offers five levels of increasing security, and is built with modern coding and testing practices in mind.
Money Talks | The Economics for CMMC Compliant Email and File Sharing | Pivot Point Security
FTP Is Almost 50 Years Old—and It’s Ready to Retire
OpenWISP: Open Source Network Management System
NERVE - Network Exploitation, Reconnaissance & Vulnerability Engine
OFFPORT_KILLER - This Tool Aims At Automating The Identification Of Potential Service Running Behind Ports Identified Manually Either Through Manual Scan Or Services Running Locally
Home Made Pear Jam cooking Jonathans Blog
GDPR Article 32: Your guide to the requirements - IT Governance UK Blog
Will hospitals wake up to the threat of cyber crime after patient dies during a ransomware attack? - IT Governance UK Blog
Healthcare sector to receive £500k cyber security funding boost - IT Governance UK Blog
Chris's Wiki :: blog/unix/V7DeviceNumbersHow
Warner's Random Hacking Blog: Old-school Disk Partitioning
Chris's Wiki :: blog/tech/SSDsRAIDWearWorry
How pre-DevOps Ops teams became cynical assholes - SysAdmin1138 Expounds
If it's your job to clean up after other people's messes, you get cynical.
5 Nmap Timing Templates you should know
Ransomware Groups Add a Third Threat Vector: DDoS | Daniel Miessler
Operation Fortify: A US Ransomware Plan | Daniel Miessler
Elite security intelligence at zero cost - use Recorded Future Express… for FREE! • Graham Cluley
VULS- An Agentless Vulnerability Scanner
Universal Health Services Network Outage: Lessons to Learn
Anthem Hit With $48 Million in Additional Breach Penalties
Microsoft: Hacking Groups Shift to New Targets
What to expect on revised standard contractual clauses
Anthem to pay $39.5M in settlement over 2015 data breach
IAPP Keynote: Defending Democracy | LinkedIn
List of data breaches and cyber attacks in September 2020 – 267 million records breached - IT Governance UK Blog
Nanonote 1.3.0 released | agateau.com
Docker Volumes, Mounting, and More – Linux Hint
How to Check Linux Memory Usage – Linux Hint
free -w
Tmux Is Still Bloat: Use DVTM For Terminal Multiplexing - YouTube
How Secure Are YOUR Passwords?
Episode #284 Modern and fast APIs with FastAPI - [Talk Python To Me Podcast]
What is a Package Manager in Linux?
What it takes to be a transformational CISO | CSO Online
How To Install and Configure Ansible on Debian 10 – TecAdmin
FSF at 35 -- join us in celebrating the incredible community — Free Software Foundation — working together for free software
'Father of Identity Theft' Sentenced to 207 Months
Four steps to securing sensitive data in the cloud
1. Revisit Policies to Understand Who is Responsible for Privacy and Security 2. Establish the Path for a Safe Data Pipeline 3. Deploy Dynamic, Comprehensive Privacy Controls 4. Create Protected Data Domains
A practical guide to cloud migration
Guided Learning - Wahl Network
Passed AZ-303 and AZ-304 Microsoft Certified Azure Solutions Architect - Thomas Maurer
Docker IP Address Error – Stuff I'm Up To
Stacer - Linux System Optimizer & Monitoring Tool
Tracking time with Timewarrior at the command line | Enable Sysadmin
Docker Compose for Local WordPress Development – Lev Lazinskiy
Why Does Eric Raymond Think Windows Will Lose Desktop War To Linux?
Cybersecurity Canon | Cybersecurity & Digital Trust
9 Tips to Prepare for the Future of Cloud & Network ...
The Risk of SaaS Defaults For SaaS, Maintenance Is Key Market for IaaS Security Continues Growth Why Network Security's Future Is in the Cloud SD-WAN Adoption Grows Alongside Cloud Uptake Rethinking SOCs for the Cloud Tech Tips for Stocking the SOC Do You Need A SIEM? Exploring Options
4 Critical Things to Look for in Your Company's 401(k) Plan | The Motley Fool
How To Get Into Cars: Hypermiling Mods | Hackaday
Adversarial Interoperability | Electronic Frontier Foundation
Cyber Pearl Harbor Is Happening Right Now—It's Ransomware | Daniel Miessler
71% Of Healthcare Medical Apps Have A Serious Vulnerability; 91% Fail Crypto Tests
5 top vulnerability management tools and how they help prioritize threats | CSO Online
Packet Analysis Using Wireshark - YouTube
Certified Kubernetes Administrator Study Guide - Wahl Network
QEMU Virgil - Virtualization, acceleration, celebration
Cyber Pirates Hit Global Shipping Industry Nearing Peak Season - Bloomberg
Compare Multiple Videos/Images on Linux with This New GTK App - OMG! Ubuntu!
Oracle Certified Master's - Blogs: Proxy User in Oracle Database
305 CVEs and Counting: Bug-Hunting Stories From a Security Engineer | Threatpost
Powershell – Get Active Directory objects inactive for X days | geekdudes
Kubernetes componentsElectric Monk | Electric Monk
Terence Luk: Export a certificate that does not allow the private key to be exported from a Windows Server
Chris's Wiki :: blog/tech/HDAndSSDLifetimeThought
Some grumpy sysadmins will also consider it a feature that if you put a system in a closet and leave it there for five or ten years, it will probably die instead of hanging around as an ancient zombie full of outdated things. The downside of this is for 'industrial' computers that are embedded into larger systems (including in things like hospital machinery, which are infamous for still running their embedded computers with long-obsolete operating systems). Perhaps the hardware vendors will just vastly over-provision the SSDs and then hope for the best.
How To Set Up a Firewall with Awall on Alpine Linux - nixCraft
Secure Controls Framework | Cybersecurity & Privacy Controls
A Little Nut Magic | Cool Tools
Blind hole – A hole that doesn’t penetrate the material all the way through. As opposed to a through hole which does go through. Feel – The secret sauce of working the physical sciences. This is knowing things like how much force, pressure, tension, torque, etc. you can safely apply to a given object. This is largely a learned skill. WDITOT -“Why Didn’t I Think Of That.” Not to be confused with ID10T, which is another thing entirely. [via Steve Roberts] Welding boogers – Bad, ugly welds or a weld blob that has adhered someplace where you don’t want it.
Microsoft Patch Tuesday September 2020: Zerologon and other exploits, RCEs in SharePoint and Exchange | Alexander V. Leonov
Zer0CoolX · GitHub
Networking 101: Transport Layer Security (TLS) - High Performance Browser Networking (O'Reilly)
Offered Mid-Career Advice — EtherealMind
Presentation tools - anarcat
blog.harterrt.com – Intentional Documentation
6 ways to access documents from Microsoft Teams - SharePoint Maven
A billion files
Oracle ADB from a Jupyter Notebook - Blog dbi services
Is This Retirement Account the New 401(k)?
Turkish Vegan Recipe: How To Cook Mercimek Koftesi (Lentil Balls) - foXnoMad
How to formally file a complaint against DoD for CMMC Issues
The Cybersecurity War is Here, and Everyone is a Combatant
Linked: The Cybersecurity War is Here, and Everyone is a Combatant
“Can you generate new fingerprints and retinal scans when yours is stolen? How long will it take your child to recover from the bad credit history that a third-party created when the kid was still in diapers? How confident are you that during surgery, the medical records will accurately reflect known allergies and critical data? (like current use of blood thinners) How many days can a business afford to be inoperable following a cyber incident? Will you want to drive on a highway, going 70+ miles per hour, if all internet-connected vehicles were hacked in a coordinate attack?”
Get-GpoReport: How to Build Fancy GPO Reports with PowerShell
You Can’t Do Everything, And That’s Okay – Ethan Banks
You’re a responsible human–a reliable person who does everything that’s expected and more. Congratulations! Here’s more work to do.
How to Disable/Enable SMB v 1.0 in Windows 10/Server 2016? | Windows OS Hub
Get-WinEvent -LogName Microsoft-Windows-SMBServer/Audit
Considerations for the Structure of the Bureau of Cyber Statistics - Lawfare
Need to know technologies for junior sysadmins     | Enable Sysadmin
Active Directory Objects and the PowerShell Pipeline • The Lonely Administrator
Getting started with Exasol - Setting up an environment - Blog dbi services
All You Need To Know For Selenium Testing On The Cloud | Codementor
Encrypting Files with Ansible Vault - YouTube
A Linux sysadmin's introduction to cgroups | Enable Sysadmin
Heartbleed Still Found in the Wild: Did You Know That You May Be Vulnerable? | Linuxize
How to Flash multiple USB sticks on Linux
How To Identify Libraries that are Still Vulnerable to Attacks Aft
Sniffer Air Quality (AQI) Monitor using ESP32 + PMSA003 + BME680 - Bootloader Blog
Cyber attack with ransomware on US hospital operator UHS | Born's Tech and Windows World
5 Best DNS Servers (2020) - Free Public DNS For Speedy Connections
10 Best Free Lorem Ipsum Generators For Cool Placeholder Texts
How to Install Jellyfin Media Server on Debian 10 Buster - LinuxBabe
https://associates.shostack.org/A_PCI_Threat_Model_2020.pdf
Solving the Problem With Security Standards
"Don't deploy security controls  —  whether data security or others  —  unless you know what problem you are solving." - Anton Chuvakin
Shopify's Employee Data Theft Underscores Risk of ...
My Journey Toward SAP Security
How to deliver a GPU powered Azure VM (example for CAD applications) with Windows Virtual Desktop
What is Odoo? Odoo, More than an ERP Software - SpeedySense
Classic Preupgrade Tool and Change of Server – Databases Are Fun
10 Traits of a Great Company Culture
Can you quantify the damage done by bad patches? @ AskWoody
All you need to know before buying a Raspberry Pi 4 – Marksei
Soon Your Whole Life Will Be in Microsoft Teams, and That Might Not Be Good
Developer Creates DOS Subsystem for Linux (DSL)
Preventing insider threats: What to watch (and watch out) for | CSO Online
What is Zerologon? And why to patch this Windows Server flaw now | CSO Online
WannaCry Has IoT in Its Crosshairs
7 Non-Technical Skills Threat Analysts Should ...
It's All About Your Company's Brand Think Like the Bad Guys Develop Personal Interests Level Up Your Critical Thinking Skills Watch Out for Analysis Paralysis Build Relationships Within Your Organization Speak in the Language of the Business
Small business cyber security: the ultimate guide - IT Governance UK Blog
How small organisations can fast-track ISO 27001 implementation - IT Governance UK Blog
Wacker - A WPA3 Dictionary Cracker
Velociraptor IR – Medium
Velociraptor - Endpoint Visibility and Collection Tool
PwnXSS - Vulnerability XSS Scanner Exploit
Introducing “YAYA”, a New Threat Hunting Tool From EFF Threat Lab | Electronic Frontier Foundation
Ransomware “Officially” Kills a Person | flyingpenguin
Google Online Security Blog: Lockscreen and Authentication Improvements in Android 11
Fortune 1000 Technology Insights | HackerTarget.com
Threat Hunting: Velociraptor for Endpoint Monitoring (Part 2)
Digital Forensics: An Introduction (Part 2)
Digital Forensics: An Introduction
HHS Issues Yet Another Big HIPAA Breach-Related Fine
'Dark Overlord' Hacker Sentenced to 5-Year Prison Term
Virus vs. Worm: What’s the Difference?
Eli Lilly security finds strength in flexibility in WFH shift | CSO Online
LTO-9 Specs Reveal Compromise - IT Jungle
The Dollars And Sense Of Business Continuity - IT Jungle
Watch A Fast Sand Plotter Plow Patterns At Speed | Hackaday
Zen Rock Garden Table Uses Magnets And Sand | Hackaday
SandBot Happily And Tirelessly Rolls Patterns In Sand | Hackaday
Hard Disk Drives Have Made Precision Engineering Commonplace | Hackaday
Hard Drive Full? | PeteNetLive
12 Bare-Minimum Benchmarks for AppSec Initiatives
Hacking Yourself: Marie Moe and Pacemaker Security
Generating and Using SSH Keys, Part 3 - Low End Box
Troubleshooting SAML 2.0 - SAML 2.0 trace with sec diag tool | It's full of stars!
Chris's Wiki :: blog/sysadmin/RemoteRebootAllFine
Making the Case for Medical Device Cybersecurity
Sarah Katz
Zerologon Exploits are used in the wild, patching (Windows Server, Samba) recommended | Born's Tech and Windows World
Cloud Native or Cloud Nightmare? - Architecting IT
Don't Claim Social Security Benefits Until You Can Answer These 3 Questions
r spouse to decide how to maximize your combined Social Security income and, if you aren't certain what claiming strategy is best to do that, you may want to consider getting some professional financial advice. 
#PowerShell at #Microsoft #MSIgnite | >_
Employees say finding information is harder when working from home
Everyday Threat Modeling | Daniel Miessler
The Psychology of Fraud: I want to believe | Pindrop
Infosec Graduate Program - CERIAS - Purdue University
How to Disable Ads on the Roku Home Screen – Jason Pearce
Mirror, Mirror, On Your Cam, Show Us What You’ve Drawn By Hand | Hackaday
Ryan Holiday's 33 Favorite Pieces of Advice for Life  | Forge
"Constraints Create Creativity." - NevBlog
Qemu (KVM) and 9P (Virtfs) Mounts « etbe - Russell Coker
Kubernetes: The evolution of distributed systems - Red Hat Developer
Using bash’s shopt builtin to manage Linux shell behavior | Network World
How to backup CD-roms to ISO format on Linux
sudo dd if=/dev/sr0 of=file.iso
9 Best Free and Open Source Linux Hex Editors - LinuxLinks
okteta DHEX
7 things you can do with Ansible right now | Opensource.com
Bandwhich: Bandwidth Tracking So Simple Anyone Can Use It - YouTube
Cyphon: An Open-source Incident Tracking Management System for the Enterprise
How to Manage Remote Teams Effectively – Running Your Business
Adaptability: Your Most Essential Workplace Skill
Oracle MAA reference architecture and HA, DR, RTO, RPO - Blog dbi services
How and why I built a menu planning application: What's on the Menu? | Codementor
TDE from a Non-Security Guy – Databases Are Fun
Packer by HashiCorp : Second Steps? | The ORACLE-BASE Blog
Just one more esxi-guy: How to Create a Basic Docker Container
Just one more esxi-guy: How to Install and Use Docker
Security awareness training needs to be interesting to be effective
"The reality is that nobody is immune from attacks." says MediaPRO chief strategist Lisa Plaggemier. "It only takes one click, which can happen in the blink of an eye, before you even realize what you've done. Think of how quickly we all move through our email on busy days. Add to that the stress of COVID. Simply put, human beings are fallible. It’s critical that organizations provide engaging employee training that drives home just how much information is available about all of us."
Cyberwarfare could be an imminent threat to organizations
How COVID-19 could be the trigger for lasting innovation [Q&A]
Robot Framework with Selenium and Python: All You Need to Know | Codementor
U.S. GAO - Cybersecurity: Clarity of Leadership Urgently Needed to Fully Implement the National Strategy
Balancing Linux security with usability | Enable Sysadmin
How to use Ansible to update your Django web app - PythonAnywhere News
Build Smart on Kubernetes World Tour: Developers’ path to platform freedom – IBM Developer
Sysadmin tools: Creating network diagrams with diagrams.net | Enable Sysadmin
How to Keep Things Organized With TreeLine - Make Tech Easier
Hard links and soft links in Linux explained | Enable Sysadmin
5 questions to ask yourself when writing project documentation | Opensource.com
Renowned communication theorist Harold Lasswell wrote in his 1948 article, The Structure and Function of Communication in Society: [A] convenient way to describe an act of communication is to answer the following questions: Who Says what In which channel To whom With what effect?
linuxium.com.au: 'BootHole' implications for 'isorespin.sh'
Discovering Computer Legend Dennis Ritchie’s Lost Dissertation - IEEE Spectrum
Instant PostgreSQL Cloning with SUSE and Btrfs - Blog dbi services
Azure Database for PostgreSQL - Blog dbi services
Naan | The Splendid Table
Lisa Donovan's Chocolate Chess Pie | The Splendid Table
Watchman: monitoring dependency conflicts for Python library ecosystem | the morning paper
DIY Grout Cleaning Machine Does A Good Job | Hackaday
In Praise Of The DT830, The Phenomenal Instrument You Probably Don’t Recognise For What It Is | Hackaday
This Tax-Advantaged Account Is Changing in 2021. Here's What You Need to Know
Windows XP Source Code Allegedly Leaked Online As A Torrent File
How to migrate High Availability databases on an ODA? - Blog dbi services
Deploy HA-Proxy for vSphere with Tanzu - CormacHogan.com
Wheelhouse
Professional vSphere 7.0 VCP-DCV Exam Preparation | vLore Blog
How to synchronize the appliance registry metadata on an ODA? - Blog dbi services
Clint Boessen's Blog: Troubleshooting Account Lockouts in Active Directory
Chris's Wiki :: blog/python/VenvsAndSysPath
Windows Server: Zerologon vulnerability (CVE-2020-1472) allows domain hijacking | Born's Tech and Windows World
Generating and Using SSH Keys, Part 2 - Low End Box
Top Ten Ways to Save on VPS Hosting (and a Bonus Eleventh Way) - Low End Box
Dictionary: Firewall Rulette — EtherealMind
CMMC Process Maturity - DIB SCC CyberAssist
Response: Paradox: Covid crisis elevates technology professionals’ stature, but limits career growth | ZDNet — EtherealMind
4 Times a Roth IRA Is Better Than a 529 for College Savings
Teach Yourself Programming in Ten Years
3 Little-Known Social Security Facts That Could Make or Break Your Retirement
1. If you claim benefits early, your checks will be reduced for life 2. You may owe state and federal taxes on your benefits 3. You could be entitled to other types of benefits Spousal benefits: To be eligible for spousal benefits, you must be married to someone who is entitled to Social Security benefits. The maximum amount you can receive is 50% of the amount your spouse is eligible to receive at his or her FRA, and if you're already collecting more than that based on your own work record, you may not be eligible for spousal benefits. Divorce benefits: Divorce benefits are similar to spousal benefits, except you cannot currently be married and your previous marriage must have lasted for at least 10 years. Again, the maximum amount you can receive through divorce benefits is 50% of the amount your ex-spouse is eligible to collect at his or her FRA. Survivors benefits: You may be able to collect Social Security after a loved one passes away. Survivors benefits are primarily available to widow(er)s, but in some cases, children, parents, and other family members who were dependent on the deceased for income may be eligible as well.
Security Patching Made Simple for Linux HPC Instances in Oracle Cloud | Oracle Linux Blog
Ransomware attack in German hospital ends deadly for a women – blame Shitrix vulnerability | Born's Tech and Windows World
Matt Blaze on OTP Radio Stations - Schneier on Security
Monitoring my home network - Karan Sharma
Are your internet-of-things devices at risk for cyberattacks?
Oracle To Stick With Solaris "11.4" For Continuous Delivery SRU Releases - Phoronix
Python Practice Problems: Get Ready for Your Next Interview – Real Python
F-Droid Free Applications catalog for Android | LibreByte
Python: The Minimum You Need to Know | Open-Source Routing and Network Simulation
Exclusive Interview: The Motley Fool Sits Down With Nano-X Imaging
Network Configuration Files on Oracle Linux 8 - YouTube
IT Architect Series: Stories From the Field, Vol. 1 · vNinja.net
PowerShell Notebooks are Available in Azure Data Studio | SQLvariations: SQL Server, a little PowerShell, maybe some Power BI
Zero Trust Security Model – Linux Hint
Java 15 Boasts Memory Management Improvements, Text Block Feature
5 ways to harden a new system with Ansible | Enable Sysadmin
A Few Questions on Cybersecurity and the Cloud - Lawfare
4 Must-Have Documents for a Peaceful Retirement
Matt Blaze: A Cryptologic Mystery
CISA Named Top-Level Root CVE Numbering Authority (CNA)Security Affairs
There's no cloud, it's just... - Security Art Work
Because in the end, as the well-known slogan says, the cloud is nothing more than someone else’s computer, and it is important not to lose sight of that at any time. Therefore, your security depends on who that other person is and how the security of that other computer is approached.
Keeping Up the Pace of Cloud Transformation - Security Boulevard
CMMC Level 3 Control – Email Sandboxing (SI.3.220) - Security Boulevard
Detecting Zerologon (CVE-2020-1472) with Zeek - Security Boulevard
Financial Sector Cybersecurity: How do you compare to your peers? | Digital Defense, Inc.
The History of Common Vulnerabilities and Exposures (CVE)
Security Misconfigurations and Their Consequences for Web Security | Acunetix
16% of Orgs Require Developers to Self-Educate on Security | Veracode Blog
IoT Devices Ship with Security Flaws Because Profit Drive the Market - Security Boulevard
The main driver of the IoT market is not innovation and the final product suffers The IoT gold rush brings more and more unsecure devices because standards and regulations don’t really exit Security for IoT devices can still be achieved, even in these conditions, and the solution is in the ISPs’ hands
phpbash – A Terminal Emulator Web Shell - Security Boulevard
Düsseldorf University Hospital Emergency Care Postponed After Alleged Cyber Attack - Security Boulevard
NIST SP 800-53 Gets One Step Closer to Becoming a Standard - Security Boulevard
Zerologon – hacking Windows servers with a bunch of zeros – Naked Security
Healthcare: 1 Vulnhub Walkthrough
Here's What It Takes to Collect $3,790 Per Month in Social Security Benefits
Open Source Lightweight Directory Access Protocol Solutions - LinuxLinks
6 Windows event log IDs to monitor now
Windows security event log ID 4688 Windows security event log ID 4670 Windows security event log ID 4672 Windows security event log ID 1125 (Error) Windows Defender event 1006 and event 1007
BlindSide: Intel/AMD Speculation Bugs Under Microscope Again - Security Boulevard
Missing DMARC Records Lead to Phishing
Value Stream Mapping & Security in Software Development | Radware Blog
[Webinar Recap] The Need for End-to-End Cryptography Management - Keyfactor
Katie Arrington discusses making development move at the speed of relevance - Security Boulevard
Krebs’ Three Rules - Security Boulevard
Three basic rules of online safety. 1. If you didn’t go looking for it, don’t install it. 2. If you installed it, update it. 3. If you aren’t using it, delete it.
How to get a better view of Wireshark capture files with Brim - TechRepublic
Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack — Krebs on Security
Prosus - Privacy by design Q&A with Monika Tomczak-Gorlikowska and Justin B. Weiss
Unimap - Scan Only Once By IP Address And Reduce Scan Times With Nmap For Large Amounts Of Data
CRLFMap - A Tool To Find HTTP Splitting Vulnerabilities
AES Finder - Utility To Find AES Keys In Running Processes
ActiveDirectoryEnumeration - Enumerate AD Through LDAP With A Collection Of Helpfull Scripts Being Bundled
Georgia Tech creates new school focused on cybersecurity and privacy | News | cbs46.com
HIPAA Compliance: ONC Updates Security Risk Assessment Tool
Ai & Automation in Healthcare Security ~ Cyber Thoughts
Healthcare Needs better Access Control ~ Cyber Thoughts
Deadly Ransomware Story Continues to Unfold
Ransomware Gone Awry Has Fatal Consequences
Fines Tied to Failure to Provide Patients With Records
Hackers Divert VA Payments Intended for Healthcare Providers
Cloud Migration 101: Strategy, Precautions, Risks, and Security
Network Cybersecurity 101: Protecting Your Company’s Online Perimeter
Minn. hospitals hit by data breach
Forensics and Prevention in the New Reality by Paula J - Q&A Session | CQURE Academy
How IT Security Organizations are Attacking the Cybersecurity Problem | Tech Library
Simplify Your Privacy Approach to Overcome CCPA ...
Senators Demand More Details on VA Breach - HealthcareInfoSecurity
This PinePhone Multi-Distro Image Lets You Run 13 Distros on the Linux Phone - 9to5Linux
Linux hardware: The history of memory and storage devices | Enable Sysadmin
Creating a Home IPv6 Network | James Bottomley's random Pages
How to check if CentOS / RHEL needs a full reboot - nixCraft
[ $(needs-restarting -r >/dev/null ) ] || echo "Reboot $HOSTNAME to install kernel or core libs."
Nginx vs. Apache: When to Use One or the Other - RoseHosting
Oracle's Java 15 rides into town, waving the 'we're number one' flag, demands 25th birthday party • The Register
Why Don't The Bidens Get a Larger Social Security Benefit?
3 Reasons Not to Max Out Your 401(k) or IRA
An introduction to Kubespray | Enable Sysadmin
Are you backing up ransomware with your data? | 2020-09-16 | Food Engineering
Taming the tar command: Tips for managing backups in Linux | Enable Sysadmin
Set up a Wekan kanban server on Linux | Opensource.com
Arduino Blog » Monitor water quality anywhere in the world with WaterAid
MagicMirror: a versatile home information hub [LWN.net]
Duplicate Database on ODA X4 - Blog dbi services
Eight Key Components of a Database Security Risk Assessment | Integrigy
Steps of the cyber kill chain – Linux Hint
Reconnaissance Weaponization Delivery Exploitation Installation Command and control Actions on Objectives
Woman Loses Her Life During Ransomware Attack On A Hospital
How Much You Need for Retirement Depends on These 4 Factors
Average Americans Would Need an Extra $145,650 to Adjust for Social Security Cuts
In 2035, Social Security's trust fund is scheduled to run dry, necessitating a 24% automatic cut to benefits as payroll tax revenue will be enough to pay only 76% of the promised amount. If you follow the 4% rule, you'd need an extra $145,650 in your investment account to produce the $5,826 that you'd need to make up for your lost Social Security benefits.
3 Signs You're On Track to Retire a Millionaire
Approximately 233,000 Americans have at least $1 million stashed in their 401(k) accounts, according to a report from Fidelity Investments.
You'll Be Shocked at How Many Americans Saved Nothing for Retirement in the Past Year
SUSE Addresses "ZeroLogon" Vulnerability - SUSE Communities
server schannel = yes in the [global] section
Introduction to Linux firewalld zones and rules | Enable Sysadmin
How To View Linux System Statistics With Saidar - OSTechNix
An Opportunity for Strengthening U.S.-Australian Cyber Cooperation - Lawfare
Size matters when it comes to cybersecurity
Docker Implementation of Published Ports
How to Keep Your Office Safe This Fall and Winter – Workplace Safety
Debian-installer, mdadm configuration and the Bad Blocks Controversy – The ongoing struggle
NVMe | panticz.de
Intuition About Signals And Systems | Hackaday
Turning The Raspberry Pi Into A MCU Programmer | Hackaday
Best Free and Open Source Linux Configuration Management Software - LinuxLinks
tmpmail - A temporary email right from Linux / Unix terminal - nixCraft
Improve your time management with Jupyter | Opensource.com
3D Printed Magnatic Stirrer : 9 Steps (with Pictures) - Instructables
Putting The Firmware In Your Firmware | Hackaday
Linux Fu: Moving /usr | Hackaday
Building An Open Source ThinkPad Battery | Hackaday
The B-Sides: Curious Uses Of Off-the-Shelf Parts | Hackaday
TinySA Is A $49 Spectrum Analyzer | Hackaday
Python Regular Expressions with Examples - LinuxConfig.org
Name Your Business | Disruptive Naming Agency | Squadhelp
Size Does Matter When It Comes To SD Cards | Hackaday
40% Keyboard Build Is 100% Open Source | Hackaday
How to Secure Your PostgreSQL Database - 10 Tips | Severalnines
Increase your PostgreSQL databases security by checking a few settings Part 2 - Blog dbi services
Installing Windows Packages with winget | The Frog Pond of Technology
Importance TERRAFORM commands that we should know - LinuxTechLab
What is a Good Cybersecurity Program? It Varies for Everyone - Security Boulevard
Ransomware to blame for nearly half the cyber-insurance claims filed in early 2020
(Insurance companies frequently refuse to pay cybersecurity-related claims, depending on the policy and exact circumstances, unless compelled by a court.)
A Look at Royal Bank of Canada's Homegrown GPU Farm
Where's the Yelp for open-source tools?
Moog's new coffee table book is filled with tips for synth nerds | Engadget
Spinning Rust Gets an Upgrade – EEJournal
"Microsoft Wants To Create A Complete Virtualization Stack With Linux" - Phoronix
TOR Anonymity: Things Not To Do While Using TOR
1. Don’t use your mobile phone for 2-Step verification on Tor 2. Don’t operate user accounts outside TOR 3. Don’t post your personal information 4. Don’t send unencrypted data over TOR 5. Don’t use TOR with Windows? 6. Don’t forget to delete cookies and local website data 7. Don’t use TOR for Google Search 8. Don’t use HTTP website on TOR 9. Don’t connect to the same server with and without TOR simultaneously
Octavia: proxy protocol | panticz.de
How to Teach My Teenager Frugality – BeingFrugal.net
NYU CCS project – NYU Center for Cyber Security
Windows code-signing attacks explained (and how to defend against them) | CSO Online
Introduction to Researching Foreign Influence in the US – We are OSINTCurio.us
EU plans to introduce sweeping 'right to repair' legislation for electronics | Engadget
ACSC Releases Annual Cyber Threat Report for 2019–2020 | CISA
BSidesGVL 2020 - Jeff Hoskins - "CISSP for Cheap!" - YouTube
Understanding Cross-Origin Resource Sharing Vulnerabilities - Blog | Tenable®
How to Maximize Compliance Scans with Nessus - Blog | Tenable®
Top 10 Configuration Management Tools You Need to Know About
The Heartbleed Bug – Old Bugs Die Hard | Acunetix
Cleaning up the Active Directory Forest - Security Boulevard
Vulnerability 1: ‘Password’ Is Not a Password Vulnerability 2: Reassess Your User Governance Policies Vulnerability 3: Removing Built-In Privileges Vulnerability 4: Update Your Operating Systems
Dashboards: An Effective Cybersecurity Tool to Visualize Your Key Data
The Inside-Out Application Security Opportunity with RASP - Signal Sciences
What is the Certificate Chain of Trust? - Security Boulevard
Run as SYSTEM using Evil-WinRM :: malicious.link — welcome
DockerENT - The Only Open-Source Tool To Analyze Vulnerabilities And Configuration Issues With Running Docker Container(S) And Docker Networks
DockerENT
Travel Industry Giants Failed to Secure their Websites Despite High-Profile Data Breaches, New Research Shows - Security Boulevard
'The C-Suite Report' Simplified: 4 Key Takeaways - Security Boulevard
Takeaway 1: Cybersecurity Is a Priority Takeaway 2: Confidence Is High Takeaway 3: Priorities Depend on Geography Takeaway 4: Future Efforts
Hitting the books: How China uses AI to influence its 1.4 billion citizens | Engadget
Security Engineering - A Guide to Building Dependable Distributed Systems
How to use Jupyter Notebook for practicing python programs - https://www.pythoncircle.com
The Best Hardware From The 1980s | Avast - Security Boulevard
Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips - Siemplify
1. Know your cloud environments and define a security foundation. AWS, for example, provides downloadable readiness assessment and security architecture frameworks. Review access controls to ensure only authorized users can take action on specified cloud resources. This includes ensuring IAM policies are properly implemented, for example bucket policies on storage accounts inside of Amazon S3.  2. Enforce the principle of least privilege by only giving your users the permissions they need to do their jobs. Consider setting up multifactor authentication and single sign-on for extra layers of security. 3. Implement logging, which can identify changes to your cloud environments and help determine the extent of an incident.  Enable AWS blocking of public access for S3 buckets. Separate objects into different buckets based on access controls (e.g. public versus private). 4. Take advantage of free tools to diagram and analyze your cloud environments and perform best practice assessments and audits. These include CloudMapper, Prowler and Scout Suite, and many more exist. 5. Much of this work can be automated, and AWS offers a service known as Macie designed to discover misconfigurations on S3 accounts, as well as data that shouldn’t be in them.
Diving Deeper: 4 Best Practices for Securing Enterprise Data in Office 365 (O365) - CipherCloud
1. Controlling Unmanaged devices: Enabling users to access O365 from any device while ensuring that the right controls are in place. CASB+ offers adaptive controls that enable practitioners to disable the storage of sensitive data like PCI/HIPAA and configure policies based on business requirements. 2. Securing email and Teams collaboration: Protecting specific data sets across O365 Email and Teams collaboration models. CASB+ detects when users attempt to share sensitive information (SSNs, card data, PHI data, etc.) on email, Teams chats or channels with an unauthorized or external user; policies can be tailored to mask or delete that information. 3. Privileged user monitoring: Protecting against improper data handling. CASB+ detects anomalous user behavior such as logging from an unusual location and downloading an unusual amount of data. Administrators can move quickly to remove access and even wipe involved data. 4. Data classification: Securing sensitive files with multi-level policy enforcement. Using CASB+, O365 and Teams collaboration can be secured by controlling how/where/when sensitive data is shared, specifically through the use of integrated DLP and centralized policies.
Cybersecurity Best Practices to Keep Your Online Business Safe
Meeting Customer Security Needs along Their Security Maturity Journey
. All organizations, regardless of size, struggle in the same four areas. The impact just depends on the type of the organization. 1. It’s hard to hire and keep highly skilled information security personnel. 2. Advanced attacks are getting harder to detect due to changes in tactics techniques and procedures (TTPs). 3. The impact in mean time to respond (MTTR) is increasing as a direct result of a lack of time to investigate every alert. There are just too many. 4. InfoSec professionals are overloaded, with too many tools and not enough automation to help manage all the alerts.
Back in 2015, while working on a Gartner SOC paper, I coined the concept of “SOC nuclear triad”… - Security Boulevard
The model was originally built to demonstrate the necessary security visibility via three pillars: Logs (such as via SIEM) Network data (such as via NTA/NDR) Endpoint data (such as via EDR)
Cybersecurity Maturity Model Certification and Why You Should Care
This new CMMC requirement will affect over 300,000 different companies from large system integrators to simple mom-and-pop shops that might provide cleaning services.
Strategies for Insider Threat Mitigation
More than 230 Million US Health Records Have Been Stolen or Lost in Past Decade - Security Boulevard
New CISO? Top 5 Things You Need to Know - Security Boulevard
1. Conduct a baseline security posture assessment 2. Assess team skills and identify gaps 3. Build key relationships, especially with IT 4. Communicate your vision across the enterprise 5. Deliver key wins and spread the word
RoboCallers Hit with Permanent Injunction by Courts - Security Boulevard
Survey: SMBs Increasingly Have to ‘Do More with Less’ When it Comes To Cybersecurity - Security Boulevard
Protect Your Organization from the Ransomware Trifecta - Security Boulevard
RDP compromise (~60%) Email phishing (~24%) Software vulnerabilities, especially in VPNs (~15%)
PCI DSS 4.0 and the Changing Approach to Compliance - Security Boulevard
Veracode Blog| Why Application Security is Important to Vulnerability Management
Fairfax County Public Schools hit by Maze ransomwareSecurity Affairs
Bank of Seychelles hit by a ransomware attack ......Security Affairs
Decrypting TLS connections with new Raccoon AttackSecurity Affairs
Cliché: Security through obscurity (yet again) - Security Boulevard
USG notes, GV LAN configuration | Nelson's log
Chris's Wiki :: blog/linux/DNFLogsWhatWhere
SeaChange video delivery provider discloses REVIL ransomware attackSecurity Affairs
Netwalker ransomware hit K-Electric, a major Pakistani electricity providerSecurity Affairs
Spill is hijacking my formulas - how to disable it? - Microsoft Community
This is an issue as I'm trying to use different formulas as I'm progressing down the column but Spill is not letting me. If I try to delete the auto filled formula, there is actually nothing to delete, it's a phantom formula, formula bar syntax is greyed out and the formula keeps showing up. If I try to delete a formula above I get an error #spill or something.
Postal Service Used Apps That Had ‘Catastrophic’ Vulnerabilities for Years
Serious Security: Hacking Windows passwords via your wallpaper – Naked Security
Ranking National Cyber Power - Schneier on Security
The rankings: 1. US, 2. China, 3. UK, 4. Russia, 5. Netherlands, 6. France, 7. Germany, 8. Canada, 9. Japan, 10. Australia, 11. Israel. More countries are in the document.
An overview of targeted attacks and APTs on Linux | Securelist
Colocation data centers giant Equinix data hit by Netwalker RansomwareSecurity Affairs
InfoSec Handlers Diary Blog
Get-Clipboard -Format text
Sysadmin careers: My road to a career in Linux system administration | Enable Sysadmin
KMail account trouble | Ctrl blog
Network routers are just computers | Ctrl blog
A recent study of 127 new home routers had some very worrying findings. One-third ship with Linux kernel version 2.6.36 was released in October 2010. You can walk into a store today and buy a brand new router powered by software that’s almost 10 years out of date! This outdated version of the Linux kernel has 233 known security vulnerabilities registered in the Common Vulnerability and Exposures (CVE) database.
Forensic Investigation: Preserve TimeStamp
Generating and Using SSH Keys, Part 1 - Low End Box
Unifi Network Controller on Ubuntu 20 | Nelson's log
Cyber-Risks Explode With Move to Telehealth Services
Two Years on from GDPR: Has It Driven Growth in ...
Docker for Pentester: Image Vulnerability Assessment
5 Lessons to Learn in Vulnerability Risk Assessment
Errata Security: Cliché: Security through obscurity (yet again)
Ευάγγελος Μπαλάσκας - VMs on KVM with Terraform » Evaggelos Balaskas - System Engineer
The benefits of making code worse | Benji's Blog -
A new security flaw is revealed with 'BlindSide' on Linux affecting Intel and AMD | GamingOnLinux
Debian Janitor: All Packages Processed with Lintian-Brush
How to Create and Run Cron Jobs on Linux - RoseHosting
How To Install Netdata Monitoring on Ubuntu 20.04 LTS - idroot
Computer Science Should Be Taught Using Free/Libre Software for Long-Term Benefits | Techrights
Setting the root password in preseed.cfg for unattended installation | Sebest's Nuage ☁️
8 Steps to Becoming an Effective Leader – Running Your Business
1. Develop Conversation Intelligence 2. Think Ahead 3. Be Optimistic and Inspirational 4. Remember That Effective Leaders Are Humble 5. Show Your Passionate Side 6. Learn from Your Failures 7. Delegate for the Greater Good 8. Effective Leaders Know to Keep Growing Effective Leaders Are Made, Not Born
Sysadmin survival guide | HPE
Learning is key - Keeping your skills up to date is the single most important thing you can do to stay relevant. Avoid getting stuck - managing an application that's practically on life support. Try not to get dropped into a role that you can’t easily hand off when better opportunities come along. Instead, focus on tasks that will help you develop new skills. Welcome problems - some of my most significant learning opportunities have come about when I ran into a problem that at first seemed like a brick wall. Develop good troubleshooting skills Develop a process: What errors or unusual behaviors am I seeing? What evidence am I seeing in the log files? What just changed that might have brought about the problem? How is the system different from similar systems that don’t show the problem? How can the problem be divided into parts? For example, might disk space, memory contention, configuration changes, or network problems be playing a role? What troubleshooting tools do I have on hand to help? Do I know how to examine processes, disk usage, log files, open files, network connections, etc.? Might the problem I’m investigating be a side effect of a larger problem? Be proactive - Don’t wait to be told what to do. When you can, take the lead. Notice what’s working and what’s not working. Suggest improvements. Think security, security, security - Make system security part of everything you do. Explore your company’s reach - Make a point of understanding your company’s reach—its products and customers. Know your customers - Know who your customers are whether they are internal or external. To the extent possible, tune in to their problems. Be adaptable - Reach beyond your job - Don’t let your boss, your current position, or your company be your sole locus of professional activity. Develop relationships with other professionals in your field—through conferences, online forums, community groups, etc. Pursue your interests
Arm Linux version of J-Link debugger lets the Raspberry Pi play host
Starting with PostgreSQL - Blog dbi services
Linux servers and workstations are hackers' next target, security researchers warn - TechRepublic
11 types of hackers and how they will harm you | CSO Online
1. The bank robber 2. The nation-state 3. The corporate spy 4. The professional hacking group for hire 5. The rogue gamer 6. Cryptojackers: The resource vampires 7. The hacktivists 8. The botnet masters 9. The adware spammer 10. The thrill hacker 11. The accidental hacker
Cut in TLS certificate life could lead to greater risk of outages
Certificates that were issued before the enforcement date won't be affected, neither will those that have been issued from user-added or administrator-added Root certificate authorities (CAs). To avoid any unintended consequences Apple is recommending that new certificates be issued with a maximum validity of 397 days.
Considerations for Host-based Firewalls (Part 1) « ipSpace.net blog
NetworkingInPubClouds/security at master · nadeemnet/NetworkingInPubClouds · GitHub
The What, Why & How of SSH Protocol | Keyfactor
Gunnar Wolf• RPi 4 + 8GB, Finally, USB-functional!
A beginner's guide to firewalld in Linux | Enable Sysadmin
How to Check Java Version | Linuxize
Starting Container-Based Services
Legality of Security Research to be Decided in US ...
Secureworks to Buy Delve Laboratories for ...
Human Rights and TPMs: Lessons from 22 Years of the U.S. DMCA | Electronic Frontier Foundation
5 Patch Management Best Practices to Safeguard Your Business in 2020
#1. Asset inventory #2. Patch management schedules One of the key aspects when it comes to patching is setting up a clear schedule. Patches should not be applied randomly, whenever you remember or when you find out a vulnerability is being actively exploited in the wild. #3. Timely patch deployment #4. Testing #5. Automation #6. Reporting
Cybersecurity Leadership: The New Threat Landscape
Vulnerability Assessment With Nessus Home - Part 1 | Alpine Security
USB Forensics: Detection & Investigation
Sysadmin toolbox: How to use the sort command to process text in Linux | Enable Sysadmin
Cyber security is next frontier for open source
We must improve security visibility, we must respond faster to the growing threat landscape, we must embed security into and keep up with the pace of business transformation.” For enterprises, open security means they will no longer be forced to rely on a single supplier, or just their own developers and security experts, Youngblood said. “You have an entire community lined up in support of a particular standard and to deliver open source codes and technologies,” he added.
How to Start a Dropshipping Business in 5 Simple Steps – Business Ideas
New Vulnerability, BLURtooth, Attacks Bluetooth Devices - Make Tech Easier
Best SQL Server Monitoring Tools in 2020
How to prepare for a natural disaster
A bandana and/or an N95 mask or respirator. A change of clothing. A flashlight or headlamp with spare batteries. Extra car keys and some cash. A map marked with evacuation routes and a designated meeting point. Prescription medications. A basic first aid kit. Photocopies of important documents. Digital backup of important files. Pet supplies. Water bottle and snacks. Spare chargers for your electronic equipment.
Seven Lucky Gods of Japan
Inova Suffers Third-Party Data Breach
CMMC bakes security into DoD’s supply chain, has value for all businesses | CSO Online
“These solutions include compliance documentation that really helps customers that are in the cloud understand and be able to demonstrate how they're meeting CMMC compliance. [The solutions also include] an automated environment that [has] been purpose-built to support the needs and the expectations of CMMC. So, the AWS cloud helps customers to quickly develop tests and deploy their CMMC environment.” “If you put a problem out there, industry will solve it if you give them the opportunity,” Arrington said of the efforts by AWS and other CSPs. “What you're seeing today is exactly that. I applaud the efforts of all the CSPs and product providers that have been out there.” “They’re talking about amending Sarbanes-Oxley [a key law protecting investors from fraud] to include cybersecurity. So, think about it. They’re not kidding around. People say, ‘Oh it’s such a high burden to get there,’” she said. “Your adversary knows you and they’re looking for the absolute weakest link in any supply chain.”
4 top vulnerabilities ransomware attackers exploited in 2020 | CSO Online
CVE-2019-19781: Citrix Application Delivery Controller CVE-2019-11510 Pulse Connect Secure CVE 2012-0158: Microsoft Office Common Controls CVE-2018-8453: Windows Win32k components
Google Cloud Associate Cloud Engineer Mind Map - Wahl Network
ORA-1555 won't get reported into alert.log anymore since 19.4.0
ORA-1555
An important update addresses a Spoofing Vulnerability in AD FS - The things that are better left unspoken
Step by Step Guide to Setup LDAPS on Windows Server - Microsoft Tech Community - 385362
Lessons from load balancers and multicast
A critical lesson I learned is that running out of capacity is the worst thing you can do in networking You can prevent a lot of problems if you can deep dive into an architecture and understand it’s tradeoffs and limitations Magic infrastructure is often extremely hard to troubleshoot and debug
61 percent of companies experience insider attacks
How To Manage NTFS Permissions With PowerShell
How to configure Azure Automatic VM guest OS patching - Thomas Maurer
Five philosophies of career success - 80,000 Hours
10 common cloud security mistakes that put your data at risk | CSO Online
1. Unsecured storage containers 2. Lack of applications protection 3. Trusting SMS MFA to secure an account – or having no MFA at all 4. Not knowing your access rights 5. Leaving ports open 6. Not watching for remote access 7. Not managing your secrets 8. The curse of GitHub – trusting the supply chain 9. No meaningful logs 10. Not patching servers
What is Microsoft Lists? - TDSheridan Lab
Teams Wiki vs. OneNote - SharePoint Maven
Windows XP won’t die in 2020 | Born's Tech and Windows World
Writing a custom Ansible module ⁕ Vincent Bernat
Auditing Your Database - Is It Enough For Your Data Security Needs? | Imperva
Where Do We Need Smart NICs? « ipSpace.net blog
Raccoon attack allows hackers to break TLS encryption 'under certain conditions' | ZDNet
How I learned Python | Codementor
How this open source test framework evolves with .NET | Opensource.com
#tsql2sday #130 – Automate your stress away – Getting more SSIS Agent Job information | SQL DBA with A Beard
How to Block USB Drives in Windows using Group Policy? | Windows OS Hub
The Devil Is in the Data - Lawfare
Packer by HashiCorp : First Steps | The ORACLE-BASE Blog
My Thoughts on LinkedIn in 2020 — EtherealMind
Why Routers and Switches Don’t Matter Now — EtherealMind
Level Up Your Career with Kubernetes - Mohammad Darab
How to Connect to WiFi from the Terminal in Ubuntu Linux
How to implement a simple personal/private Linux container image registry for internal use | Enable Sysadmin
Notes on good judgement and how to develop it - 80,000 Hours
Hacking Ethernet out of Fibre Channel cards
IPoverFC
Supplier Management. Between Deming's principles and those of the European Union - Security Art Work
“end the practice of doing business based on price; instead, minimize total cost through a few suppliers based on long-term relationships built on loyalty and trust.”
How to create a modern presentation in Open Office Impress
From Concept To Live In Two Weeks With Django · Matt Layman
Hackers use legit tool to take over Docker, Kubernetes platforms
Post-COVID-19 Cybersecurity Spending Update
Security Spending Will Still Grow - grow by 2.4% compared with last year. Some Organizations Plan Big Security Investment - 58% of organizations reported increased spending, with almost one in four organizations experiencing an increase of 25% or more in security spending. MFA Led Spending During COVID-19 Scramble Cloud Security Leads - growth gains of over 33%, which far outstrips the runner-up categories of data security (up 7.2%) and application security (up 6.2%). Staffing Increases - In spite of slightly upward spending trajectories for the security industry as a whole, half of organizations have had to furlough one to two SOC employees, and 68% have had to lay off one to three staff members. Meantime, 57% of organizations said they've deferred any further security hiring. cybersecurity spend. .48% of revenue 10.9% of overall IT spend 2,691 per FTE
France national cyber-security agency warns of Emotet attacksSecurity Affairs
How to Compete in Cyberspace: An Accompaniment - Lawfare
Preserving data integrity | Insanity Industries
Amiga Fast File System Return to the Linux Kernel – CubicleNate's Techpad
Engineer Quits Facebook, Says Company 'Profiting Off Hate'
Linux troubleshooting: Setting up a TCP listener with ncat | Enable Sysadmin
Keycloak with Okta IDP Initiated SSO Login | Lisenet.com :: Linux | Security | Networking
Red Hat on Red Hat: How collaboration can transform configuration management in IT
After assessing each of these business challenges, we set to work on establishing key objectives for our success as we transitioned to Ansible, based on the things we thought our best-in-class Configuration Management should be and do:  1. Drive consistency, reusability, and a predictable system state through loose coupling and standard patterns. 2. Be modern, supportable, usable, focused on security and projected future needs (e.g. using OpenStack in our new datacenter) including modern application. workloads ( IaaS, PaaS, and eventually Serverless), and on-demand environments. 3. Align with open hybrid cloud program requirements, including scalability and resiliency requirements. 4. Be environment and instance agnostic; these should not enforce application environment strategies. 5. Support shared data and secrets between deployment models (IaaS, PaaS, etc.). 6. Facilitate offline application and CM development. 7. Make use of existing sources of truth rather than hard-coding or duplicating (e.g. IdM, AWS tags). 8. Encourage the creation of testable code.
Should I run my desktop 24/7? | Enable Sysadmin
Netbooting the live server installer - Server - Ubuntu Community Hub
NVMe over TCP | Oracle Linux Blog
HardInfo - Check Hardware Information in Linux
Yubico's latest security key uses NFC or USB-C for authentication | Engadget
Mathematicians Made a Basic Discovery in Shapes After 2,000 Years
In their paper, the trio present a theoretical proof for why such a trip is possible on dodecahedra but not other Platonic solids. Aulicino explained that there are certain symmetries that the dodecahedron lacks and that the other solids possess, and these symmetries are what prevent you from getting back to where you started without passing another corner on these solids.
PurpleCloud - An Infrastructure As Code (IaC) Deployment Of A Small Active Directory Pentest Lab In The Cloud
The Curious Case of the Baltimore Ransomware Attack: What You Need to Know
Stung by Ransomware, Australia Urges Better Preparation
Newcastle University says it will take “several weeks” to recover from cyber attack • Graham Cluley
RedCommander: Open source tool for red teaming exercises - Help Net Security
10 value-adds that CISOs can deliver | CSO Online
Bring better order to organizational data Identify policy and procedural lapses Spot superfluous spending Lend skills to IP protection Make security a selling point Build bridges Help out partners Find, promote opportunities for standardization Shape strategic plans Streamline regulatory controls
SELinux for beginners - Blog dbi services
Couple of Quick Ansible Tips – Unadulterated Nerdery
Sapiens: Are We Happier And Better Off Than Our Ancient Ancestors? — My Money Blog
Centos 8 (Proxmox) + Active Directory authorization – SvennD
The change in SCP trial reveals its biggest problem | It's full of stars!
As with the Neo trial, the CF trial comes with some limitations. The most important limitation is the time limit. “Cloud Foundry trial accounts expire after 30 days. You can extend the trial period to a maximum of 90 days, after which your account is automatically deleted.” After the maximum of 90 days, you can create a new trial account and in theory, have unlimited access to CF trial. But SAP does not make it too easy: “Note that the new account starts from scratch and you cannot carry over any development projects from your previous trial account to the new one”. After 90 days all your configurations are gone, and you start from zero. Depending on what you configured in the CF trial, this will take some time. Precious time during which the next 90 days are already running.
Nebulon – It’s Server Storage Jim, But Not As We Know It | PenguinPunk.net
Nebulon defines its offering as “cloud-defined storage (CDS)”. It’s basically an add-in card that delivers “on-premises, server-based enterprise-class storage that consumes no server CPU / memory resources and is defined and managed through the cloud”. This is achieved via a combination of nebulon ON (the cloud management plane) and the Nebulon Services Processing Unit (SPU).
Increase your PostgreSQL databases security by checking a few settings - Blog dbi services
China Bans Kids’ Programming Language ‘Scratch’ Due To Anti-China Content
Raspberry Pi cluster with k3s & Salt (Part 1)
CarPiHat Connects Raspberry Pi to your Car with Opto GPIO, CAN Bus, 12V Outputs
How to Install Sensu Monitoring on Ubuntu 20.04
Reasons to hire inexperienced engineers | Benji's Blog -
Fresh Perspectives Incentive for Simplicity and Safety Growth opportunity for others Level up fast Tenure Action over Analysis Hire Faster
Use libguestfs to manage virtual machine disk images | Enable Sysadmin
Motorola's budget G9 phone has a 64-megapixel camera and 5,000 mAh battery | Engadget
Moto G9 Plus
How would I evacuate in an emergency? – Scott Gruby's Blog
Using Google Firebase as free HTTP & HTTPS redirect service
Ergonomics Assessment for Employees - VinciWorks Blog
Ex-Cisco Engineer Pleads Guilty to Insider Threat Case Dealing $1.4 Million in Damages | SENSEI ENTERPRISES, INC.
UCLA Visiting Researcher Arrested and Charged with Evidence Destruction | SENSEI ENTERPRISES, INC.
The Ins and Outs of Penetration Testing for Web Apps | Codementor
Understanding the CSRF Vulnerability (A Beginner’s Guide)
blog.ipfire.org - Thoughts on operations security for the masses
Disclosure 2020: Opening Keynote with the Grugq - Strategic Cyber Warfare - YouTube
The Inside Story of the 25-Year, $8 Million Heist From the Carnegie Library | Arts & Culture | Smithsonian Magazine
Sysdig Integrates VulnDB to Strengthen Vulnerability Intelligence Reporting – RBS
Autovpn - Create On Demand Disposable OpenVPN Endpoints On AWS
Netwalker Ransomware hit Argentina's official immigration agencySecurity Affairs
Learning From the Best: James Collins, CIO in Delaware - Security Boulevard
SunCrypt Ransomware behind North Carolina school district data breachSecurity Affairs
Data Breach at Roper St. Francis Hospital Affects 6,000 Patients – HOTforSecurity
Such medical records are usually worth up to 50 times more than credit card information, and it has been known to reach $1,000 on the black market. The only immediate mitigation includes improving email and endpoint security and training employees to recognize intrusions and phishing campaigns.
Top Cybersecurity Challenges Facing Government Agencies | Radware Blog
Why Patch Management Is Important and How to Get It Right
Lessons Learned from SSH Credential Honeypots · System Overlord
Build a remote management console using Python and Jupyter Notebooks | Opensource.com
Migrate your Java Apps to containers with Migration Toolkit for Applications 5.0 - Red Hat Developer
How to optimize Windows event logging to better investigate attacks | CSO Online
Free — IMF Security
5 Ways for Cybersecurity Teams to Work Smarter, Not ...
Understand the Business Acknowledge Complexity Reassess Business Models Commit to Automation Know the Adversary
Morris County Resident Sentenced to 94 Months in Prison for Computer Intrusions that Targeted Two New Jersey Companies | USAO-NJ | Department of Justice
New Jersey Man Sentenced to 7+ Years for Cyber ...
The Hidden Costs of Losing Security Talent
According to Simone Petrella, founder and CEO of online training firm CyberVista, an experienced security analyst commands an average annual salary of about $100,000. And when that analyst leaves a company, it typically takes eight months to replace that person and almost four months to train a replacement.
5 Tips for Triaging Risk from Exposed Credentials
Validate Whether the Credentials Belong to Current Employees Suppress New Alerts for the Same Credentials Weed Out Duplicate Credential Data Make Sure the Credentials Are Genuine Implement Continuous Monitoring for Stolen/Leaked Credentials
DHS Partners with Industry to Offer State, Local ...
ISO 27701 Paves the Way for a Strategic Approach to ...
What is a Linux Distribution? Why is it Called 'Distribution'?
Want to make better decisions? Encourage disagreement | Opensource.com
How to Install Remote Desktop on Ubuntu 20.04 with XRDP - Low End Box
Quietech Associates, Inc. - Home
30 python scripts examples – Linux Hint
The 5 Best Free and Open-Source PDF Editors | FOSS Linux
Desktop SSD usage statistic | blog.erben.sk
Service Terms | Greyhawk's Meanderings
Sysadmin tales: My worst mistake as a sysadmin | Enable Sysadmin
PCLinuxOS Magazine - Page 5
The NSA and FBI have advised that Linux users should do three things to protect themselves from this malware. First, they should update to Linux Kernel 3.7 or later, "in order to take full advantage of kernel signing enforcement." Second, they should activate UEFI Secure Boot. Third, Linux users should "configure systems to load only modules with a valid digital signature, making it more difficult for an actor to introduce a malicious kernel module into the system."
Managing a non-profit organization's supply chain with Groovy | Opensource.com
8 Time Consuming IT Tasks You Need to Automate Now - GeeksforGeeks
A look at password security, Part IV: WebAuthn - The Mozilla Blog
A look at password security, Part III: More secure login protocols - The Mozilla Blog
A look at password security, Part V: Disk Encryption - The Mozilla Blog
Threat Hunting: Velociraptor for Endpoint Monitoring
Incident Response: Windows Account Logon and logon Events
US Agencies Must Create Vulnerability Disclosure Policies
List of data breaches and cyber attacks in August 2020 – 36.6 million records breached - IT Governance UK Blog
Faraday v3.12 - Collaborative Penetration Test and Vulnerability Management Platform
SpaceSiren - A Honey Token Manager And Alert System For AWS
DVS - D(COM) V(ulnerability) S(canner) AKA Devious Swiss Army Knife
How Government AI Stole Hundreds of Millions of Dollars From Citizens
Building OSKit | Fun with virtualization
Microsoft: Flash Player will be removable in autumn, support will end in 2021 | Born's Tech and Windows World
Leveraging the Power of the Robocopy /MIR Switch
Self Service your IT with PowerShell and au2mator
au2mator
How to use Apache to redirect all traffic from http to https - LinuxConfig.org
Favorite Learning Resources & Tools - Google Sheets
NBlog - the NoticeBored/SecAware blog: NBlog Sept 4 - standardising ISMS data interfaces
NBlog - the NoticeBored/SecAware blog: NBlog Sept 3 - ISO27001 rocket fuel
"that managing information risks properly is more than just a compliance imperative. It's good for business."
How to Use Linux Smart Enumeration to Discover Paths to Privesc « Null Byte :: WonderHowTo
PAM Security Essentials – Identity Management & Asset Protection
‘Smart Helmets’ get their U.S. test flight at Flint’s Bishop Airport scanning temps, recognizing faces - mlive.com
Health care interoperability: Preparing to meet new privacy and security obligations
PEPR '20 | USENIX
Schools Are Moving to Remote Lessons: Cybersecurity Essentials for Schools
Windows 8.1 slow after flash update KB4561600 | Born's Tech and Windows World
Equifax Breach: CISO Describes Lessons Learned
Regulator Offers Asset Management, Mobile App Advice
A Tale of Two Hacker Incidents - HealthcareInfoSecurity
Cybersecurity Leaders: Planning (and Budgeting) for 2021
https://www.cdse.edu/documents/cdse/insider-risk-jobaid.pdf
Certified Kubernetes Administrator Exam Review - Virtual Elephant
iOS Forensics: HFS+ file system, partitions and relevant evidences | Andrea Fortuna
PowerZure, exploit framework targeting Azure, has been updated | Andrea Fortuna
Cheat-Sheets — Malware Archaeology
Logging — Malware Archaeology
https://www.whitehouse.gov/wp-content/uploads/2020/09/2020SPD5.mem_.pdf
Goodbye, Drobo | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
SourceWolf - Amazingly Fast Response Crawler To Find Juicy Stuff In The Source Code!
Automate Let's Encrypt SSL Installation with Ansible for Multiple Domains - LinuxBuz
Why upstream Ansible stopped shipping rpms – The Ramblings
Securedrop Worktstation and how can you help
https://assets.pubpub.org/6konmefn/21597242874854.pdf
Erman Arslan's Oracle Blog: OBIEE - SSO -- Integrating with a third party login with AD authentication / passing user and pass in URL
will
Canonical Releases Important Ubuntu Kernel Updates to Patch 17 Vulnerabilities - 9to5Linux
SSH password automation in Linux with sshpass | Enable Sysadmin
Announcing the Unbreakable Enterprise Kernel Release 5 Update 4 for Oracle Linux | Oracle Linux Blog
Rick Elrod - How Ansible/ansible-base releases work
Teen arrested for alleged cyberattacks on Miami-Dade schools | TheHill
LibreOffice Information: The best LibreOffice extensions. Barcode
Postfix vs. Sendmail – Linux Hint
Hotspot Version 1.3.0 Released - KDAB on Qt KDAB
PXE server in Fedora with dnsmasq – Apuntes de root
Wireshark Network Forensic Analysis Tutorial – Linux Hint
Command Line 101 – Tookmund – A place for my random thoughts about software
Design a book cover with an open source alternative to InDesign | Opensource.com
When, Why, and How To Use Web Scraping In A Nutshell - The Python Podcast
NSL Lectures
Buffett's Berkshire Hathaway buys stakes in 5 Japanese trading houses - Japan Today
DIY Propane Fire Pit for Under $300 – Garrett Patterson
Adding call-outs to images - NevBlog
Building the Grand Strategy for Cybersecurity | SIGNAL Magazine
How Do We Identify Leadership If We Taint the Definition With Politics and Ideology? Here Are 10 Enduring Principles of Great Leaders
Windows 10 Guide: How to Fix Audio Issues in Windows 10 PCs
With cloud's security benefits comes systemic risks, report finds | CSO Online
8 things your security team needs to know about WPA3 | CSO Online
1. WPA3 certification is now required for all Wi-Fi devices 2. WPA2 devices will interoperate with WPA3 3. WPA3 has a mode for individual users 4. WPA3 has a mode for organizations 5. WPA3-certified devices will have the latest security protocols 6. Rules against password reuse particularly important with WPA3 devices 7. WPA fixes shortcomings in WEP 8. WPA3 development is ongoing
Mihari - A Helper To Run OSINT Queries & Manage Results Continuously
Why the World May Never Truly Be Rid of Dongles
Does Your State Have an Estate or Inheritance Tax?
What Does the EU Cybersecurity Act Mean for US-based Businesses?
How to Improve PCI Compliance and Reduce Technical Debt - Security Boulevard
Setup Detachable and Reattachable Terminal Sessions With tmux on your VPS - Low End Box
Why log management is essential to successful implementation of DevSecOps [Q&A]
Let Employees Design the New Workspace After Relocation – Productivity
Creating Oracle Connections…from outside of SQL Developer – ThatJeffSmith
CMMC Awesomeness
Replace vSphere 7 with Tanzu Certificates - The IT Hollow
DEF CON Safe Mode Red Team Village - Chris Cottrell - Guerrilla Red Team Decentralizing Adversary - YouTube
'Wet Ass Postage:' Sexualizing the Post Office to Save the USPS 
Video : Simple Oracle Document Access (SODA) for PL/SQL | The ORACLE-BASE Blog
Do's and Don'ts Of Conducting a FSSC Cybersecurity Profile Assessment
5 ways to convert video files on Linux
Vagrant Box Drama | The ORACLE-BASE Blog
Structured distraction: how to make the most of your breaks at work
We need to alternate between focus and distractions. Instead of forcing ourselves to work through fatigue and demotivation, we may as well take productive breaks. Movement breaks. Get up and move your body. If you have time, go for a walk. You could even go for a run, or use your break for a gym session. If you don’t have a lot of time, getting up and stretching your body or doing some jumping jacks. Short, intense exercise has been proven to have a very positive impact on both attention and short-term memory formation. Mental breaks. Do a short meditation or deep breathing session. Or just let your mind wander: scientists have found that daydreaming has a positive impact on cognition. Social breaks. We are social animals. Social breaks, such as chatting with your peers, show a positive association with feeling recovered after the break. Schedule some social breaks with a colleague or a friend. Nature breaks. Go outside to get some sunlight. If there’s a park nearby, even better. Studies show that nature has a positive impact on our mental health. You could also pet a dog if you have one handy. Research has shown that our oxytocin levels increase when gazing in a pet’s eyes. Oxytocin is often called the “cuddle drug” because it is released when two people are bonding emotionally. It’s an easy way to feel happy. Creative breaks. Draw, doodle, listen to some music. Listening to classical music in particular has been shown to help with relaxation. If you can’t leave your desk, creative breaks are an easy way to take your mind off work for a little while.
Chadwick Boseman's Howard University 2018 Commencement Speech - YouTube
Linux Upskill Challenge | linuxupskillchallenge
iPXE | Booting CoreOS Container Linux via iPXE
Pale Purple - iPXE Network booting for ISO images
chain
GitHub - RedTeamPentesting/monsoon: Fast HTTP enumerator
Fuzzing the Linux kernel (x86) entry code, Part 2 of 3 | Oracle Linux Blog
GitHub - ashishb/android-security-awesome: A collection of android security related resources
DEF CON 28 Safe Mode Red Team Village - Tim Wadhwa-Brown's 'All Of The Threats: Intelligence Modeling' - Security Boulevard
Microsoft Patch Tuesday August 2020: vulnerabilities with Detected Exploitation, useful for phishing and others | Alexander V. Leonov
PXELINUX - Syslinux Wiki
Traitlets - an introduction & use in Jupyter configuration management | Quansight Labs
The 5 Best Open Source Password Managers | FOSS Linux
Weeklypedia
Secure Your Online Accounts With 2FA And Open Source
nbdkit now ported to Windows | Richard WM Jones
9 Best Free Console-Based Diff Tools - LinuxLinks
diff-so-fancy delta icdiff
6cord Is An Almost Perfect Terminal Discord Client - YouTube
Synology TFTP server for PXE Boot
Nova Scotian Hodge Podge Recipe | Allrecipes
EdgeRouter - DHCP Server Static Mapping – Ubiquiti Networks Support and Help Center
set service dhcp-server shared-network-name LAN1 subnet 192.168.1.0/24 static-mapping uap-pro ip-address 192.168.1.240 set service dhcp-server shared-network-name LAN1 subnet 192.168.1.0/24 static-mapping uap-pro mac-address <mac-address>
Troubleshooting performance on Autonomous Database - Blog dbi services
I got carried away and built a 36TB home server the size of a toaster oven | PC Gamer
FBI warns of an increase in online romance scamsSecurity Affairs
PXE Deploy Clonezilla. In this lesson we use PXE Linux and Clonezilla
The Morning After: Elon Musk's brain implant is working -- in pigs
What is a Display Server in Linux?
Setting Up A PXE Install Server For Multiple Linux Distributions On Debian Lenny
Asymptomatic COVID-19 Infections And 'Disease Tolerance' : Shots - Health News : NPR
How to Turn Your Raspberry Pi into NAS with OpenMediaVault
Scanning containers for vulnerabilities with OpenSCAP and Podman | Enable Sysadmin
Vulnerable-AD - Create A Vulnerable Active Directory That'S Allowing You To Test Most Of Active Directory Attacks In Local Lab
Former Cisco employee pleads guilty to hacking, damaging company systemsSecurity Affairs
4 Best Practices for Credentialed Scanning with Nessus - Blog | Tenable®
Microsoft re-re-re…releases KB 4023057, the “blast a way to the next version” patch @ AskWoody
F5: Setup Basic Web Load Balancing | PeteNetLive
Windows Server vNext Preview build 20201 is now available - The things that are better left unspoken
Is Your Data Backup Plan COVID-Proof? | APMdigest - Application Performance Management
Configuring Port Forwarding on Windows | Windows OS Hub
Everything in VMware vCenter Server 7 - New Features in vSphere 7
Elon Musk Unveils Neuralink Brain Implant Working In A Pig
Nosa Edoimioya, PhD student | Cool Tools
6 Factors to Consider in Evaluating CVE Importance - Security Boulevard
6 factors to consider when evaluating CVE risk 1. Inventory – it’s important to identify all assets in your environment so that you have the full picture of what you’re protecting, but most organizations miss 15-35% of their assets when creating an inventory, not to mention difficulty in categorizing each asset. Modern RBVM tools create accurate inventory of all assets, automatically and continuously. 2. Vulnerabilities – This represents CVEs and their corresponding CVSS scores. These are important and definitely an important factor in determining whether or not to prioritize a vulnerability. It’s also important to remember that while this post is focused on CVEs in particular, vulnerabilities are not just CVEs. You could have a weak password, an easy to phish user, some misconfiguration, and so on, in addition to unpatched software. 3. Threats – 95% of CVEs are never actually exploited in the wild. If nobody is exploiting a vulnerability, is it as important as one that is popular with adversaries? Must time and effort is wasted in vulnerability management programs by focusing on CVEs that are theoretical in nature. Taking active exploits into account ensures that your team is focused on CVEs that matter. 4. Exposure – Since 37% of enterprise software is unused, it doesn’t make sense to prioritize unpatched vulnerabilities in that software. Ensure that you put higher priority on heavily used software. An additional tip is to reduce your overall attack surface by uninstalling software that isn’t in use – saving your organization money as well. 5. Compensating Controls – some unpatched CVEs can’t be exploited because you have other controls in your network that prohibit the steps required for the attacker to launch the attack. Such controls might mean that a high severity vulnerability that is being actively exploited in the wild really doesn’t represent much risk to you at all. 6. Business Criticality – business criticality asks the simple question, “Just how bad would it be if said asset were to get breached.” A database server that contains sensitive financial or customer information represents much more risk to the organization than a BYOD asset on your guest network. Mean time to patch (MTTP) should be lower for the high criticality asset than for the BYOD asset. This is a critical distinction – there’s no reason to respond equally quickly for all assets with unpatched vulnerabilities.
Top 9 Vulnerabilities With No Assigned CVE Number - Security Boulevard
1. Compromised Credentials – password related issues are still responsible for more than 80% of breaches, and 99% of users reuse passwords between work and personal accounts. With compromises of consumer services on a near daily basis, the odds that some of your users’ work passwords have already been compromised is extremely high. Think this is less important than that high severity CVE that made the news last week but has never been exploited in the wild? 2. Weak Passwords – weak passwords are susceptible to brute force and dictionary attacks, giving patient attackers a leg up on your unsuspecting users (and cyber defenses). Ensure that you’re using multifactor authentication, password management software, and the latest NIST recommendations on password policies. 3. Unknown Assets – 60% of organizations believe they are aware of fewer than 75% of the assets with access to corporate information systems. In an organization with 10,000 assets, that means there are 2,500 unknown assets with access to the corporate network. There is no way to patch or manage these assets, and the organization certainly doesn’t know what they are. This is a huge vulnerability and, you guessed it, no CVE for this one either. IT asset inventory might be the most commonly overlooked major vulnerability in the enterprise. 4. Risky Browsing Activity – only 48% of organizations have adequate visibility into phishing risk, despite 89% believing that phishing is their highest risk vulnerability. Risky browsing and overall IT asset use leads to increased risk of phishing, malware infection, and a whole host of additional issues. 5. Missing or Weak Encryption – Encryption of both data-at-rest and data-in-transit is an information security best practice, yet only 29% of information security professionals have visibility into whether and where encryption is being used across their organization. 6. Misconfiguration – default usernames and passwords, disabled encryption, and inadvertent public sharing of cloud databases are but a few of the misconfiguration related vulnerabilities that hackers have exploited with great success. 7. Trust Relationships – it’s well known that attackers commonly move laterally across networks after exploiting a weak or vulnerable system. Since this vulnerability in trust relationships between systems is frequently overlooked, one weak system can lead to compromised of other, better protected critical systems. 8. Elevated Privileges – Nearly 1 in 5 organizations report that most or all users have more access privileges than required for their job, with 48% of organizations report at least some users with unnecessarily elevated privileges. More privileges means more risk – risk that you don’t need to take on. 9. Malicious Insiders – malicious insider activity is notoriously difficult to identify because these are the same individuals that need access to sensitive information in order to get their jobs done.
Blaming the CISO for a Cybersecurity Breach - Security Boulevard
The NYDFS Cybersecurity Regulation Explained
Step by Step Guide to Setup LDAPS on Windows Server - Microsoft Tech Community - 385362
How to install a PXE server. By following this tutorial, you will be… | by Zied Yaich | Medium
iT-Joe | Linux PXE Server
3D-printable cases for the Raspberry Pi High Quality Camera - Raspberry Pi
The USPS Isn’t Made of Superheroes, But It Is a Miracle
How to Fuzz Parameters, Directories & More with Ffuf « Null Byte :: WonderHowTo
Better, Faster AND Cheaper Vendor Risk Assessment? Yes!! | Pivot Point Security
What is Threat Modeling and How Does It Differ from Risk Assessment? | Pivot Point Security
How to Make Your VPN Faster - Why You have a Slow VPN | Security Gladiators
InfoSec Handlers Diary Blog
Experts hacked 28K unsecured printers to raise awareness of their securitySecurity Affairs
FBI arrested Russian national for recruiting employee of US firm to plant malwareSecurity Affairs
REvil Ransomware Operators Claim Valley Health Systems as New Victim - Security Boulevard
Proposal for HIPAA Modifications Coming By Year’s End
Equifax CISO Jamil Farshchi Reflects on Breach, Recovery
Elon Musk Says Tesla Saved From 'Serious' Ransom Attempt
COVID-19: Business Continuity Lessons Learned
7 Open Source Patch Management Software to Bootstrap Your Business
Build An Open Source AppSec Pipeline Using Github Actions – JerryGamblin.com
Bluescan - A Powerful Bluetooth Scanner For Scanning BR/LE Devices, LMP, SDP, GATT And Vulnerabilities!
Confessions of an ID Theft Kingpin, Part II — Krebs on Security
Confessions of an ID Theft Kingpin, Part I — Krebs on Security
5 Tips for Kickstarting Your Cyber Security Program - Delta Risk
1. Choose a Framework Over a Compliance Checklist 2. Network with Industry Peers 3. Collaborate with Other Departments to Document Policies and Procedures 4. Assign Responsibilities and Hold Everyone Accountable 5. Measure Program Metrics and Share Results "Given that the average total cost of a data breach clocks in at around $3.92 million, this is something you can’t afford to ignore."
Redefining What CISO Success Looks Like
Higher Education CISOs Share COVID-19 Response Stories
Michael Duff
How to manage traffic rules in Windows Firewall from an Excel Sheet
How To Properly Secure sysctl in Linux: Security Hardening Tips
ORACHKSUM v20.03 is out! - DBA - Rodrigo Jorge - Oracle Tips and Guides
Using PowerShell Data Types Accelerators to Speed up Coding
What Is VPN (Virtual Private Network)? How Does It Work?
Palo Alto Networks to Acquire The Crypsis Group for ...
Prepping an Oracle Database for a Cloud Migration
Basic database information: RAC/Single Instance, multi-tenant, OS version, database version, host memory, CPU/Core Performance information: DB Time/Elapsed Time CPU % Busy SGA/PGA Read and Write IO Throughput and MB per second DB CPUs
Ransomware Red Flags: 7 Signs You're About to Get Hit
Active Directory Will Show Multiple Login Failures Brute-Force Attacks Will Hit the Network Phishing Emails Land With Strange Domains The Network Starts Making a String of Questions About a Single Machine Security Tools Are Being Used in Environments They Weren't Assigned To Unusual Time Stamps Appear on VPN Connections Traffic Is Suddenly Redirected to Questionable Places on the Dark Web
SIEM: Log Monitoring Lab Setup with Splunk
Swap Detector: Open source tool for detecting API usage errors - Help Net Security
How to Enable Multiple Remote Desktop Sessions in Windows
Mistakes Most Students Make While Learning Programming | Codementor
How to Learn Programming with Zero Stress | Codementor
What is a Zero-Day Exploit? – Linux Hint
Build your own Zero-day or just capture someone elses???
Build Smart on Kubernetes: Hands-on Learning Journey – Build Smart. Build Secure. IBM Developer
Sourcegraph - Universal Code Search
DigitalOcean & Others Still Working On Core Scheduling To Make Hyper Threading Safer - Phoronix
How To Use Vagrant With Libvirt KVM Provider - OSTechNix
Linux Per Thread Queues Aim For Traffic Isolation, Higher Performance Networking - Phoronix
Best Online Markdown Editors That You Can Use for FREE
Tartube – A GTK+ 3 Front-end for Youtube-DL Video Downloader | UbuntuHandbook
How to Install Jitsi Meet on Debian and Ubuntu
Anti-Forensic: Swipe Footprint with Timestomp
4 Risk Mitigation Principles for the Pandemic Environment
Maintain parity of technical security controls between bricks-and-mortar and work-from-home environments; Change your business processes to reduce the risks in the shift to a remote workforce; Keep in mind that "cyber threat actors will never let a good crisis go to waste"; Update your information security certifications, especially your Payment Card Industry Report of Compliance.
Spies called in as cyberattacks again halt NZ stock exchange - Japan Today
Computer pioneer Arnold Spielberg, Steven's dad, dies at 103 - Japan Today
Spielberg and Charles Propster designed the GE-225 mainframe computer in the late 1950s while working for General Electric. The machine allowed computer scientists at Dartmouth College to develop the programming language BASIC, which would be essential the rise of personal computers in the 1970s and 80s.
UCSF Hack Shows Evolving Risks of Ransomware in the Covid Era - Bloomberg
UCSF ransomware attack: University had data protection but it wasn't used on affected systems – Blocks and Files
‘Schrems II’ requires a rethink of the CLOUD Act
The 'Shared Responsibility' Misnomer: Why the Cloud ...
[Webinar] 11k Vulns in First Half of 2020 as Patch Tuesdays Get Worse – RBS
VirtualBox & bridged networking no longer works
Tesla worked with the FBI to block a million dollar ransomware attack | Engadget
Are you a lurker, participant or a creator? - NevBlog
How Four Brothers Allegedly Fleeced $19 Million From Amazon  | WIRED
It all worked because Amazon is so huge that everything is automated. “overshipping” works by intentionally sending a company more goods than it ordered and billing for it. every product is given a unique identifier, a string of numbers called an Amazon Standard Identification Number. "The more our economic life moves online, the more we must ensure the integrity of our digital markets." - Audrey Strauss
DeathStalker cyber-mercenary group targets the financial sectorSecurity Affairs
DeathStalker
DIY category - Jonathans Blog
6 Signs Your Supply Chain Risk Just Shot Up
‘Hidden’ PHI in Medical Images Poses Risks
Wireless Pentesting Part 3 – Common Wireless Attacks - The Ethical Hacker Network
Zram, Zcache, and Zswap: Which One Is the Best For You?
use zswap
Managing Weeds in Warm Season Lawns | Home & Garden Information Center
Elon Musk will show a working Neuralink device on August 28th at 3 PM ET | Engadget
Alphabet's Verily begins offering stop-loss health insurance | Engadget
38 Japanese firms' authentication data stolen amid teleworking increase - Japan Today
Create a Keycloak Realm Using Admin REST API | Lisenet.com :: Linux | Security | Networking
Payers are working to meet deadline for interoperability mandate | Healthcare Finance News
There has been an exponential growth in clinical data over the past five years. Much of it is inaccurate.
Moving from YouTube to PeerTube
Popsicle - Multiple USB File Flasher for Linux
Deploy Keycloak Using Docker Swarm | Lisenet.com :: Linux | Security | Networking
10 Open Source/Commercial Control Panels For Virtual Machines (VM's) Management
Boost your CPU speed with Standard Edition 2 on ODA - Blog dbi services
Unable to Add/Remove Role: Windows Server Requires Restart | Windows OS Hub
Using Checkov for Infrastructure as Code Security Audits - Wahl Network
Thread by @SteveSyfuhs: Have you ever wondered what happens behind the scenes when you type your password into the Windows logon screen and hit enter? I'm waiting f…
Download Pre Installed VirtualBox Images for Windows, Linux and other systems - ITSMDaily.com
Ryobi Tools Still Going Strong – Scott Gruby's Blog
10 Windows Tricks every Java Developer should know
Various JVM flavors and why do you care?
Where does JVM fit in a JEE Application Server?
JVM – Basic Operations
JVM: Basic Framework
Windows 10: PowerShell Setup Script for customization | Born's Tech and Windows World
MITRE Releases 'Shield' Active Defense Framework
Patch Management Policy: A Practical Guide
What is Maze Ransomware? Find out everything you need to know about this threat!
Vulnerability scans and false positives: the importance of sanitising input - IT Governance UK Blog
Google Project Zero expert found 3 flaws in Apache Web ServerSecurity Affairs
CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
A Sysadmin’s Guide to Markdown Language
Should State and Local Governments Obtain Cybersecurity Maturity Model Certification? - Security Boulevard
Spain, France And Germany Report Most Coronavirus Cases Since Their Lockdowns : Coronavirus Live Updates : NPR
'Fallout' Tells The Story Of The Journalist Who Exposed The 'Hiroshima Cover-Up' : NPR
Top Spy Sue Gordon Spills Her Views On A President Who Passed Her Over : NPR
Facing The Anxiety And Uncertainty Of This Pandemic Starts With Acceptance : Shots - Health News : NPR
Microsoft says the pandemic has changed the future of cybersecurity in these five ways - TechRepublic
How IT-OT Security Has Changed in the Wake of COVID-19
The HttpOnly Flag – Protecting Cookies against XSS | Acunetix
A 10-point plan for addressing WFH cybersecurity challenges | CIO
In the next six months Automate, automate, automate – look for ways to ensure patching, password resets, change control, incident management, and other manual processes are automated wherever and whenever possible. Deploy multifactor authentication everywhere – one lesson that should be apparent to anyone is that you can't rely on passwords for anything, even inside an organization. Though not a silver bullet, multifactor may be the closest thing to a magical elixir cure-all that can reduce risk everywhere. Develop a BYOD plan, even if you normally don't allow BYOD – ensure you have a way for unmanaged devices to access organization resources without compromising on protection. This includes paying attention to home network security. Review your data governance policy and program – ensure that owners are identified and any policy issues associated with the content are addressed, such as jurisdictional issues with cloud environments. Upgrade the 3rd/4th-party compliance program – create a program of continuous compliance that does not require site visits. Rely on 3rd party audits, continuous reporting of activity and controls, and robust architecture for protection. Assess the need for location- or asset-oriented controls – work to eliminate the need for applications to run on a certain device or be in a certain location or on a certain network in order to provide protection.
Canadian delivery company Canpar Express suffered a ransomware attackSecurity Affairs
How to Safely Access Sensitive Data From Home – Part 2 - Hysolate
How to Safely Access Sensitive Data From Home - Part 1 - Hysolate
A PCI DSS Checklist for CIOs Worried About Work from Home Security - Security Boulevard
Leveraging FSSCC Cybersecurity Profile in the Financial Sector
Addressing the Cloud Security Readiness Gap - Security Boulevard
Two contributing factors to that gap include: 78% reported that cloud requires different security than on-prem. With security skills at a shortage, the ability to quickly ramp up on a new architecture and a new set of security capabilities can certainly slow progress. Only 8% of respondents claimed to fully understand the cloud security shared responsibilities model; they don’t even know what they’re responsible for; never mind how to implement the right policies and procedures, hire the right people, or find the right security technologies.
Linux-Fu: Your Own Dynamic DNS | Hackaday
Trash-80: What it meant and why it stuck - The Silicon Underground
Quick post about MBSA | >_
Start-WUOfflineScan -FilePath C:\temp\wsusscn2.cab -Verbose
Why InfoSec Creators Should Move to Direct Support Monetization | Daniel Miessler
More from the Courts, Self-Collection Part 5 | Xact Data Discovery
What Have the Courts Said About Self-Collection? | Xact Data Discovery
IT Collection Risks, Self-Collection Part 3 | Xact Data Discovery
Custodian Collection Risks, Self-Collection Part 2 | Xact Data Discovery
A Shortsighted Shortcut, Self-Collection Part 1 | Xact Data Discovery
How to talk to people who believe in QAnon | Engadget
Walt Disney's winning strategy - NevBlog
it shows how all their divisions weren’t separate projects, but rather fed into one another.
Parth - Heuristic Vulnerable Parameter Scanner
Quote Details: George Steiner: A chess genius is... - The Quotations Page
A chess genius is a human being who focuses vast, little-understood mental gifts and labors on an ultimately trivial human enterprise. George Steiner
Quote Details: Galileo Galilei: I have never met... - The Quotations Page
I have never met a man so ignorant that I couldn't learn something from him. Galileo Galilei
What Are the Ways to Respond to an Unintentional HIPAA Violation?
Are their any violation unintentional??
The Warren Buffett Pilot Story: The Importance of Making a NOT To Do List — My Money Blog
First, you write down a list of twenty-five career goals. Second, you do some soul-searching and circle the five highest-priority goals. Just five. Third, you take a good hard look at the twenty goals you didn’t circle. These you avoid at all costs. They’re what distract you; they eat away time and energy, taking your eye from the goals that matter more.
Tick-tock. Does your container know what time it is? | Enable Sysadmin
Fretted M.2 connector cause difficult-to-diagnose performance slowdown | Ctrl blog
Doc Searls Weblog · Bet on obsolescence
Child Care Jobs, Mostly Held By Women, Hit Hard By Coronavirus Crisis : Coronavirus Live Updates : NPR
COVID-19 Pandemic's Child Care Options: Risks And Strategies For Staying Safe : Shots - Health News : NPR
10 Awesome Educational Websites for Kids Worth Bookmarking
5 Weird Noises Inside Your Computer Explained | MakeUseOf
Kubernetes Lens: see your cluster under a different light – Marksei
What Do We Know About Transmission Of COVID-19 On Planes? : Goats and Soda : NPR
COVID-19 Financial Pressures Are Sinking Rural Hospitals : Shots - Health News : NPR
Free Refrigeration In Hot Climates | Hackaday
Linux-Fu: One At A Time, Please! Critical Sections In Bash Scripts | Hackaday
Simple MP3 Player Hides Home Automation Brilliance | Hackaday
How To Choose The Right GPS Module For Your Project | Hackaday
HOPE 2020 Delivers Historic Marathon Of Hacking | Hackaday
A Simple Script for Creating and Deleting Rolling ZFS Snapshots in FreeBSD | iceflatline
How I Organize Application Shortcuts in the Windows 10 Start Menu | iceflatline
Microsoft OneNote Keyboard Shortcuts for Windows and Mac
Pi Saves Vintage Mac Case From A Watery Grave | Hackaday
The Ever-Accelerating Automation Of Fast Food | Hackaday
GitHub - diimdeep/awesome-split-keyboards: A collection of ergonomic split keyboards ⌨
GitHub - sindresorhus/awesome: 😎 Awesome lists about all kinds of interesting topics
Inputs Of Interest: ErgoDox Post-Mortem | Hackaday
Pyre-Check - Performant Type-Checking For Python
U.S. GAO - Cybersecurity: DHS and Selected Agencies Need to Address Shortcomings in Implementation of Network Monitoring Program
Four Years Later, Off-Grid Office Shed Still Rocks | Hackaday
DSHR's Blog: Atlantic Council Report On Software Supply Chains
The report divides their survey into five "trends": 1. Deep Impact: State actors target the software supply chain and do so to great effect. 2. Abusing Trust: Code signing is a deeply impactful tactic for compromising software supply chains as it can be used to undermine other related security schemes, including program attestation. 3. Breaking the Chain: Hijacked updates are a common and impactful means of compromising supply chains and they recurred throughout the decade despite being a well-recognized attack vector. 4. Poisoning the Well: Attacks on OSS were popular, but unnervingly simple in many cases. 5. Downloading Trouble: App stores represent a poorly addressed source of risk to mobile device users as they remain popular despite years of evidence of security lapses.
DSHR's Blog: Optical Media Durability: Update
Jenkins Security Advisory 2020-08-17
Should State and Local Governments Obtain Cybersecurity Maturity Model Certification?
10 Good Open Source Speech Recognition Systems [2020]
Release Privatezilla 0.30.0 (Phoenix) 🐦 · builtbybel/privatezilla · GitHub
Which Public Cloud Should I Master First? « ipSpace.net blog
Do you have existing customers (or potential employers you’d love to work for) asking for specific public cloud skills? There’s your answer.
NetDevOps Concepts - Minimum Viable Product | The NTC Mag
MUST READ: IPv4, IPv6, and a Sudden Change in Attitude « ipSpace.net blog
=
Simple Trick for Determining 2.1mm or 2.5mm Barrel Jacks | Cool Tools
Many barrel jacks have a consistent 5.5mm outside diameter. But the inside diameter can vary, usually either between 2.1mm or 2.5mm. If you don’t have your digital calipers handy, you can determine this inside diameter with common objects: a toothpick, a ball point pen, or a test probe. The brass housing on a ball point pen is usually 2.2mm. If it doesn’t fit inside the barrel of your jack, then the jack is 2.1mm. If the pen easily fits inside, the jack is 2.5mm. A standard toothpick is 2.1mm. If it fits snugly in the jack, it’s a 2.1mm jack. Also, a common multimeter probe needle with fit closely inside of a 2.1mm jack and be very sloppy inside of a 2.5mm jack.
"How NOT to Measure Latency" by Gil Tene - YouTube
"How NOT to Measure Latency" by Gil Tene - YouTube
Everything You Know About Latency Is Wrong – Brave New Geek
The Importance of Certificate Discovery - Keyfactor
Storage Management Best Practices: Part 1 - Components In Motion
Jason Beaird Design Quote - NevBlog
“Users are pleased by design, but drawn to the content.” -Jason Beaird
Protecting Against Kubernetes Threats: Chapter 7 - Discovery | StackRox
Protecting Against Kubernetes Threats: Chapter 6 - Credential Access | StackRox
Protecting Against Kubernetes Threats: Chapter 5 - Defense Evasion | StackRox
Protecting Against Kubernetes Threats: Chapter 4 - Privilege Escalation | StackRox
Protecting Against Kubernetes Threats: Chapter 3 - Persistence | StackRox
Protecting Against Kubernetes Threats: Chapter 2 - Execution | StackRox
Protecting Against Kubernetes Threats: Chapter 1 - Initial Access | StackRox
Top 6 cybersecurity books for IT auditors
1. “Auditor’s Guide to IT Auditing” by Richard E. Cascarino 2. “IT Audit, Control, and Security” by Robert R. Moeller 3. “Human-Computer Interaction and Cybersecurity Handbook” edited by Abbas Moallem 4. “Implementing Cybersecurity” by Anne Kohnke, Ken Sigler and Dan Shoemaker 5. “Cyber Security and Privacy Control” by Robert R. Moeller 6. “Information Technology Control and Audit” by Angel R. Otero
WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network | Webroot
Zero Day Initiative — 15 Years of the Zero Day Initiative
Zero-Touch Provisioning for Cisco IOS ⁕ Vincent Bernat
How to Create a Helm Chart in Windows for Minikube | securitywing
Harmonize FinServ Cybersecurity Standards with the Financial Sector Cybersecurity Profile - Security Boulevard
Making Infosec Jobs Easier: Preventing Ransomware | Balbix
Walgreens Discloses Data Breach Impacting Personal Health Information of More Than 72,000 Customers – HOTforSecurity
Tibivi: Weekly Scheduler For When A Text File Isn't Enough - YouTube
How to use n8n and Raspberry PI to create workflows and automate APIs - peppe8o
Authenticating To Ansible Tower Via Windows Active Directory | Greg Sowell Consulting
Confederate flags still fly in Brazil | flyingpenguin
CCNA Training » All Old CCNA in one place
Intel Owl - Analyze Files, Domains, IPs In Multiple Ways From A Single API At Scale
Scan-For-Webcams - Scan For Webcams In The Internet
Now Is The Perfect Time For CISOs to Tame the Security Frontier - ZeroNorth
Remote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
Infosecurity.US - https://infosecurity.us - DEF CON 28 Safe Mode - Panel - 'D0 N0 H4RM: A Healthcare Security Conversation Panel'
All About the CISSP - Phoenix TS
Contrast Labs: Apache Struts CVE-2019-0230 and How to Block Attacks
Healthcare Data Breach Costs Rise - Security Boulevard
Diagnosing the Cybersecurity Challenges in Healthcare
It Takes Two. Why You Need Agentless & Agent-Based Scanning | Digital Defense, Inc.
Defensible risk management can improve your job security | Synopsys
How to Look Up MAC Addresses – Linux Hint
great look at the ip
Network scanning with Fierce – Linux Hint
How NAT traversal works · Tailscale Blog
System statistics: Linux stat commands to know | Enable Sysadmin
How your home network can be hacked and how to prevent it
CVE-2020-10029: Buffer overflow in GNU libc trigonometry functions?!? - Security Boulevard
Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global - Security Boulevard
Side Dishes Collection - Page 2 of 23 - Spend With Pennies
The importance of subject matter experts - SecureLink
Introduction to Cryptography - Security Boulevard
As Military Cyber Policies Change, Should Others Do the Same?
Web Crawler & User Agent Blocking Techniques - Security Boulevard
United States Air Force Partners with Pluralsight to Power Digital U Technology Skills Development Program - Security Boulevard
50 Cyber Security Podcasts We’re Listening to Now | Orca Security
Are You Using the Full Potential of Your SOC? 5 Trends That Will Reshape Modern Security Operations - Security Boulevard
Five Trends that Will Reshape Modern Security Operations 1.Threat Intelligence 2. Cloud-Managed Security 3. Threat Hunting 4. Machine Learning Algorithms 5. Automation
Exploited in the Wild, It Took Microsoft 734 Days to Patch this Vulnerability - Security Boulevard
The facts on CVE-2020-1464 Patch released 734 days after Microsoft was notified The vulnerability was known to be exploited in the wild Exploitation allows for installation of arbitrary malicious code Impacts all major versions of Microsoft Windows
10 Elements of the Most Effective Application Security Programs - Security Boulevard
1. Application security controls are highly integrated into the CI/CD toolchain. 2. Application security best practices are formally documented. 3. Application security training is included as part of the ongoing development security training program. 4. The ongoing developer security training should include formal training programs, and a high percentage of developers should participate. 5. Development managers are responsible for communicating best practices to developers. 6. Security issue introduction is tracked for individual development teams. 7. Formal processes and metrics track continuous improvement of application security. 8. Continuous improvement metrics are tracked for individual development teams. 9. Security issues are tracked during the code development process. 10. Automation risk aggregation tools roll-up risk to keep senior development leaders informed.
Creating Research Accounts for OSINT Investigations – We are OSINTCurio.us
CWE - 2020 CWE Top 25 Most Dangerous Software Weaknesses
Debian 9: Install PXE Boot server for automated install - Narrow Escape
How to Achieve 20/20 Visibility in Your OT Security - Blog | Tenable®
Signs You’re Following A Fake Twitter Account… – NixIntel
Cloud-Sniper - Virtual Security Operations Center
How to install Infection Monkey for breach and attack simulations on your network - TechRepublic
Why Cybersecurity Leaders Struggle to Answer the Question ‘How Secure Are We?’
In order to provide business context, security and risk management leaders must first be able to answer two key questions: 1. What is your organization’s core value creation? In manufacturing, the answer may be to make and sell widgets for profit. In healthcare, the answer may be to provide medical care to patients. In government, the answer may be to provide a service to the public, such as issuing driver’s licenses or taking care of trash disposal.  2. Which of your IT assets are crucial to delivering on that core value creation? For example, is there an ERP system or medical records app or database which, if taken offline, would cause your business operations to grind to a halt? Are there groups of users whose computers, if compromised, would expose key intellectual property or sensitive data that could prevent the organization from delivering on that core value? Is there a cloud environment which, if taken offline, could derail an important customer-facing web service, such as a banking or ecommerce site?
The Only Thing 'The Simpsons' Predicted Is Our Stupidity
Scientists Have Shown There's No 'Butterfly Effect' in the Quantum World
NBlog - the NoticeBored/SecAware blog: NBlog Aug 19 - IAAC Directors' Guides
Why Data Flow Mapping is Key to Web App Security Testing | Pivot Point Security
What is CUI and Why is It Such a Big Deal? | Pivot Point Security
Alternatives to Microsoft GCC High Cloud for CMMC Compliant Email and File Sharing | Pivot Point Security
What's The Difference Between The Internet And World Wide Web?
Internet connecting computers Web connecting people
Pilo: Raspberry Pi-Powered Lights-Out Remote Server Management for $60 or less
Raspberry Pi Off-World Bartender - Raspberry Pi
Use a Raspberry Pi To Catch Hackers with OpenCanary | Tom's Hardware
Managing Cybersecurity Program CostRafeeq Rehman – Personal Blog
Robocall Results from a Telephony Honeypot - Schneier on Security
Steel sheet giant Hoa Sen Group hacked by Maze ransomware operatorsSecurity Affairs
FritzFrog cryptocurrency P2P botnet targets Linux servers over SSHSecurity Affairs
FritzFrog
How to cyber security: Pain in the *AST
At the most fundamental level, IT security is about buying software, while application security is about building software. Said another way, IT security is about operating software, while application security is about developing software.
Kotlin: How JetBrains created Google's preferred Android programming language - TechRepublic
Incident Response- Linux Cheatsheet
Analysis: Why a NotPetya Lawsuit Was Dismissed
A forensics analysis from two independent data sources showed that the malware entered Heritage Valley's computer network systems "through a trusted virtual private network connection with Nuance," the lawsuit states.
University of Utah Pays Ransom to Avoid Data Disclosure
Australian Online Health Platform Fined for Data Practices
Australia's federal court fined HealthEngine, an online platform for booking medical appointments, 2.9 million Australian dollars ($2.1 million) on Thursday for improperly sharing personal data and altering online reviews.
Unified Endpoint Management Explained: (Why) Does Your Company Need One?
In comes UEM, a brand-spanking-new approach to granular, multi-device control, and management. With (an) Unified (and united) endpoint management system, you will be able to: Control, configure and monitor all types of devices (i.e. Mac, Windows, Android, Linux, etc.) from a single (and unique) dashboard. Updating, downgrading, and patching can be done from a single console. Push security policies to every device, regardless of the operating system. Simplify the BYOD enrollment process. Achieve better control over user-requested installation and uninstallation processes (e.g. system administrators can prevent users from installing a specific category of software on all devices hooked up to the corporate network).
SecGen - Create Randomly Insecure VMs
Webcast: What to Expect When You're Expecting a Penetration Test - Black Hills Information Security
Erman Arslan's Oracle Blog: Weblogic - Oracle BI Publisher -- AD authentication - Configuring LDAPs
Sysadmin university: How to write a README file | Enable Sysadmin
15+ practical Python projects for beginners | Codementor
Arduino Blog » Automated lawn irrigation with some valves and an Arduino Nano 33 IoT
Discover Kolibri: A Free Open-source Offline-First and Peer-to-Peer Complete Education System
5 Stages of Grief & CMMC Compliance
Windows 10 Secure AutoLogon - PowerShell - CCMEXEC.COM - Enterprise Mobility
How To Create Cross-Platform PowerShell Scripts -- Redmondmag.com
Nmap Tip – it's notes
Scan UDP port 5140 nmap -p 5140 -sU -v 192.168.1.1 Netstat list port with service running netstat -pnltu
Catching Intruders With a Trip Wire: The AIDE Package - Low End Box
Ethernet switch failure? | Nelson's log
Centos 8 + Windows domain authentication – SvennD
Ten things you need to know about Assigning Groups to Azure AD Roles - The things that are better left unspoken
Kentik Synthetic Monitoring Launched | APMdigest - Application Performance Management
AppDynamics Announces SAP Peak | APMdigest - Application Performance Management
AWS Solutions Architect Associate (SAA-C02) Exam Tips - Wahl Network
Re-visiting the SUN-2 emulator: Adding SLiRP! | Fun with virtualization
Selecting the Number of vCPUs and Cores for a Virtual Machine | Windows OS Hub
The Complete Guide to VMware Hybrid Cloud
VMworld 2020: Intrinsic Security Edition | Security Blog | VMware
Public Cloud Challenges – Part 8 – Scaling Storage and operational implications | CloudXC
The 5G BlackBerry could be 'the most American-made phone out there' | Engadget
20 percent of companies working remotely have suffered a breach
Organizations use outsourcing to meet cyber threats
Shadow IT in the 'Age of Coronavirus'
70 percent of ICS vulnerabilities can be exploited remotely
How to backup and restore LUKS header on Linux - nixCraft
Cyber News Rundown: Ransomware Targets Major Cruise Line | Webroot
Shared Responsibility for Cloud Security: What You Need to Know | CSO Online
From Our Kitchen | Epic
What is threat hunting? Taking an active approach to defense | CSO Online
The cybersecurity skills shortage is getting worse | CSO Online
Mechanizing The Methodology | Daniel Miessler
The central concepts in the talk are the following: Turn security tasks into small, granular questions that have answers Each answer should be a simple output that can become the input for another process Chain these questions and answers together into workflows Schedule them with cron Alert using Amazon SES Iterate as you learn new techniques.
Eulogy Delivered on August 2nd | Diary of a Network Geek
Privacy conscious cloud migrations: mapping the AWS Cloud Adoption Framework to the NIST Privacy Framework | AWS Security Blog
Center for Internet Security's Community Defense Model | CSO Online
The CCPA and employee data: A compliance checklist
Former Uber security chief arrested for covering up 2016 hack | Engadget
World's Fastest Internet Speed Hits 178,000 Gbps
Standardizing on Kubernetes, and more industry trends | Opensource.com
3 ways a legal team can enable open source | Opensource.com
path to yes
Top 7 Free Android Apps To Start A Business In 2020
GNU/Linux General Troubleshooting Guide for Beginners - LinuxConfig.org
NIST Asks A.I. to Explain Itself | NIST
Synthesis Of Vectors – Jordan Potti – Security Things
https://vloreblog.files.wordpress.com/2020/08/vmugkc-session-vcp-dcv.pdf
Using Runecast to Check Pure Storage Best Practices | davidstamen
Washington DC VMUG Presentation on Aug 20 2020 - TinkerTry home lab’s VMware vSphere 7.0 upgrade challenges, successes, and lessons learned. | TinkerTry IT @ Home
Upgrade your VCSA with peace of mind:… | Virtualisatieadvies
How to Maximize all Monitoring Tools | VMignite.com
Public Cloud Challenges – Part 4: Data Efficiency Technologies & Resiliency considerations. | CloudXC
5 Ways to Update An Agency’s Incident Response Plan | FedTech Magazine
The SASE Model: A New Approach to Security - HealthcareInfoSecurity
security access service edge (SASE) - uniting "zero trust," SD-WAN, data loss prevention, cloud access security brokers, and more into a cohesive platform
Ransomware Payday: Average Payments Jump to $178,000
Cloud Privacy: Well, I’ll just encrypt… | Born's Tech and Windows World
Idea 1: Protect cloud content from misconfiguration Idea 2: Protect cloud content from content scans OneDrive: Encrypted files quoted as ransomware
Action for GDPR violations against Oracle and Salesforce | Born's Tech and Windows World
Industrial plants and critical infrastructures (KRITIS) increasingly vulnerable to remote attacks | Born's Tech and Windows World
Caching vs Tiering - Architecting IT
How to Send Email Securely with PowerShell
Disable Windows Firewall: Discover the Many Ways
ReaR: Backup and Recover your Linux server with confidence | Enable Sysadmin
Earl Nightingale on your environment - NevBlog
“We become what we think about. People who think about becoming lawyers, become lawyers. A bad environment makes you think bad thoughts. A beautiful environment makes you think beautiful thoughts.” -Earl Nightingale
AutoUpgrade and the Partial Offline Backup Strategy
SQLcl and OCI Cloud Shell – Get Up and Running Quickly with your Autonomous Oracle Database – ThatJeffSmith
10 Resume and Interview Tips from Security Pros
Don't Let Someone Else Write Your Resume Generic vs. Specific Resumes Know How Your Experience Matters Common Resume Mistakes Social Media and the Job Search Why You Should Have a Cover Letter Where to Job Search Connecting with Recruiters: What You Need to Know How to Win Over a Hiring Manager Now is the time to be memorable and share your passion.
Ransomware Attack on Carnival May Have Been Its ...
Why Quality & Security Both Matter in Software
4 Cyber Incident Scenarios You Should Exercise and Test - Delta Risk
1. Phishing Attacks 2. Malicious Attachments and Malware 3. Password Requests and Other Suspicious Demands 4. Unauthorized Computers and Devices on Network
Incident Response: Windows Cheatsheet
54% of universities reported a data breach in the past year - IT Governance UK Blog
How COVID-19 Is Changing CISOs' Approaches to Security
Tim Rohrbaugh
Emerging Risk Management Issue: Vendors Hit by Ransomware
Medical Records Exposed via GitHub Leaks - HealthcareInfoSecurity
So You Want to Build a Vulnerability Disclosure Program?
Microsoft Put Off Fixing Zero Day for 2 Years — Krebs on Security
Build Medical Imaging Apps with These 10 Open-source Frameworks and Toolkits
The Law and Policy of Client-Side Scanning - Lawfare
TechTank Episode 2: How Has COVID-19 Transformed Work, Education, and Healthcare? - Lawfare
Zero Downtime Migration – Migrate to Exadata DB System (ExaCS) – Databases Are Fun
Five Thoughts on Oracle Security | Late Night Oracle Blog
6 Best CPU Stress Test and Performance Benchmark Linux Tools | FOSS Linux
https://dl.ubnt.com/guides/edgemax/EdgeSwitch_CLI_Command_Reference_UG.pdf
Bash Shell Ignore Aliases & Functions When Running Command - nixCraft
Terrascan open source software helps developers build secure cloud infrastructure - Help Net Security
Commandant's Professional Reading List - MCA
KnowledgeBase: You receive “the mS-DS-ConsistencyGuid attribute is already in use” when you change the source anchor on a Staging Mode Azure AD Connect installation - The things that are better left unspoken
DIY Apartment Painting -- Equipment Needed --Part 1 | Penniless Parenting
Oracle Solaris 11.4 SRU24 Released With A Plethora Of Package Updates - Phoronix
Getting Started in Cybersecurity
A Practical Introduction to Web Scraping in Python – Real Python
Change Color Scheme of Linux Terminal Based on Wallpaper
Documenting my various arm and IoT devices: quick overview – nullr0ute's blog
Taking Another Look at Plotly - Practical Business Python
How To Install OCS Inventory Asset Management Software on Ubuntu 20.04 LTS
What makes Java open source? | Opensource.com
Cloud firewalls for WordPress - LinuxAndUbuntu - Linux Tutorials, FOSS Reviews, Security News
Best Graphic Design Software for Linux in 2020 - OSTechNix
Useful FFmpeg commands for video editing — Andrej’s notes
CryptPad: Encrypted Open Source Google Docs Alternative
Using a Yubikey as a touchless, magic unlock key for Linux :: Kevin Liu
Ubuntu 16.04 LTS Systems Running Linux 4.4 Receive New Kernel Security Update - 9to5Linux
Medical Device Cybersecurity Threat Modeling - MDIC
Cybersecurity | National Public Health & Safety | MDIC
How To Install Vagrant On Linux - OSTechNix
Fix your ArcoLinux or Arch Linux computer with these 2 tips | Arcolinux.com
Sunrise Adopts Agile Culture and Accelerates Time to Market by 75% with Red Hat’s Hybrid Cloud Technologies
Red Hat Bringing Multipath TCP To RHEL 8.3 As A Tech Preview - Phoronix
Multipath TCP
Sysadmin university: How to document code and scripts in Linux | Enable Sysadmin
We didn't start the FIRE: The true history of financial independence
SELinux changes for KVM-separated (Kata) containers | Enable Sysadmin
Should I Keep My Laptop Battery Plugged In All The Time?
What Happens Inside A Battery Right Before Its Explosion?
How to Install and Use Docker on Ubuntu 20.04
Financial Independence Not As a Number, But Creating a Content Lifestyle — My Money Blog
"a successful life is one in which your basic needs for food, shelter, health care, and income are met and in which you have a sense of autonomy, mastery, and belonging." "Happiness is not a goal. It is a side effect of how you spend each day"
Facebook's AI can generate MRI images in minutes instead of an hour | Engadget
A look back at some of Toshiba's most memorable laptops | Engadget
vSphere 7’s vMotion interface notifies for time differences between vSphere hosts - The things that are better left unspoken
Technology giant Konica Minolta hit by ransomware attackSecurity Affairs
Threat actor leaked data for U.S. gun exchange site on hacking forumSecurity Affairs
Boeing's DEF CON Debut a Sign of the Times
Cross-Site Scripting Exploitation
Forensic Investigation: Autopsy Forensic Browser in Linux
Threat Hunting: Log Monitoring Lab Setup with ELK
How to Address Telehealth Cloud Security Risks
In the interview (see audio link below photo), Angle also discusses: Other top cloud security and privacy issues involving telehealth; Risks and regulatory concerns involving third-party vendors and subcontractors - including companies based outside the U.S. - that work with telehealth services providers; Identity and access management and authentication issues for telehealth services and the cloud; Security concerns for medical devices and remote patient monitoring systems. Angle is manager of vulnerability management at Trinity Health, a healthcare system based in Livonia, Mich., which includes 93 hospitals in 22 states. Angle, who has more than 20 years of security experience in both government and the private sector, is also the co-chair of the health information management working group for the Cloud Security Alliance and conducts research on cloud security.
Health Data Breach Tally Surges - HealthcareInfoSecurity
What is Vulnerability Management?
What Is Riskware? Cybersecurity Threats You Must Be Aware Of
From Red to Blue, and Maybe Purple Too – Jordan Potti – Security Things
DAGOBAH - Open Source Tool To Generate Internal Threat Intelligence, Inventory & Compliance Data From AWS Resources
AWS Report - A Tool For Analyzing Amazon Resources
Healthcare Exchange Standards: FHIR Security and Privacy Tutorial
$28 Billion for State Security, IT Upgrades Proposed
Bastillion - A Web-Based SSH Console That Centrally Manages Administrative Access To Systems
Medical Debt Collection Firm R1 RCM Hit in Ransomware Attack — Krebs on Security
Healthcare Giant Epic Scraps Its Return to the Office After Worker Outrage
Rational Cybesecurity for Business book Publication Announcement
CVE-2019-0230: Apache Struts Potential Remote Code Execution Vulnerability - Blog | Tenable®
The Hacker Quarterly Magazine - paritybit.ca
Threat actors managed to control 23% of Tor Exit nodesSecurity Affairs
100 Days To Offload
How hospitals can better protect themselves against data breaches - TechRepublic
CI Security attributed this year's sharp decline to some type of combination of five different factors: Healthcare organizations have continued to improve their cybersecurity programs. Some healthcare organizations misunderstood the HHS exceptions issued during the pandemic, leading them to believe they had a coronavirus-related extension beyond the required 60-day window. Healthcare organizations were simply too busy to report data breaches. Some healthcare organizations were hopeful that cybercrime groups, which promised to "go easy" on healthcare during the pandemic, would keep their word. But a number of reports on phishing campaigns and other attacks from cybercrime gangs and nation-states show that they actually took advantage of stressed healthcare facilities during the first half of the year. Some healthcare organizations have been so distracted by the pandemic and associated emergency operations that they have been breached but don't yet know it. This is the most ominous explanation, but seems plausible given that the average time it takes for healthcare organizations to spot a breach is 329 days, according to IBM's 2020 "Cost of a Data Breach" report.
Maze ransomware gang leaked Canon USA's stolen filesSecurity Affairs
Healthcare Industry Sees Respite From Attacks in ...
SANS Data Incident 2020 Indicators of Compromise | SANS Institute
Raspberry Pi: Projects, Tutorials, Models, Getting Started | Tom's Hardware
4 best practices to avoid vulnerabilities in open-source code | CSO Online
1. Know your software 2. Resolve dependency issues 3. Automate code scanning to find unknown unknowns 4. Beware of licensing risks
Locating Elements by CSS Selectors with Selenium – Linux Hint
Best YUM Command Examples For Everyone | Itsubuntu.com
Microsoft August 2020 Patchday issues | Born's Tech and Windows World
Amazon’s Alexa hacked, numerous vulnerabilities | Born's Tech and Windows World
Chris's Wiki :: blog/sysadmin/BlameAndWorksOnMyLaptop
HP-UX – /var is filling up and found /var/stm/logs/os – setaOffice
How I Collected a Debt from an Unscrupulous Merchant · mtlynch.io
Humidity and Temperature Monitoring – Stuff I'm Up To
Amazon Braket – Go Hands-On with Quantum Computing | AWS News Blog
Should I Upgrade to vSphere 7.0?
Book 4 of the IT Architect Series announced – vcdx133.com
Sodinokibi ransomware gang stole 1TB of data from Brown-FormanSecurity Affairs
CheckXSS - Detect XSS vulnerability in Web Applications
How to Conduct Wireless Recon on Bluetooth, Wi-Fi & GPS with Sparrow-wifi « Null Byte :: WonderHowTo
Goodbye Master Bream. Thank you for everything you did | Andrea Fortuna
Fast Bare Metal provisioning and infrastructure automation with MAAS
Our favorite open source writing tools | Opensource.com
Pen testing web applications with Metasploit’s “Wmap scanner” – Linux Hint
Getting started with Ansible 10 - Tags - YouTube
9 reasons I upgraded from AngularJS to Angular | Opensource.com
SQL Server: High SQLCONNECTIONPOOL Memory Clerk consumption - Blog dbi services
Oracle Database Appliance and CPU speed - Blog dbi services
Is Bandwidth A Precious Resource? | The Networking Nerd
The Grep of PowerShell [Tutorial]
Announcing the new Jupyter Book. Note: this announcement is cross-posted… | by Chris Holdgraf | Aug, 2020 | Jupyter Blog
Boosting manufacturing efficiency and product quality with AI/ML, edge computing and Kubernetes
Sysadmin careers: How my team distributes work over holidays, nights, and weekends | Enable Sysadmin
"Structural pattern matching" for Python, part 1 [LWN.net]
USB Forensics – Linux Hint
The Linux-based PinePhone is the most interesting smartphone I've tried in years
Keyboard cleaning 101 - Linux-natives
Indoor air quality HAT for Raspberry Pi boasts high-res TVOC sensor
Arduino Blog » Keep your pool under control with ARDUPOOL
davy wybiral: DIY Solar Powered LoRa Repeater (with Arduino)
An Average IT Org
The encrypted homelab
12 fast fixes for common Android problems | Computerworld
Portable Raspberry Pi Thermal Camera Can Read Your Temperature at a Distance | Tom's Hardware
Building a Raspberry Pi Thermal Imaging Camera - MLX90640 guide - Everything Smart Home
Understanding computer vision and AI, part 1
Profiling slow-running queries in Amazon DocumentDB (with MongoDB compatibility) : idk.dev
Making open decisions in five steps | Opensource.com
The process involves five stages: Early engagement Gather diverse participants Request feedback and encourage changes Ask for and encourage dissent Incorporate ideas
7 tips for giving and receiving better feedback | Opensource.com
Manage KVM Virtual Machines With Virsh Program - OSTechNix
SPDX for KF5/KF6 Status Update – cordlandwehr
IT leaders are unhappy with their data management and data warehousing solutions
What is (an) Intrusion Prevention System?
How to Create a Business Plan for a Car Dealership – Business Ideas
Improving Cyber-Oriented Education, One Cyber Clinic at a Time - Lawfare
Setting up multi-factor authentication on Linux systems | Enable Sysadmin
The Ancient Japanese Art of Sleeping In | Spoon & Tamago
Gov't appeals court order to recognize 'black rain' victims - Japan Today
Mount NFS filesystems with autofs     | Enable Sysadmin
Server Access Logging in Django using middleware - https://www.pythoncircle.com
PSPP - News: PSPP 1.4.0 has been released [Savannah]
Useful PuTTY Configuration Tips and Tricks
GIMIAS: An Open-source Modular Environment for Building Medical Imaging Applications
Basic Tips Every Dog Owner Should Know Of | Penniless Parenting
4 Benefits of Using Project-Based Learning in Business Studies – Business
Writing an Ideal Business Plan: Tips for Students – Startup
Here are the essential reasons for writing an ideal business plan: Establishing reachable business goals  Understanding the main objectives of the company/business Enabling others to comprehend your business policies    Maintaining focus and prioritizing your work
How to Build the Best Environment and Technology for School at Home - TidBITS
We crammed small, light desks into corners of different rooms in our house. This separation reduced the noise overlap from simultaneous online classes as we had to spread three “classrooms” around our home. When the weather is nicer (which means not too hot here in Phoenix), one of the desks moves to our back patio.
India will provide ID cards that store all your medical data | Engadget
BPATTY
https://iapp.org/media/pdf/resource_center/skillset_needed_to_implement_nist_privacy_framework_aug_2020.pdf
NSA releases a guide to reduce location tracking risksSecurity Affairs
What is Identity Governance Fatigue? | ForgeRock
What are Wildcard Certificates and SAN SSL Certs? - Keyfactor - Security Boulevard
PCI Compliance for the utilities industry | PCI Pal
Aligning Cybersecurity and Business: Nobody Said It Was Easy - Blog | Tenable®
Why Accidental Convergence Requires Purposeful Industrial Security
Cybersecurity and Back to (Virtual) School 2020: What You Need to Know | Webroot
State of the Software Supply Chain 2020 Report | Download
High performing developers release more often
HVAC Design Done Right - Manual J, S, T, & D
Windows 10 has a dangerous print spooler bug, and there is no fix
CVE-2020-1337 "An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system."
IT execs prepare for continued disruption
94 percent of businesses hit by cyberattacks in the last year
Disk.DiskMaxIOSize and the Blue Screen of Death – Cody Hosterman
Arguably, both. First off any time you need to change something on ESXi to get it to work with Pure I see that as a “solutions” bug. My team needs to do something to fix it. Either make the Pure platform better, or work with VMware to improve/change their product. One route we chased was improving the FlashArray–we do have the ability to support larger I/O sizes, but currently that is in directed availability (you need to ask us to enable it).
An IT story of getting out of burn-out and depression -
Encryption – CISSP Domain 3 – Professionally Evil Insights
The Risks Associated with OSS and How to Mitigate Them - Security Boulevard
Non-Persistent VMs with a Persistent User Experience - Make Your IT Admin’s Life Easier - Hysolate
Video: Managing Digital Certificates in DevOps - Keyfactor - Security Boulevard
Summit Medical Associates Discloses Ransomware Attack; Patient and Affiliate Information Potentially Impacted - Security Boulevard
“Summit’s investigation determined there was potential unauthorized access to its server between January 24, 2020 and June 5, 2020,” the company added. “Summit then worked to identify its patients whose personal information may have been accessible to the unauthorized actor. That process concluded July 28, 2020.”
12 Hot Takes on How Red Teaming Takes Pen Testing to the Next Level - Security Boulevard
Sectigo and ReFirm Labs Partner to Help Device Manufacturers Uncover IoT Firmware Vulnerabilities and Achieve Compliance - Security Boulevard
4 best practices for managing and tracking SSL and TLS certificates | CSO Online
Penetration Testing on PostgreSQL (5432)
How to Fix Unreliable USB Hard Drives, Stalled Transfers in Linux
echo options usb-storage quirks=0bc2:2312:u | sudo tee /etc/modprobe.d/blacklist_uas_0bc2.conf sudo update-initramfs -u
Exposing PXE Media as a local Yum Repo | Adam Young’s Web Log
Netwalker Ransomware Explained: What You Need to Know
Netenum - A Tool To Passively Discover Active Hosts On A Network
Internet Explorer and Windows zero-day exploits used in Operation PowerFall | Securelist
Failure to Wipe Client Data Leads to Lawsuits against Morgan Stanley | SENSEI ENTERPRISES, INC.
This Is What ‘Fiscal Dominance’ Looks Like – The Felder Report
A Princess Is Making Google Forget Her Drunken Rant About Killing Muslims
5 Critical Steps to Add CMMC Certification to Your ISO 27001 ISMS | Pivot Point Security
Cutting IT/InfoSec Costs with Fractional Resourcing | Pivot Point Security
How to read Lynis reports to improve Linux security | Opensource.com
SANS Institute
TeamViewer: Patch closes vulnerability CVE-2020-13699 on PC | Born's Tech and Windows World
Still Working From Home? Here Are 5 Ideas to Help You Thrive
ORACLE-BASE - Online Statistics Gathering for Bulk Loads in Oracle Database 12c Release 1 (12.1)
Defend Forward and Cyber Countermeasures - Lawfare
Facebook open-sources a static analyzer for Python code - Help Net Security
Adding a fiber link to my home network
Zero Downtime Migration – Migrate Your Database – Databases Are Fun
Zero Downtime Migration – Install And Configure ZDM – Databases Are Fun
Zero Downtime Migration – Preparations – Databases Are Fun
Zero Downtime Migration – Databases Are Fun
Upgrading in the cloud – VM DB Systems – Databases Are Fun
Canon Admits Ransomware Attack in Employee Note, Report | Threatpost
The fastest USB storage options for Raspberry Pi | Jeff Geerling
7 System Monitoring Tools for Linux That are Better Than Top
よ and ね: What Do These Particles Really Mean to Japanese Speakers?
Install latest version apache on ubuntu from source
RetroArch 1.9 Released with Many Goodies for Retro Linux Gamers - 9to5Linux
Cyber Career Pathways Tool | CISA
DEFCON 2020 Live Notes
Incident Response Analyst Report of 2019 | Securelist
Live From Black Hat USA 2020 – Day 2 – RBS
Cyber Career Pathways Tool | National Initiative for Cybersecurity Careers and Studies
The Real Security Innovation Gap - Lawfare
How to Run Any Linux Distribution Directly from Hard Disk in Ubuntu Using Grub Menu
The THRIVE Guidelines | Techrights
“To Help Realise Ideal Volunteer Efforts” (THRIVE).
How to install KVM on Ubuntu 20.04 LTS Headless Server - nixCraft
Photoflare: An Open Source Image Editor for Simple Editing Needs - It's FOSS
BIOS Update Dell Latitude E6440 on Linux – CubicleNate's Techpad
Book club: Testing Firefox more efficiently with machine learning by Mozilla
The danger of world writable NFS shares | by Security Shenanigans | Aug, 2020 | Medium
Live From Black Hat: Stress-Testing Democracy - Election Integrity During a Global Pandemic with Matt Blaze - Security Boulevard
Avamar Basics – Recovering a Virtual Machine as a new Guest | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
Code compiler pioneer Frances Allen dies at 88 | Engadget
Why Remote Working Is the Future of the IT Industry – Online Businesses
Podcast-Ep-2.1- ML, Automation & ShiftLeft at CapitalOne — A conversation with Vincent Weafer | by Alok Shukla | Aug, 2020 | ShiftLeft Blog
Will ISO 27701 Certification Make Your Business GDPR and CCPA Compliant? | Pivot Point Security
Smart Lock Vulnerability - Schneier on Security
Scoping web application and web service penetration tests
Cloud Security Challenges in the Next Phase of WFH - Security Boulevard
Spying on satellite internet comms with a $300 listening stationSecurity Affairs
IRFuzz - Simple Scanner with Yara Rule
Taowu - A CobaltStrike Toolkit
What You Need to Know About Salesforce’s Recycle Bin - Security Boulevard
Scanning a SOAP Web Service for Vulnerabilities | Acunetix
How to Find Additional Hidden Vulnerabilities During DAST Testing
Vulnerabilities in Active Directory: The CISO’s Achilles Heel - Semperis
Hackers can abuse Microsoft Teams updater to deliver malicious payloadsSecurity Affairs
What a Security Engineer & Software Engineer ...
Data Security in the SaaS Age: Quick Wins - Security Boulevard
Ransomware and Increased Attacks against Healthcare ~ Cyber Thoughts
How can GPUs help Solve Woes when Tableau Slows, keep Researchers from being Foes, or turn anyone into Work from Home Pros? | JK-47
Garmin Reportedly Paid a Ransom - HealthcareInfoSecurity
A Career in Cybersecurity ~ Cyber Thoughts
In the following 90 minute video, I outline: What is cybersecurity and why is it front and center as we adopt increasing levels of automation? Who are the main perpetrators of cyber attacks and what are their motivations? Why is cybersecurity so important today? What are the security frameworks being used to secure organizations? Why you should consider a career in cybersecurity What are those opportunities? How to develop a cybersecurity career strategy What security certifications and qualifications should you consider?
HealthScare: Prioritizing Medical AppSec Research
A Most Personal Threat: Implantable Medical Devices
Avoid Alert Fatigue: Web Application Firewall Installation, Configuration and Best Practices | Imperva
A Paramedic's Guide to Cybersecurity: Video
How An Electronic Medical Record System Flaw ...
Netwalker ransomware operators have stolen data from Forsee PowerSecurity Affairs
Web Application Security - A Complete Guide. Learn everything you need to know!
Windows Server 2012 R2: WSUS issues since July 1, 2020 | Born's Tech and Windows World
How to Disable IPv6 on Ubuntu - Low End Box
Congress Will Consider National Right-to-Repair Legislation for Medical Equipment
Surprising Economics of Load-Balanced Systems - Marc's Blog
Top 5 Cybersecurity Threats 2020: What ranks alongside ransomware and office suite account hijacking
Raspbian & Realtek 8192eu Wifi – Revisited – Stuff I'm Up To
Show-me Webcam: Building an open-source and high-quality webcam with a Raspberry Pi 0 W – Huan Truong's Pensieve
Most Organizations Need Increased IT Infrastructure Budget to Navigate Pandemic | APMdigest - Application Performance Management
A Look at Use Cases and Cost Justification for Utilizing CIS Controls
Apply the Mozilla Firefox STIG to Firefox on Ubuntu Linux 18.04 | slice2
My top 10 terminal shortcuts for Linux | Enable Sysadmin
Microsoft Azure for Free?
bash Environmental Variables Override
Live from Black Hat: Practical Defenses Against Adversarial Machine Learning with Ariel Herbert-Voss | Veracode Blog
Researchers Create New Framework to Evaluate User ...
Ripple20: More Vulnerable Devices Identified
SANS Cloud Security Curriculum | SANS
Canon USA Websites Offline Following Cyber Incident
Cyber Security Roundup for August 2020 - Security Boulevard
NBlog - the NoticeBored/SecAware blog: NBlog Aug 7 - what is operational resilience
Exploring the Forgotten Roots of 'Cyber' - HealthcareInfoSecurity
"What does 'cyber' even mean? And where does it come from?" writes Thomas Rid in "Rise of the Machines," his book-length quest to unravel cyber's origin story.
Chalumeau - Automated, Extendable And Customizable Credential Dumping Tool
Watch: Epic Uses Immunocompromised VP to Convince Workers the Office Is Safe
Live from Black Hat: Breaking Brains, Solving Problems with Matt Wixey - Security Boulevard
Richard Stallman: A Discussion on Freedom, Privacy & Cryptocurrencies
Patient Access to Health Data: Balancing Security and Usability
"We have to encourage the people who are downloading their health information to do their due diligence to make sure where they're downloading it, saving it and securing it stays safe," he says in a video interview with Information Security Media Group. "It goes back to the ... security that's built into the development cycle - not every app is coded the same way ... and not every app deals with encryption of the data the same way."
Forensic Investigation: Windows Registry Analysis
BEC Campaigns Target Financial Execs via Office 365 ...
Capital One fined $80 million over 2019 data breach | Engadget
The bank didn’t create an “effective” risk assessment system before moving key IT systems to the public cloud, the OCC said, and didn’t address the flaws in a “timely manner.”
Windows Incident Response: Toolmarks and Intrusion Intelligence
Remotely hack Mercedes-Benz E-Class is possible, experts demonstratedSecurity Affairs
World domination with cgroups part 8: down and dirty with cgroup v2
What Are Python Wheels and Why Should You Care? – Real Python
Learning NFS through server and client configuration  | Enable Sysadmin
Arduino Blog » Arduino X-ray imaging phantom simulates lung movement
An Introduction to ZFS A Place to Start | ServeTheHome
Upgrading to vCenter 7.0 via CLI – The Wifi-Cable
Parsing Log Files using PowerShell – Virtually Sober
Speeding up PowerShell Arrays – Virtually Sober
Using Terraform to Provision your Pure Storage Infrastructure | davidstamen
Don’t let legacy workloads limit modernization – Virtually Sober
How to update PowerShell scripts using PowerShell – Virtually Sober
Azure Credentials for Ansible – Made For Cloud
Download Pictures by Amateur Radio from the International Space Station - SpaceRef
How To Find Your GPS Coordinates on an Android Device
Setting Up Amavis and ClamAV on Ubuntu Mail Server - LinuxBabe
Easy Potatoes in Foil - Damn Delicious
Centos 8 – where did Lynx go ? – Made For Cloud
dnf config-manager --set-enabled PowerTools
Ansible, more than just SSH – Made For Cloud
How to Install Security Updates in Ubuntu
Pysa: An Open-Source Tool To Detect & Fix Security Issues In Python Code
Choosing between Ansible's copy and template modules | Enable Sysadmin
Understanding Web Security Checks in Firefox (Part 2) – Attack & Defense
How to Install Mumble and Murmur Voice Chat on Debian 10
The New Humanitarian | Limited disclosure after major ransomware hack
NSA releases Cybersecurity Advisory on GRUB2 BootHole Vulnerability > National Security Agency Central Security Service > Press Room
Add a repo and install a package the Ansible way | Enable Sysadmin
Growing fresh veggies with Rpi and Mender | Mender
Flash ISOs to Multiple USB Sticks on Linux with Popsicle - OMG! Ubuntu!
GitHub - aristocratos/bashtop: Linux/OSX/FreeBSD resource monitor
Install Mellanox MFT | panticz.de
Traditional IRA vs. Roth IRA - The Best Choice for Early Retirement
NVMe ZNS Makes It Into Linux 5.9 Along With MD RAID Fixes - Phoronix
Zoned Namespaces (ZNS)
5 reasons to run Kubernetes on your Raspberry Pi homelab | Opensource.com
An Overview of The BootHole Vulnerability | Avast
Researchers Make More Discoveries Around L1TF/Foreshadow - It's Not Good - Phoronix
Total cost of ownership: The hidden part of the iceberg – Build Smart. Build Secure. IBM Developer
Kubernetes is the future: But what does this future look like?
Is There Room for Linux Workstations at Your Organization?
A deep dive into Keycloak - Red Hat Developer
Healthcare industry proof of concept successfully uses SPDX as a software bill of materials format for medical devices - The Linux Foundation
N O D E
11 Best Free Test Automation Tools - LinuxLinks
Selenium Portable framework for testing web applications Appium Open source automation tool Robot Framework Python-based, extensible keyword-driven automation framework Cucumber Tool for running automated tests written in plain language Gauge Lightweight cross-platform test automation tool which uses Markdown Dojo Toolkit JavaScript toolkit that scales with your development process Galen Tool for testing layout and responsive design of web applications Katalon Studio All-in-one test automation solution Watir Web application testing in Ruby Serenity Test automation reporting library (previously known as Thucydides) Carina Java-based test automation framework that unites all testing layers
Android Mirroring App 'Scrcpy' Improves Shortcuts, Clipboard Support - OMG! Ubuntu!
TLS gets a boost from Arduino for IoT devices [LWN.net]
Install and Use collectl Performance Monitoring Tool on Ubuntu 20.04
How To Install Plex Media Server on Ubuntu 20.04 LTS - idroot
Shellshock In-Depth: Why This Old Vulnerability Won't Go Away
My new favorite utility: autojump | Christian Kastner
40 percent of world's Android phones at risk of hacking due to Qualcomm vulnerability | 91mobiles.com
How to Install SOPlanning on Debian 9 | LinuxHostSupport
GSoC 2020 Second Evaluation Report: Curses Library Automated Testing
Mycroft: an open-source voice assistant [LWN.net]
Tips for Teaching Yourself Kubernetes
Run a Hospital on a Raspberry Pi with GNU Health
Open source tool Infection Monkey allows security pros to test their network like never before - Help Net Security
ATX PC - DON' T THROW THAT AWAY!!! here is a BIG idea - YouTube
PE Tree: Free open source tool for reverse-engineering PE files - Help Net Security
How To Rescue Virtual Machines With Virt-rescue - OSTechNix
20GB of Intel internal documents were leaked online | Engadget
How to Install Socioboard on Ubuntu 20.04 - Social Media Lead Generation Toolkit - LinuxBabe
How to Automatically Build and Configure Custom Docker Images with Dockerfile - Part 3
How to Install, Run and Delete Applications Inside Docker Containers - Part 2
Install Docker and Learn Basic Container Manipulation in CentOS and RHEL 8/7 - Part 1
From zero to hero - Bootstrap with Ansible - DEV
Bootstrap with Ansible, part 3 | thbe.org
Bootstrap with Ansible, part 2 | thbe.org
Bootstrap with Ansible, part 1 | thbe.org
ESXi 6+ PXE Boot from Centos 8 – Nope? – Made For Cloud
I was able to install syslinux 4.05 on Centos 8 and lo and behold the build process works. Clearly something in syslinux 6 doesn’t like PXE booting ESXi. I’m not sure what yet, but hopefully this blog post at least gives people a workaround to a frustrating problem.
Scientists rename genes because Microsoft Excel reads them as dates | Engadget
The Growing Threat of DDoS Amplification Attacks – Technology
https://people.debian.org/~andi/Taiwan2018.pdf
Ansible proxmox_kvm gettting MAC address for PXE | Proxmox Support Forum
USB vs PXE installer — DebConf Videoteam Ansible documentation
Deploy virtual machines in Vmware Vsphere with Ansible and Cobbler PXE server – jamalshahverdiev
Vegetarian Delight: Eggplant On Braised Chickpeas | Fresh Tastes Blog | PBS Food
GitHub - cerberustesting/cerberus-source: User-friendly automated testing framework.
GitHub - cerberustesting/cerberus-source: User-friendly automated testing framework.
An open source solution for continuous testing at scale | Opensource.com
Using the HOSTS file to block Windows 10 telemetry? Microsoft now flags it as a severe security risk
Ideas for high impact careers beyond our priority paths - 80,000 Hours
The NSA tells military personnel to avoid using location services | Engadget
How to Install Ansible and Automate Your Ubuntu Server Setup - SpinupWP
{Hardware} bootstrapping with Ansible | Opensource.com - Arwebhosting Blog
Homemade Hummus That's So Easy To Snack On | Fresh Tastes Blog | PBS Food
Kick Off Fall with Pumpkin Mac n' Cheese | Fresh Tastes Blog | PBS Food
Grill Pizza for Extra Flavor | Fresh Tastes Blog | PBS Food
Pizza Rolls with Broccoli Rabe and Sausage or Ricotta and Leeks Recipe | PBS Food
Show and Tell: Ansible VMware deployment of Linux server from PXE : ansible
Ansible: Deploy VMs With PXE and Kickstart • Nathan Curry
Autumn Apple Olive Oil Cake Great for Snacking | Fresh Tastes | PBS Food
round of parchment
Make French Onion and Mushroom Pasta Bake | Fresh Tastes | PBS Food
Healthy Bok Choy Mushroom Stir Fry | Fresh Tastes Blog | PBS Food
Make-Ahead Chicken Meatballs | Fresh Tastes Blog | PBS Food
The Power of Routines | Parenting Tips & Advice | PBS KIDS for Parents
Apricot Granola Bars recipe | Fresh Tastes Blog | PBS Food
GandCrab ransomware hacker arrested in Belarus – Naked Security
How to Accurately and Continuously Identify and Remediate OSS Library Risks - Security Boulevard
Shiny New Linux Kernel 5.8 Comes With Highest Number Of Commits
New Open Source Security Foundation wants to improve open source software security - Help Net Security
How poor security practices from remote employees are wasting the time of IT staff - TechRepublic
The company scofflaws who don't follow IT policy, according to the report, are: Sprinters: More than two times more likely to cite convenience as more important than company security. Almost half believe that adhering to "strict password requirements" isn't worth the effort and time. Skeptical of IT capabilities: Those who break IT policies are 50% more likely to claim that it's unrealistic for businesses to oversee all devices and apps used by employees. They also allege that the IT department "is more of a hindrance than a help." Millennials and Gen Z: Compared with colleagues ages 56 and older, 18- to 39-year-olds are three times more likely to admit they do not always follow IT policies.  IT staff admissions: 25% said they don't enforce security policies universally 4% forgo all policy enforcement because they don't want to deal with the common and frequent concern of productivity vs. managing policies 38% do not strictly enforce security policies because the "organization's method for monitoring is not robust" 29% agreed "it's just too hard and time consuming to track and enforce" 28% said "our employees get more done if we just let them manage their own software" 33% said strict password requirements at work aren't worth the hassle How IT staff feel about EPMs: 89% of IT departments said a password manager has measurable impact on security 57% who use EPMs report it's a time-saver 45% said it reduces the time they spend on the mundane 37% said it enhances productivity 26% said it reduces breaches and attacks 26% claim it creates happier employees
Computer mouse co-inventor William English dies at 91 | Engadget
How to Easily Save Every Images On A Web Page In Firefox
Journey of a Linux DevOps engineer | Enable Sysadmin
"The advantage of a bad memory is that one enjoys several times the same good things for the first time." Friedrich Nietzsche
Protect Apache Against Brute Force or DDoS Attacks Using Mod_Security and Mod_evasive Modules
Mod_Security Mod_evasive
How to Install and Use Linux Malware Detect (LMD) with ClamAV as Antivirus Engine
Linux Malware Detect (LMD)
AdminLTE - Jinja2 Template | Codementor
Security-Oriented Kodachi Linux 7.2 Released with One of the Best Secure Messengers - 9to5Linux
Network Admin Stuff: BGP Network Statement
The Problem With Oracle : If a developer/user can't do it, it doesn't exist. | The ORACLE-BASE Blog
simply put: mysql has a superior developer experience. postgres has a superior DBA experience. DBA is not really a job anymore, so I pick the developer experience every time.
What’s New in Azure Active Directory in July 2020 - The things that are better left unspoken
Considering Hyperconverge Infrastructure (HCI) for your Datacenter? — ThinkCharles.net
Maze Ransomware operators published data from LG and XeroxSecurity Affairs
9 container security tools, and why you need them | CSO Online
"Tools for securing containers and their platforms not only enable you to improve the security posture of your containers but integrate security more tightly into the entire container lifecycle, from development to runtime." Alert Logic Managed Detection and Response (MDR) Anchore Enterprise Aqua Security Deepfence NeuVector Palo Alto Networks Prisma Cloud Qualys Container Security StackRox Kubernetes Security Platform Sysdig Secure
VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics - TechRepublic
Sharpening Your Defenses With MITRE ATT&CK’s New Sub-Techniques
The Future of Work: WFH Changing Cybersecurity - Security Boulevard
NetWalker ransomware operators have made $25M since March 2020Security Affairs
Top 7 Security Hardening Tips for CentOS 8 / RHEL 8 Server
1) Set up a firewall 2) Disable unused / undesirable services 3) Secure critical files 4) Secure SSH protocol 5 ) Define a limit for password attempts 6) Set up an intrusion prevention system (IPS) 7) Regularly update your server
Practice parsing text in NLP with Python | Opensource.com
EU Issues First-Ever Sanctions for Cyberattacks
Linux Kernel 5.8 "Biggest Release of All Time" Released!
Apache Struts research, Part 3: Exploitation | Synopsys
Turn off Monitor using CLI – CubicleNate's Techpad
Cnitch - Container Snitch Checks Running Processes Under The Docker Engine And Alerts If Any Are Found To Be Running As Root
Prototyping, configurations, labs - The ForwardingPlane
Oracle AutoUpgrade between two servers
Report Finds Cloud Security Concerns Warranted - Security Boulevard
More than 80% of organizations have at least one neglected, internet-facing workload that is either running on an unsupported operating system or has remained unpatched for more than 180 days.
Video : Multitenant : Running Scripts Against Multiple Pluggable Databases Using catcon.pl | The ORACLE-BASE Blog
pluggable databases (PDBs) in a container database (CDB).
Linux-Fu: Help Messages For Shell Scripts And Here Documents | Hackaday
Keynote - Dr Kevin Jones - Cyber Security in the modern distributed enterprise: protecting Airbus - YouTube
Vulnerability Management In A Fujiwhara Effect – RBS
MIT AI system knows when to make a medical diagnosis or defer to an expert | Engadget
Elastic Achieves FedRAMP Authorization | APMdigest - Application Performance Management
List of data breaches and cyber attacks in July 2020 ­– 77 million records breached - IT Governance UK Blog
Patch Priority Index for July 2020 - The State of Security
PCI compliance: 4 steps to properly scope a PCI assessment | CSO Online
Start with a self-assessment to determine requirements Know where card data goes Limit risks to reduce scope Build a year-round PCI program
PowerCLI: Get All Snapshot Information | PeteNetLive
Get-Snapshot * | Select-Object -Property VM, Name, SizeGB, Children | Sort-Object -Property sizeGB -Descending | ft -AutoSize
Garmin reportedly paid millions to resolve its recent ransomware attack | Engadget
Control Android Devices From A Desktop With scrcpy (Ubuntu, Fedora, Debian, Linux Mint Installation) - Linux Uprising Blog
What is the Cybersecurity Maturity Model Certification?
How to Clone or Backup Linux Disk Using Clonezilla
Business as Unusual? Eighteen Observations on eDiscovery Business Confidence in the Summer of 2020
ZFS quick command reference with examples - UnixArena
Five Strategies for Building Relationships Remotely - Lighthouse
The End of Life Hacking
Flexibility and transparency: The keys to good remote leadership
Why making mistakes makes me a better sysadmin | Opensource.com
Why Feedback Rarely Does What It’s Meant To
How I Learned to Stop Worrying and Love RAIDZ | Delphix
Microsoft told employees to work from home. One consequence was brutal | ZDNet
FBI issued a flash alert about Netwalker ransomware attacksSecurity Affairs
Below the recommended mitigations provided by the FBI: Back-up critical data offline. Ensure copies of critical data are in the cloud or on an external hard drive or storage device. Secure your back-ups and ensure data is not accessible for modification or deletion from the system where the data resides. Install and regularly update anti-virus or anti-malware software on all hosts. Only use secure networks and avoid using public Wi-Fi networks. Consider installing and using a VPN. Use two-factor authentication with strong passwords. Keep computers, devices, and applications patched and up-to-date.
Java ternary operator – Linux Hint
RAID and RAIDZ
USENIX Enigma 2020 - Reservist Model: Distributed Approach to Scaling Incident Response - YouTube
Linux's exFAT File-System Driver Can Now "FSCK" As Fast As Windows - Phoronix
Java Constructor Tutorial – Linux Hint
Quickly Build Virtual Machine Images With Virt-builder - OSTechNix
YOU... SHA-1 NOT PASS! Microsoft magics away demonic hash algorithm from Windows updates, apps • The Register
Microsoft Patch Tuesday July 2020: my new open source project Vulristics, DNS SIGRed, RDP Client and SharePoint | Alexander V. Leonov
A Homebrew Radio, As All The Best Homebrew Radios Should Be | Hackaday
The ultimate guide on Virtual Hosts: how to host multiple apps on one server – Marksei
8 tips for running a virtual hackathon | Opensource.com
HTTP/3 logo | daniel.haxx.se
Protect Your VPS With an Electronic Pitbull: Active Firewalls - Low End Box
How Laughing Could Help Your Career
Beautiful, Secure, Privacy-Respecting Laptops & Phones – Purism
For Parents, Coronavirus Child Care Options Come With Trade-Offs : NPR
Option 1: Step back from the workforce Option 2: In-home day cares Option 3: "Pandemic pod"
Opinion: 75 Years On, Remember Hiroshima And Nagasaki. But Remember Toyama Too : NPR
PHOTOS: India's Ancient Root Bridges Hold Lessons For The Modern World : Goats and Soda : NPR
jing kieng jri
How to Manage the Huge WinSxS Folder in Windows 10
How to Fix Common Microsoft Outlook Issues: 7 Tips to Try
Vintage Computer Federation – VCF — A user group for computer history hobbyists
VPR Podcast Directory
Cloudsplaining - An AWS IAM Security Assessment Tool That Identifies Violations Of Least Privilege And Generates A Risk-Prioritized Report
Cloudsplaining
Four individuals charged for the recent Twitter HackSecurity Affairs
New Win7 Extended Security Updates licensing package @ AskWoody
Let's hear it for sys admins -- IT satisfaction soars during remote working
It finds that 88 percent of respondents are satisfied with their IT team's performance and 86 percent say they're confident they understand IT's role. Considering that over the last few months many IT professionals have faced some of the most difficult challenges in their careers, employees' high satisfaction with their performance is a major indication of their success.
Weasley Clock - Google Photos
ZFS Capacity Calculator - WintelGuy.com
5-disk ZFS; RAIDZ1 or RAIDZ3? | iXsystems Community
ZFS Raidz Performance, Capacity and Integrity Comparison @ Calomel.org
5x 4TB, raidz1 (raid5), 15.0 TB, w=469MB/s , rw=79MB/s , r=598MB/s 5x 4TB, raidz3 (raid7), 7.5 TB, w=116MB/s , rw=45MB/s , r=493MB/s
The 'hidden' cost of using ZFS for your home NAS
Anatomy of a Linux Pluggable Authentication Modules (PAM) configuration file | Enable Sysadmin
Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand – Naked Security
NBlog - the NoticeBored blog: NBlog July 29 - boost your ISO27k ISMS with SecAware Take-off
What’s the Cost of ISO 27701 Certification? | Pivot Point Security
CMMC and ISO 27001 Audit Requirements Compared | Pivot Point Security
SEC510: Multicloud Security Assessment and Defense | SANS | Cloud Security
Updates provided by Red Hat for BootHole cause systems to hangSecurity Affairs
North-Korea hackers targeted US defense and aerospace companiesSecurity Affairs
Hunting 0-days in Cisco Data Center Network Manager (DCNM) with ShiftLeft Ocular | by Suchakra Sharma | Jul, 2020 | ShiftLeft Blog
How to set up passwordless SSH authentication for Ubuntu Server - TechRepublic
How to find and fix vulnerable default credentials on your network - TechRepublic
How to Build the Most Effective Information Security Framework
The Fuzzing Files: The Anatomy of a Heartbleed
Twitter hack of July 2020: First arrests | Born's Tech and Windows World
That Time When I Learned My First Lesson for a SysAdm. | The Doom'd Net
BootHole issue allows installing a stealthy and persistent malwareSecurity Affairs
7 Best Practices for Securely Enabling Remote Work - Security Boulevard
Ditching Spreadsheets for Certificate Lifecycle Automation | Keyfactor - Security Boulevard
Bring in the A-Team   If you’re responsible for running PKI in the organization, you typically don’t control or manage the certificates issued from it – your system and network admins do. But the teams that cause you the most pain can be your biggest asset here. Figure how they’re getting certificates (from an authorized CA or elsewhere) and how much time it takes them to provision, install and renew those certificates on their devices and applications.  Map it out & identify your gaps  Take what you’ve learned and map it out. Nothing is more powerful than a whiteboard session with your A-Team. Take time to map out your CA infrastructure, applications, and certificate request, issuance and renewal workflows. Once you get the process out of your head and onto a whiteboard, you’ll be able to quickly identify gaps and inefficiencies.  Define your project requirements  Now that you’ve identified the problem, it’s time to outline your success criteria, core capabilities of an ideal solution, and how that can be accomplished using existing in-house resources vs a new product. Don’t limit your requirements to a single use case (we see this far too often with PKI teams). Think about all of your certificate needs now and into the future.  Know what you’re up against  According to Gartner analysts, “Security and risk management leaders are often unaware of the scope or status of their X.509 certificate deployments.”* These unknowns leave you unequipped to do your job. Even if you haven’t experienced a SEV1 outage, you need to clearly communicate the risks and operational costs of outages  or certificate vulnerabilities in your network.   Nail the ROI   Don’t let budget be a blocker. Define the cost of buying a solution vs delaying the project. If you invest in certificate lifecycle automation today, how much will it save over the next five years? How much productivity is lost by delaying to next year? If you’re trying to break free from hours of manual work spent on managing certificates, this is the key to your success. 
Bash Tips and Tricks – Professionally Evil Insights
Why is Dynamic Analysis an Important Part of You AppSec Mix? - Security Boulevard
Announcing Veracode Security Labs Community Edition - Security Boulevard
Dynamic Application Security Testing: DAST Basics - Security Boulevard
Dynamic Application Security Testing: DAST
Securing Medical and Hospital Devices on GE Healthcare’s CARESCAPE Network - Security Boulevard
Cyberattacks on Applications Grow Exponentially, Pose Serious Risk - Security Boulevard
4 FAQs to help master KVM management
VPXD crashes because of high memory. | Techbrainblog
Penetration Testing Lab Setup:MS-SQL
Secure DNS and DNSSEC – Threat Intelligence in a Drifting E-Threat Landscape
Privileged Account Management 101: How Can Privileged Accounts Compromise Your Security
IBM report: Average cost of health care data breach is $7.1M
data breach costs health care organizations $7.13 million on average, an increase of 10% over last year, and the study found customers’ personally identifiable information was exposed in 80% of incidents.
USENIX Enigma 2020 - Internet Infrastructure Security: ... - YouTube
Penetration Testing is Red Teaming – Jordan Potti – Security Things
So what is the difference? Penetration Testing typically has the goal: Find all the vulnerabilities in this subnet, web app, host, network, . Red Teaming has the goal: Emulate an adversary with as much realism as possible. Penetration Testing usually has a narrow scope; set of IP’s etc. Red Teaming usually has a massive scope; phishing, entire external perimeter, physical etc. I see penetration testing as an audit function, validating controls, testing for common vulnerabilities, etc. I see red teaming as a holistic organization security meter; testing the blue team, user security awareness as well as determining that path of least resistance to total organization compromise.
Elk + Osquery + Kolide Fleet = Love – Jordan Potti – Security Things
Automating the detection of Mimikatz with ELK – Jordan Potti – Security Things
Using ElastAlert to Help Automate Threat Hunting – Jordan Potti – Security Things
Honey Accounts – Jordan Potti – Security Things
HTTP Security Headers – Jordan Potti – Security Things
Kubei - A Flexible Kubernetes Runtime Scanner
dazzleUP - A Tool That Detects The Privilege Escalation Vulnerabilities Caused By Misconfigurations And Missing Updates In The Windows OS
Phishing with SAML and SSO Providers – Jordan Potti – Security Things
Breaking trust: Shades of crisis across an insecure software supply chain - Atlantic Council
Byzantine Generals And Building a More Trusted and Resilient World | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Jun, 2020 | Medium
Penetration Testing is Red Teaming – Jordan Potti – Security Things
Is Your Chip Card Secure? Much Depends on Where You Bank — Krebs on Security
Chris's Wiki :: blog/linux/ZFSOurSparesSystemV
Docker on Proxmox | It's full of stars!
Happy Birthday, Windows 10! - The things that are better left unspoken
History to Timesheets – Stuff I'm Up To
Chris's Wiki :: blog/sysadmin/IPMISharedInterfaceProblem
Sandworm details the group behind the worst cyberattacks in history - The Verge
July 31, 2020: Celebrate "System Administrator Appreciation Day" Today
This 24 hour celebration is an honest way to feel proud of a person who: Analyze potential issues and logs. Keep himself/herself updated with new technologies and integrate it into data center. Performs routine audit of software and System. Updates System. Apply patches. Configure System and Software. Add and Configure new hardware and software. One person whom you trust for security, project documentation. Troubleshoot and Performance System Tuning. Creates, Manage and Maintains Network Infrastructure.
https://insidecybersecurity.com/sites/insidecybersecurity.com/files/documents/2020/jul/cs2020_0217.pdf
APT trends report Q2 2020 | Securelist
Joby Gorillapod Rig is a do-it-all home for your DSLR camera - 9to5Toys
Chris's Wiki :: blog/sysadmin/IPMIPortIsolatedNetwork
BootHole vulnerability in GRUB2 puts Linux and also Windows Secure Boot at risk | Born's Tech and Windows World
10 cheat sheets for Linux sysadmins | Opensource.com
HPC on Azure: Benefits and Best Practices – Notes from MWhite
Using Qemu in 2020 | Fun with virtualization
Homelab – 2012 to 2019 AD upgrade | Patrick Kremer
Tomcat vs. JBoss: Compare features of these Java app servers
Getting started with Ansible 06 - Writing our first Playbook - YouTube
Getting started with Ansible 05 - Running elevated ad-hoc Commands - YouTube
Getting started with Ansible 04 - Running ad-hoc Commands - YouTube
Getting started with Ansible 03 - Setting up the Git Repository - YouTube
Getting started with Ansible 02 - SSH Overview & Setup - YouTube
Getting started with Ansible 01 - Introduction - YouTube
Meet Karmbian, an ARM Linux Distro for Ethical Hackers Based on Kali Linux and Armbian - 9to5Linux
Linux runs on 500 of the top 500 supercomputers | Network World
https://www.issa.org/wp-content/uploads/2020/07/ESG-ISSA-Research-Report-Cybersecurity-Professionals-Jul-2020.pdf
Hacking Summer Camp: Memory Analysis Guide, Part 1 | CQURE Academy
Bouncing Back from the Pandemic A Step-By-Step Guide for MSPs | Webroot
Set-up a virtual ‘discovery’ meeting to discuss with them what their situation really is? This should be a (perhaps painfully) honest conversation about the state of the business and what obstacles stand on the way of then getting back to “business as usual.” Devise an agenda based on the services you provide today and the associated costs. Based on the client’s challenges (or strengths) what is affordable what can maybe be minimized? Has the business direction changed at all? Many SMBs may be looking to pivot considering COVID-19. Aim to be flexible (while remaining profitable) and willing to accommodate the period between their business restarting and establishing a new normal. Ask yourself if taking a slight hit in monthly income or margins is an acceptable sacrifice to make in order to help keep a potentially long-term client afloat? Next, work with a client to draw up a joint “Recovery Plan” with a timeline for scaling back up the workload and how you can specifically assist with their recovery. This may involve stressing the costliness of a data breach, downtime, and other ways your services help the clients bottom line suffering. Finally, schedule regular client account reviews (hopefully, you already have some version of these in place) to monitor technology-related pain points and assist with addressing them as reasonably as possible.
Doki, an undetectable Linux backdoor targets Docker ServersSecurity Affairs
Ten Cybersecurity Lessons Learned About Working From Home | SENSEI ENTERPRISES, INC.
1. Home networks are 3.5 times more likely to have at least one family of malware than corporate networks. 2. Sharing the device you use for law firm work with family members is a bad idea. 3. Zoom is currently the choice of clients/potential clients. 4. Make sure your confidential client conversations are kept private. 5. Employee security awareness training is more important than ever. 6. Have a Work-From-Home Policy 7. Consider issuing firm-owned laptops so that you control the security of devices used at home. 8. There are options for home users "competing for bandwidth." 9. Utilize a Virtual Private Network (VPN) for remote connecting to the firm network. 10. Prioritize lawyer Wellness https://senseient.com/wp-content/uploads/WFH-Cybersecurity-Lessons.pdf
Risk Register Examples for Cybersecurity Leaders - Security Boulevard
Risk Description: Describe the risk being measured and how it threatens the organization. Cause: The event or trigger that causes the risk to happen. Result or Impact: The impact your organization faces if the risk occurs. Likelihood: How probable the risk is to happen to your company. Outcome: How detrimental the risk can be if it happens. Risk Level: How high of a priority the risk is to your organization based on your risk matrix. Cost: Expense to mitigate the risk or minimize its impact as much as possible. Mitigation Actions: What actions were taken to mitigate the risk.
87% of Americans view data privacy as a human right, but most still use risky security practices - TechRepublic
87% of Americans view data privacy as a human right
| InsideCyberSecurity.com
How To Check RAM on Linux – devconnected
23 CentOS Server Hardening Security Tips - Part 2
20 CentOS Server Hardening Security Tips - Part 1
Red Hat Enterprise Linux runs into Boothole patch trouble | ZDNet
In practice, the only vulnerable Linux systems are ones that have already been successfully breached by an attacker.
Tsuchiya Kaban Creates Leather Bag Specifically for Carrying Watermelon | Spoon & Tamago
Congress is starting to understand how Silicon Valley works | Engadget
USENIX Enigma 2020 - Privacy at Speed: Privacy by Design for Agile Development at Uber - YouTube
How To Check RAM on Linux – devconnected
DNS Security 101: The Essentials You Need to Know to Keep Your Organization Safe
ICS/SCADA Wireless Attacks - Security Boulevard
Kyoto’s New Ace Hotel Designed by Kengo Kuma | Spoon & Tamago
8 Tips for Crafting Ransomware Defenses and Responses
Android 10-based LineageOS 17.1 available for the Amazon Fire HD 8 (2018) - NotebookCheck.net News
What Does Schrems II Mean for the U.K.? - Lawfare
Leader of Hacker Gang Sentenced to 9 Years For Hospital Malware | WIRED
Wesley McGrew
Sysadmin careers: Seven ways to market your sysadmin skills | Enable Sysadmin
8 Ways to reduce your Cloud spend - Anto Online
How to Install i-doit Asset Management Tool on Ubuntu 20.04 LTS
Mitigating BootHole – ‘There’s a hole in the boot’ – CVE-2020-10713 and related vulnerabilities | Ubuntu
Improved systemd integration with Podman 2.0 | Enable Sysadmin
Securing Home Assistant with Cloudflare
Manage Debian unattended-upgrades – Linux Hint
Ivan Ristić: Compiling Apache with static OpenSSL libraries
Apache OpenSSL static
Keep Your Surveys Private With Nextcloud Forms | TFiR: The Fourth Industrial Revolution
How to Install InvoiceNinja on Ubuntu 20.04 Server with Apache/Nginx
IT meets behavior science: Driving change by understanding the 8 emotional stages | Enable Sysadmin
The emotional roadmap to change has eight stages Stage 1: Excitement Stage 2: Confusion Stage 3: Disagreement Stage 4: Countering Stage 5: Avoidance Stage 6: Acceptance Stage 7: Embracing Stage 8: Improvement
Intelspy - Perform Automated Network Reconnaissance Scans
Survey of Supply Chain Attacks - Schneier on Security
Many Cyberspace Solarium Commission recommendations expected to become federal law | CSO Online
LifeSpan Health System Hit With $1 Million HIPAA Fine
What is the Cybersecurity Maturity Model Certification (CMMC)? - Security Boulevard
The Garmin Ransomware Hack Is Horrifying
Making Infosec Jobs Easier: Keeping Systems Patched - Security Boulevard
7 Challenges in Keeping Systems Patched 1. Inventory 2. Keeping up with alerts from your existing tools 3. Difficulty in identifying vulnerable systems 4. Issues with scan targeting 5. Broad risk coverage 6. Prioritization 7. Patching SLAs
GitHub - deletescape/sloot: loot source code from sonarqube
Source Code Of Microsoft, Adobe, AMD & 50 Others Leaked Online
Instagram OSINT with python tools | Hacker Milk
ODA: odacli now supports Data Guard in 19.8 - Blog dbi services
Experts: Devastating ransomware attack on Garmin highlights danger of haphazard breach responses - TechRepublic
IT gets bigger budgets and more respect as a result of COVID-19
Analyze your web server log files with this Python tool | Opensource.com
Ubuntu Retro Remix: A New Raspberry Pi Linux Distro For Retro Gamers
Sitedorks - Search Google/Bing/DuckDuckGo/Yandex/Yahoo For A Search Term With Different Websites
Automated Network Troubleshooting With Ansible Tower And Zabbix | Greg Sowell Consulting
Multitenancy and Network Security in Kubernetes with Cilium — Cilium
Red Hat Enterprise Linux 8.3 Enters Beta with Improved Security, New System Roles - 9to5Linux
Install and Patch in one single action with OUI
Ubiquiti Unifi Adds Useful Wireless Heat Maps – TDSheridan Lab
LinkedIn Python/Selenium Automations - krypted
The Case For Only Looking At Your Portfolio Balance Once A Year — My Money Blog
What is the secure software development life cycle (SDLC)? | Synopsys
Generative Adversarial Networks: Build Your First Models – Real Python
ZFS Performance Basics: Disable atime
Security 101: Backups & Protecting Backups · System Overlord
Set Up Apache Guacamole Remote Desktop on Debian 10 Buster
This Day in History: 1947 U.S. National Security Act | flyingpenguin
HawkScan - Security Tool For Reconnaissance And Information Gathering On A Website. (Python 2.X &Amp; 3.X)
vmware-esxi-7-kickstart-install/ks.cfg at master · sysadmintutorials/vmware-esxi-7-kickstart-install · GitHub
VMware ESXi 7.0 Installation and Automation Setup
https://www.sysadmintutorials.com/goto/https://github.com/sysadmintutorials/vmware-esxi-7-kickstart-install
Garmin's services are slowly coming back to life after a major outage | Engadget
How to use the Linux iostat command to check on your storage subsystem - TechRepublic
Twitter contractors reportedly made a 'game' of accessing Beyoncé's data | Engadget
Garmin confirms a cyber attack took its systems offline | Engadget
Red Hat Insights: compliance | Enable Sysadmin
Why is Cash King in Germany? – BeingFrugal.net
Cyberstalker Locates Victim by Enhancing Reflection in Her Eye
Which programming languages are useful for sysadmins? | Enable Sysadmin
hint bash -> Python -> Rust/Go -> Elixir
Cloud Computing Threats: Beyond Vulnerabilities
CISA, NSA Lay Out Recommendations for Protecting OT Assets
Pandemic Credential Stuffing: Cybersecurity's ...
The state of cyber security hiring: Jobs, skills & salaries | CSO Online
Security architect - $124,600
HOWTO: Enable Extended Protection for Authentication on the SQL Servers hosting the AD FS and Azure AD Connect databases - The things that are better left unspoken
Beginner's Overview of Getting Started in Backpacking — Stephanie Hurlburt
Homemade Nectarine Zucchini Chutney Recipe -- Gluten Free, Vegan | Penniless Parenting
Cryptovirology: The Birth, Neglect, and Explosion of Ransomware | July 2017 | Communications of the ACM
A history of ransomware: The motives and methods behind these evolving attacks | CSO Online
“I thought: This was encryption,” he says. “But it was completely ridiculous. The program wasn’t created by a real IT guy.” An analysis of the malware published a month later in the Virus Bulletin January 1990 edition said pretty much the same thing: “While the conception is ingenious and extremely devious, the actual programming is quite untidy.” Young and Yung paper -https://cacm.acm.org/magazines/2017/7/218875-cryptovirology/fulltext
Network Admin Stuff: Blackhole Traffic in Linux
CISSP - The Memory Palace - Prashant Mohan
USENIX Enigma 2020 - L. Jean Camp's 'All Security Is Good(s): Design Guidance For Economics' - Security Boulevard
USENIX Enigma 2020 - Platform Data Privacy & Security Strategies for Public Interest Research - YouTube
Linux flush or remove all iptables firewall rules - nixCraft
Docker for Pentester: Pentesting Framework
Postmortem on Backpacking Gear, 7/26 — Stephanie Hurlburt
Don’t underestimate the power of a towel in the outdoors!
ETL file: What it is and how to open it - The Silicon Underground
USENIX Enigma 2020 - All Security Is Good(s): Design Guidance for Economics - YouTube
Webster's 1913
JOHN PARK'S WORKSHOP LIVE Cable Coiling 7/9/20 @adafruit @johnedgarpark #adafruit - YouTube
Troy Hunt: Building the Ultimate Home Office (Again)
Release scheme for the Microsoft Edge Browser | Born's Tech and Windows World
Frugal Radio: SDR Guide Ep 3 – Beginner Budget SDR Shootout
Presentation Skills: Tips for Writing Your Own Introduction - Metropolitan Organizing®
“An excellent introduction should do three things in less than two minutes: highlight you as a well-informed, qualified expert, excite the audience, and create a smooth transition into your speech. In addition, a good introduction addresses these six questions: Who are you? What are your qualifications and experience? Why is your presentation relevant? What problems does it address? What is in it for the audience? How will you solve their problems?”
capa: Automatically Identify Malware Capabilities | FireEye Inc
reNgine - An Automated Reconnaissance Framework Meant For Gathering Information During Penetration Testing Of Web Applications
Hardening in Debian 10 – Linux Hint
Introduction to Selenium in Python 3 – Linux Hint
How to Install Rudder System Auditing Tool on Ubuntu 20.04
What has happened and where we've come: A short history of DRM | Defective by Design
Blueprint + Blueprint = Behave | Daniel Miessler
Maximize your effort. Focus on the grind. Focus on grit.
GitHub - 0xNanda/Oralyzer: Open Redirection Analyzer
When’s the Right Time for an Open Source Audit? - Security Boulevard
Preventing Cyber Attacks With CIS Basic Controls - Security Boulevard
The challenges and opportunities of shadow IT - TechRepublic
Ransomware Attack Strikes Erie Community College | SENSEI ENTERPRISES, INC.
Cisco Releases Security Updates for ASA and FTD Software | CISA
Malware attacks down as ransomware increases
How to Convert Single Phase to 3 Phase and Use Three Phase Tools at Home - YouTube
Why is Science Hard for People to Trust? Fighter Pilots and Restaurants Offer Clues | Don Jones®
Hands-On: The Pandemic DEF CON Badge Is An Audio Cassette | Hackaday
USB-C Where It Was Never Intended To Be | Hackaday
TinyPilot Provides KVM-over-IP, With Low Cost And Even Lower Latency | Hackaday
Iris Rev4 Build | CAnderson’s page of disassembly and tinkering
Versatile Energy Meter Has Multiple Functions | Hackaday
Mr. Speaker - 3D Printed DSP Portable Speaker : 9 Steps (with Pictures) - Instructables
Do More With Your Android Phone: 70+ Tips and Tricks You Should Know
Can Data Be Recovered From a Failed SSD? What You Need to Know
There are several key warning signs that your SSD is about to die: Bad block errors: You cannot write to a specific block on the SSD, random freezes and errors, random crashes Cannot write to disk: As it says, you can no longer write to the SSD, which in turn causes crashes, errors, and more File system repair: You need to repair your operating file system on an increasingly regular basis Boot crashes: Your operating system cannot boot properly, and your system fails to load Read-only: The SSD suddenly switches into read-only mode, stopping you from writing new data to the drive
ESP8266 Makes A Wireless Card Reader | Hackaday
8 Cybersecurity Themes to Expect at Black Hat USA 2020
Remote Work Cloud and Containers Elections and Political Climate Critical Infrastructure and IoT Tech Supply Chain Risks Security Culture Email Authentication Enterprise Software Weaknesses
Newsletter: July 25, 2020 – Notes from MWhite
Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers - Security Boulevard
PrivacyCon 2020 | Federal Trade Commission
US CISA warns of attacks exploiting CVE-2020-5902 flaw in F5 BIG-IPSecurity Affairs
CVE-2020-5902
The #1 IT Security Capability – Multi-Factor Authentication - JumpCloud
New MATA Multi-platform malware framework linked to NK Lazarus APTSecurity Affairs
USENIX Enigma 2020 - Nicolas Papernot's 'What Does It Mean for Machine Learning To Be Trustworthy?' - Security Boulevard
Debunking Cybersecurity Jargon Part Four – What is Optical Character Recognition? - Security Boulevard
Cybersecurity Lessons from the Pandemic: Data – Part 2 - Security Boulevard
Lin-Manuel Miranda Is Posting Cringe
What Makes a Great CIO or vCIO? | Pivot Point Security
Just Like the Fox and the Hen House: Keeping IT and Information Security Assessment Separate | Pivot Point Security
Intune vs. WSUS – Costs, Benefits, Ease of Use, and Deployment
AuthMatrix - A Burp Suite Extension That Provides A Simple Way To Test Authorization
Thinking of a Cybersecurity Career? Read This - Security Boulevard
Quiver - Tool To Manage All Of Your Tools For Bug Bounty Hunting And Penetration Testing
NY Charges First American Financial for Massive Data Leak — Krebs on Security
EFF Joins HOPE 2020 | Electronic Frontier Foundation
First American Title Insurance Co. Faces Charges in NY
AOC U2790VQ (U2790PQU) Review : Monitors
AOC U2790VQ
Organizations Continue to Struggle With App Vulns
Rise of the Robots: How You Should Secure RPA - ...
Robotic Process Automation (RPA), ), business technology that intelligently automates mundane and repetitive tasks typically performed by humans, is indeed hot and growing.
An introduction to Pluggable Authentication Modules (PAM) in Linux | Enable Sysadmin
Linux Commands: jobs, bg, and fg | Enable Sysadmin
California university pays $1 million ransom amid coronavirus research
Automate testing for website errors with this Python tool | Opensource.com
101 Ways to Say NO to SysAdmin Requests - Thomas LaRock
Keycloak and OpenLDAP – Stuff I'm Up To
How Monitoring Your IVR Helps Predict and Reduce Fraud in the Contact Center | Pindrop
The Seccomp Notifier - New Frontiers in Unprivileged Container Development — Christian Brauner
Video Meetings and Learning Styles | The Networking Nerd
Building PowerShell for Speed
Nerding with Civilians – Unadulterated Nerdery
Garmin shutdown by WastedLocker ransomware attack | Born's Tech and Windows World
TinyPilot: Build a KVM Over IP for Under $100 · mtlynch.io
The Internet of Things (IoT) - essential IoT business guide
RDP hijacking attacks explained, and how to mitigate them | CSO Online
Teen Allegedly Leaked Paging System Health Records
PENIOT - Penetration Testing Tool for IoT
Security risks of outdated encryption: Is your data really secure? - Security Boulevard
Improving Your Vulnerability Remediation Process - Hysolate
Raft of Healthcare Breaches Continue
Many CIOs Believe Expired TLS Certificates Could Affect Their Business - Security Boulevard
When Legacy Application Security Becomes Your “Mr. Hyde” - Security Boulevard
July Device Threat Report - Security Boulevard
More than Half of European Citizens Worry About Malicious Use of Their Online Data - Security Boulevard
Update on NIST's Post-Quantum Cryptography Program - Schneier on Security
Git collaboration: quick start - Blog dbi services
Erman Arslan's Oracle Blog: Database Forensics - Incomplete/Interrupted Tablespace Drop operation / INTERNAL DDL / cause & effect
SSO Logon with X.509 certificate | It's full of stars!
Data Privacy: Your Customers Demand It – Running Your Business
Digital Nomads: Everything You Ever Wanted to Know – Online Businesses
This is Why DoD Suppliers Need to Move Soon to CMMC Readiness | Pivot Point Security
Kubernetes Security From The Trenches - Julien Sobrier - YouTube
Raspberry Pi as a Penetration Testing Implant (Dropbox) · System Overlord
What are software security requirements? | Synopsys
CPTED In Cybersecurity | Avast
Crime Prevention Through Environmental Design, or CPTED
Trust is Key in Healthcare – You Can’t Afford a Breach - Security Boulevard
Running Systems » Blog Archive » Recover non-booting Linux
The History of TV Color Bars, One of the First Electronic Graphics Ever Made
Why Commercial O365 is not DFARS compliant - PreVeil
Two more cyber attacks hit Israel's water facilities in JuneSecurity Affairs
AWS Essentials & Solution Architect Associate certification: The ultimate guide
Understanding the CMMC model - Security Boulevard
Interactive Application Security Testing: IAST Basics - Security Boulevard
interactive application security testing (IAST)
The Texas Cybersecurity Act: What You Need to Know - Security Boulevard
Top 8 cybersecurity books for incident responders in 2020 - Security Boulevard
1. “The Practice of Network Security Monitoring” by Richard Bejtlich 2. “Reversing: The Secrets of Reverse Engineering” by Eldad Eilam 3. “Practical Malware Analysis” by Michael Sikorski 4. “Incident Response & Computer Forensics” (3rd edition) by Matthew Pepe, Jason T. Luttgens and Kevin Mandia 5. “Silent on the Wire” by Michal Zalewski 6. “Information Security Policies, Procedures, and Standards” by Douglas J. Landoll 7. “The Hacker Playbook 3: Practical Guide To Penetration Testing” by Peter Kim 8. “Intelligence-Driven Incident Response” by Scott J. Roberts and Rebekah Brown
Kubernetes Containers a Boon for Developers - Security Boulevard
Grow Up! Plotting Your Path Along the Zero Trust Maturity Model - Security Boulevard
1) Never trust, always verify 2) Adopt MFA here, there, and everywhere 3) Avoid the use of VPN where possible, and adopt an application gateway instead 4) Fuse single sign-on with MFA to maximize user productivity 5) Balance security with usability through conditional and risk-based access 6) Look for identity and access management solutions that work well together, and make integrating with your existing and future IT environment easier
Your 30-60-90 Day AppSec Plan - Security Boulevard
How to identify and prevent firmware vulnerabilities - Security Boulevard
The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD
Zero Day Initiative — The July 2020 Security Update Review
Oracle Critical Patch Update for July 2020 Tops Previous Record with 443 Security Updates - Blog | Tenable®
What Being “Audit-Ready” Means Today for DoD Suppliers | Pivot Point Security
3 types of privacy settings in Microsoft Teams - SharePoint Maven
Considerations for Cloud Desktops – Skillset – Ask the Architect
Keycloak Container Set – Stuff I'm Up To
CCPA is not enough say businesses
DSHR's Blog: Twitter Fails Security 101 Again
BadPower Vulnerability In Fast Chargers Might Make Phones Halt And Catch Fire | Hackaday
Space Force official logo and motto unveiled | Engadget
Python Dominates IEEE's Top Programming Languages 2020 For 3 Yrs In A Row
REMnux 7.0 Released: Ubuntu-based Linux Distro For Malware Analysis
Jan Czochralski And The Silicon Revolution | Hackaday
Frugal Radio: Using an Airspy and RTL-SDR To Scan the UHF Military Airband in SDR#
The Industrial Revolution and Control Systems | The Automation Blog
Abit BP6: In memoriam - The Silicon Underground
But those DIMMs were expensive at the time. I started out with 128 MB and eventually expanded mine to 384 MB.
Why do capacitors fail? - The Silicon Underground
Comprehensive Guide on HTML Injection
Companies with poor privacy practices are 80% more apt to suffer data breach - TechRepublic
Companies with poor privacy practices are 80% more apt to suffer data breach
FTC Finalizes Privacy Shield Settlement with Ortho-Clinical | Federal Trade Commission
Forensic Investigation: Ghiro for Image Analysis
Vulnerable webapps and VMs for penetration testing practice: my own list | Andrea Fortuna
Summary of July 15th, 2020 Purdue Seminar on Control System Cyber Security - CERIAS - Purdue University
Tri-State MSSF ~ Cyber Thoughts
Ripple20's Effects Will Impact IoT Cybersecurity ...
Detecting Code ReUse in Ghidra With Intezer's Plugin - /dev/random
Mitre, the creepy company checking your fingerprints on Facebook for the US Government - Graham Cluley
A Complete Guide to IoT Security for Your Business .Learn more, secure your company!
https://www.i-scoop.eu/internet-of-things-guide/
Written communication is remote work super power - Snir David Blog
What Is A Motherboard? What Are The Different Components Of A Motherboard?
Manage network connections from the Linux command line with nmcli | Opensource.com
grep vs egrep vs fgrep: What's the Difference?
US Treasury Yields Lowest In The History of the Republic — My Money Blog
Which Windows 10 Apps Should You Delete? - Fossbytes
COVID Diaries Pt. 7 | Greyhawk's Meanderings
Red Hat Insights: Vulnerability management | Enable Sysadmin
The Ultimate Guide to Setting Up Zabbix 5.0 Monitoring
Office 365: TLS 1.0/1.1 support ends on Oct. 15, 2020 | Born's Tech and Windows World
The Call for Applied Research on Offensive Security Tool Release | Chris Sanders
A Socratic Outline for Discussing the OST Release Debate | Chris Sanders
X.509 troubleshooting - Enabling trust between NetWeaver and intermediate server | It's full of stars!
AnyConnect: Allow 'Local' LAN Access | PeteNetLive
MediaWiki and OAuth2 – Stuff I'm Up To
Acquiring IT Skills and Keeping Them Up to Date | APMdigest - Application Performance Management
Match Windows Disks to VMWare VMDK Files | Windows OS Hub
How to deal with Purple Screen Of Death - PSOD | ESX Virtualization
43 percent of employees make mistakes that have cybersecurity implications
Creating a Presentation with Jupyter Notebook and RISE (Video) - The Mouse Vs. The Python
https://www.sans.org/media/free/free-faculty-tools.pdf
What Is Port Forwarding? Everything You Need to Know
Linked: Balance Of Power Shifts To Employees In Flex Office Model
What social engineering is and how it works - The Silicon Underground
Troy Hunt: 10B
How to never miss a video call with Raspberry Pi and NextEvent - Raspberry Pi
Fraud in the IVR: Your Complete 2020 Guide | Pindrop
“The fraudster’s greatest liability is the certainty that the fraud is too clever to be detected.”  – Louis J. Freeh Former U.S. F.B.I Director 
Hacking Summer Camp: How to Steal Kerberos Tickets? | CQURE Academy
13 Raspberry Pi Zero Alternatives That Cost Less Than $20
Explained: What is Grep Command in Linux?
MSPs are still not appreciating the risk of Ransomware
Twitter hack raises alarm among government officials, security experts | CSO Online
PCI DSS explained: Requirements, fines, and steps to compliance | CSO Online
1. Install and maintain a firewall configuration to protect cardholder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. 3. Protect stored cardholder data. 4. Encrypt transmission of cardholder data across open, public networks. 5. Use and regularly update anti-virus software. 6.Develop and maintain secure systems and applications. 7.Restrict access to cardholder data by business need-to-know. 8. Assign a unique ID to each person with computer access. 9. Restrict physical access to cardholder data. 10.Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. 12. Maintain a policy that addresses information security.
Reverse Threat Modeling for Pursuing Attribution | Daniel Miessler
A Historical Cycle That Limits Progress | Daniel Miessler
Cybersecurity Leaders: Invest In Your People
Russian Cyberattacks Target COVID-19 Research, ...
Leading Through Uncertainty: Be Proactive in Your ...
What Organizations Need to Know About IoT Supply ...
Third-Party IoT Vulnerabilities: We Need a ...
'Make Your Bed' and Other Life Lessons for Security
Task 1: Process Task 2: Documentation Task 3: Procedures Task 4: Metrics Task 5: Plan
US charges two Chinese hackers with trying to steal COVID-19 research | Engadget
The internet is becoming more secure -- but only slowly
Datadog Releases Private Locations for Synthetic Monitoring | APMdigest - Application Performance Management
OpenTelemetry, Open Collaboration | DEVOPSdigest
Business Continuity in SQL Database | James Serra's Blog
X.509 troubleshooting - Send X.509 Certificate in HTTP Header | It's full of stars!
How To Run Ubiquiti's Unifi Controller Software As A Windows Service
Errata Security: How CEOs think
Taking risks is more often the correct answer rather than having more security. CEOs trust outside consultants mostly because outsiders don't have a stake in internal politics. Thus, the consultant can say the same thing as what you say, but be trusted. They divide their business into two parts: The first is the part they do well, the thing they are experts at, the things that define who they are as a company, their competitive advantage. The second is everything else, the things they don't understand.
Automating To Detect Change - EvilTester.com
VPNs With "Zero Log" Policy Leak 1.2 TB Data Of Millions Of Users
Legal Considerations Raised by the U.S. Cyberspace Solarium Commission Report - Lawfare
Building and publishing documentation for Ansible Collections | die-welt.net
Analyzing systemd calendar and timespans | Opensource.com
Using ifstat for Linux network statistics | Enable Sysadmin
How to Revamp the Education System Part 1 | People Centre
Your certificate expires in 1 day!!!
Medical Device Cybersecurity: Addressing the ChallengesWebinar.
Video : Resource Manager : SQL Quarantine in Oracle Database 19c Onward | The ORACLE-BASE Blog
Project V: Open-source Tools to Build your Own Private Network
How to Harden and Secure NGINX Web Server in Linux
What is BlackRock Android malware?
Everything You Need to Know about Linux Containers (LXC)
How to create a photo collage with this python script | Hacker Milk
A Major Flaw In Fast Chargers Can ‘Burn’ Your Smartphone: BadPower Attack
How to remove tape residue - The Silicon Underground
Job offer acceptance deadline? Proceed with caution. - The Silicon Underground
SIGRed-Patch KB4565524: Install fails in Windows Server 2008 R2 | Born's Tech and Windows World
Windows 10/Server 2016: Security policy Inactivity limit does not work | Born's Tech and Windows World
Juicy Baked Turkey Burgers With Garlic
10 Basic Programming Principles Every Programmer Must Know
1. Keep It Simple, Stupid (KISS) 2. Write DRY Code 3. Open/Closed 4. Composition Over Inheritance 5. Single Responsibility 6. Separation of Concerns 7. You Aren’t Going to Need It (YAGNI) 8. Document Your Code 9. Refactor 10. Clean Code At All Costs
6 Kid-Friendly Websites for Free Arts and Crafts Activities for Children
The 8 Best Computer Temperature Monitor Apps
3 Ways to Boot Multiple OSes on a Raspberry Pi
USB Flash Drive Reveals Strange SD Card Heart | Hackaday
This Week In Security: Twitter, Windows DNS, SAP RECON | Hackaday
Tend Your Garden… Again | Hackaday
Exposing Computer Monitor Side-Channel Vulnerabilities With TempestSDR | Hackaday
An Easier Way To Roll Your Own LED Ball | Hackaday
Bubbles, The People-Pleasing Pandemic Panda | Hackaday
Thoroughly Modern: Why You Need An IT Strategy And Roadmap - IT Jungle
Marketing During Coronavirus: 6 Tips for Outlasting the Pandemic – SEO
#1: Don’t Make Decisions in a Panic #2: Stay Connected with Your Customers on Social Media During the Coronavirus Pandemic #3: Take All Possible Opportunities to Help People During the Coronavirus Pandemic #4: Improve Your Online Presence as the Coronavirus Pandemic Rages #5: Improve SEO on Your Site #6: Adapt Your Offers to the Circumstances
Tales From The Sysadmin: Impending Hard Drive Doom | Hackaday
Using dockle to check docker containers for known issues -- Prefetch Technologies
Step by Step Guide to Setup LDAPS on Windows Server - Microsoft Tech Community - 385362
F-Secure uncovers counterfeit Cisco network devices
TOP differences between ESXi 6.7 and ESXi 7.0 | ESX Virtualization
BMC-IT - Linux - RAID Monitor - LSI Fusion-MPT SAS-2
MegaCLI cheatsheet | ErikIMH - just another linux admin's blog
SMTP Ciphers – Stuff I'm Up To
Creating NetApp Root Load-Sharing Mirrors with Ansible
Solving Azure Connection Internal Server Errors - Wahl Network
How to Downgrade Windows Server Datacenter to Standard Edition? | Windows OS Hub
How to easily kill a zombie datastore in your VMware vSphere lab | TinkerTry IT @ Home
My remotely proctored VMware exam experience | Patrick Kremer
How to Home Lab: Part 9 - Expanding Your Home Network | dlford.io
Windows Server 2008 R2: 0patch fixes SIGRed vulnerability | Born's Tech and Windows World
The Libertarian Case for Immigration (and Against Trump) - Lawfare
Why Your Company Mission Drives Your Culture – Running Your Business
Laptop Mode Tools 1.74 - RESEARCHUT
6 Reasons Why People Love to Use Arch Linux
A container security checklist: 5 key questions to answer | TechBeacon
Understanding open source governance models
How to share Wi-Fi network passwords via QR code on Android
FBI reportedly uses a travel company's data for worldwide surveillance | Engadget
nbtscan and nmap "nbtstat -s" For SMB scanning Guide for beginners
nbtscan -r 192.168.1.0/24
DNS Enumeration through dnsenum tool in Kali Linux Guide for beginners
https://www.exploit-db.com/docs/12389.pdf
FAQ: The Windows DNS Server security hole, CVE-2020-1350, from a “normal” user’s perspective @ AskWoody
Want to Write Beautiful PowerShell Code? Here's How.
datapatch and OPatch documentation and MOS note
Ground-truth documents | Armed and Dangerous
Documentation as knowledge capture | Armed and Dangerous
How To Kickstart Your Budget, Especially When Divorcing | Penniless Parenting
Persistent Memory in the Data Centre - Architecting IT
EU blocks websites from transferring personal data to US servers | Engadget
“The limitations on the protection of personal data arising from the domestic law of the United States... are not circumscribed in a way that satisfies requirements that are essentially equivalent to those required under EU law,”
Cybersecurity Information Sharing Success Stories - Lawfare
Testing WireViz
Using the nstat network statistics command in Linux | Enable Sysadmin
Planner Is a Great GTD and To-Do List App for the Linux Desktop - 9to5Linux
Scan and Repair Disk Bad Sectors in Ubuntu Linux, Fedora
Doc Searls Weblog · How long will radio last?
10 Tips On How to Use Wireshark to Analyze Packets in Your Network
The 5 Best Graphical Backup Tools for Ubuntu and Linux Mint
Jon “maddog” Hall Discusses Global Open Source Certification
Speed up container builds with overlay mounts | Enable Sysadmin
Use this cheat sheet for tmux as a terminal multiplexer | Opensource.com
UASP makes Raspberry Pi 4 disk IO 50% faster | Jeff Geerling
Bulk Only Transport (or BOT) 'USB Attached SCSI Protocol', or 'UASP'
Home Assistant improves performance in 0.112 release [LWN.net]
The CIA, Covert Action and Operations in Cyberspace - Lawfare
Patching all my environments with the July 2020 Patch Bundles
New Adventures | Unexpected Change in Employment Status – CubicleNate's Techpad
New DDR5 RAM Specs Released: 6.4Gbps Transfer Speed, 4X Density Over DDR4
Speaking of the highlights, the new DRAM spec now supports 64Gbit maximum die density in comparison to 16bit in the case of DDR4. This means that high-density memory chips used in servers (LRDIMM) will be able to achieve 2TB capacity in a single module. DDR5 promises to provide peak data transfer rates of up to 6.4Gbps in comparison to 3.2Gbps on DDR4. However, the initial version of DDR5 will launch at 4.8Gbps transfer capacity, which is about 50% higher than DDR4’s peak capacity. The new DDR5 modules will be able to work at a lower voltage of 1.1v in comparison to DDR4’s 1.2v. We can expect DDR5 memory modules to arrive by 2021 and initial adoption will be seen in the server market.
How To Enable Nested Virtualization In KVM In Linux - OSTechNix
modprobe -r kvm_intel modprobe kvm_intel nested=1 vi /etc/modprobe.d/kvm.conf kvm_intel nested=1 cat /sys/module/kvm_intel/parameters/nested
Introduction to Python for Data Science - LinuxLinks
vSphere 7 with Kubernetes - Getting Started Guide - The IT Hollow
5 Risks You Need to Remember When Securing Your Containers
Enable Microservices Reliance on a Base Image Container Visibility Container Communication Container Configuration How Organizations Can Address These Risks Use trusted base images only to build your containers Prevent containers from acquiring new privileges Adopt a policy of image scanning
Securing Digital Transformation on a Budget - Security Boulevard
Myspace Wasn't a Simpler Time, We Were Just Teenagers
Critical SAP Recon flaw exposes thousands of system to full take overSecurity Affairs
New Forrester Report: Build a Developer Security Champions Program - Security Boulevard
Ransomware infected systems at Xchanging, a DXC subsidiarySecurity Affairs
Try2Cry ransomware implements wormable capabilitySecurity Affairs
Vulnerability Management Maturity Model | SANS Institute
Install MITRE ATT&CK Navigator in an isolated environment - Koen Van Impe - vanimpe.eu
Vagrant and Docker Builds : ORDS 20.2 and SQLcl 20.2 Updates | The ORACLE-BASE Blog
Debotnet - A Tiny Portable Tool For Controlling Windows 10's Many Privacy-Related Settings And Keep Your Personal Data Private
dorkScanner - A Typical Search Engine Dork Scanner Scrapes Search Engines With Dorks That You Provide In Order To Find Vulnerable URLs
GoGhost - High Performance, Lightweight, Portable Open Source Tool For Mass SMBGhost Scan
Critical flaw allows hackers to breach SAP systems with ease | CSO Online
Application Security is a Team Sport. Is Your Team Winning? | Pivot Point Security
Healthscare – An Insider's Biopsy of Healthcare Application Security - Black Hat USA 2020 | Briefings Schedule
Get Cutting-Edge Healthcare Cybersecurity Insights ...
What Is a Man-in-the-Middle Attack? How It Works and How to Stay Safe from It
Stress and SOC Staff BurnoutRafeeq Rehman – Personal Blog
The Four Phases of Offensive Security Teams :: malicious.link — welcome
Adversarial Hammer Friendship Adversarial Friendship
X64Dbg - An Open-Source X64/X32 Debugger For Windows
OWASP Top 10 Versus OWASP ASVS: Recommendations and Roadmap | Pivot Point Security
Insider Info: Early CMMC Certification + Provable NIST 800-171 Compliance can be a Competitive Advantage for DoD Suppliers | Pivot Point Security
How High a Hurdle is CMMC Compliance for Today’s DoD Suppliers? | Pivot Point Security
Did Your Town Benefit From PPP Loans? Check This Map to Find Out
World Economic Forum outlines three steps for cyber security success - IT Governance UK Blog
1. Organisational security 2. Product security 3. Infrastructure security
From the OWASP Top Ten(s) to the OWASP ASVS - Jim Manico - YouTube
Doc Searls Weblog · Home is where one’s butt is
"Dorothy Parker said (or is said to have said) that she preferred the company of younger men “because their stories are shorter.” "' I’m optimistic about the long-run future, though the short run will surely get worse before it gets better. (Bad things happen when people die at wartime rates and large hunks of the economy are turned off.)
Cross-Functional Collaboration Is Key to Industrial Cybersecurity - Blog | Tenable®
LOLBAS
Ubiquiti EdgeRouter :: netboot.xyz
Firmware Downloads
HowTo Change Port Type in Mellanox ConnectX-3 Adapter
Lawsuits After Ransomware Incidents: The Trend Continues
How Ekans Ransomware Targets Industrial Control Systems
HHS Hopes to Tackle Long-Stalled Regulatory Tasks
Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #5
Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #4
Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #3
Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #2
Attack Detection Fundamentals: Discovery and Lateral Movement - Lab #1
HowTo Find Mellanox Adapter Type and Firmware/Driver version (Linux)
PXELINUX-Multi-Arch - Syslinux Wiki
LiveCDNetboot - Ubuntu Wiki
Debian Stretch diskless machine via PXE boot - G.Melikov's blog
Windows Aliases for Terraform and Git - Wahl Network
How to Restore Active Directory from a Backup? | Windows OS Hub
CCPA Enforcement: What to Expect Now - HealthcareInfoSecurity
A Paramedic's Lessons for Cybersecurity Pros
Comprehensive Guide on Broken Authentication & Session Management
How my startup was born out of frustration
HOWTO: Be more productive (Aaron Swartz's Raw Thought)
Take Control of Working from Home Temporarily – Take Control Books
DIY Wifi Router Access Point With Raspberry Pi | nickearl.net
Controlling Pi-Hole with Physical Buttons | nickearl.net
How to Customize the Ubuntu Boot Splash Screen and Logo
How to avoid common cloud migration challenges
What is Patch Management?
Is HGST a good brand? Are HGST drives reliable? - The Silicon Underground
Secure your IT systems with Duo Multi Factor Authentication (Duo MFA)
espanso: An Open Source Cross-Platform Text Expander
Generate Rainbow Tables and Crack Hashes in Kali Linux Beginner's Guide
NetBSD Blog
RiskSense: Full Spectrum Risk-Based Vulnerability Management
A look at password security, Part II: Web Sites - The Mozilla Blog
Display Virtualization Systems Stats With Virt-top In Linux - OSTechNix
How COVID Pandemic is Making IT Operations Analyst Jobs More Stressful | APMdigest - Application Performance Management
IT Operations Teams Were Already Stressed Even before the pandemic started this "new normal" mode of operations, IT operations teams were stressed to deliver more with less. According to a survey of 1300 IT professionals by BigPanda from earlier this year: ■ Innovation and CI/CD culture have increased normal operational workloads by 50%. The majority of the surveyed (53%) expect their NOC/ITOps workloads to increase even more in the next two years. ■ ITOps & NOC teams experience fast-moving IT stacks. These technology changes — whether they were necessitated by faster development needs, or were hyper-scale architecture based changes, or technical debt based — almost always require additional training and insights into the stacks as well as additional qualified analysts. ■ About 47% of respondents see constant application and code changes and 39% experience constant infrastructure changes — most of them see multiple daily changes, sometimes even hourly changes. To keep up with this, ITOps teams have requested more budget, more automation tools, and more qualified analysts. However, very surprisingly, ■ 56% of them expected their IT budgets to stay flat. And 21% expected their IT operations budgets to shrink. ■ Worldwide IT spending is projected to trim down to $3.4 trillion in 2020, down 8% from 2019, according to Gartner.
Protecting Your Portfolio From Hyperinflation, Deflation, Confiscation, and Devastation — My Money Blog
This booklet’s primary advice regarding risky assets is loud and clear: your best long-term defense against deep risk is a globally value-tilted diversified equity portfolio, perhaps spiced up with a small amount of precious metals equity and natural resource producers, TIPS, and, if to your taste, bullion and foreign real estate.
Massive Deletes | Oracle Scratchpad
Your Security Products Are Insecure, With Data - EtherealMind
“The only class of software that has more bugs than security software is QA software”
How to Fix 3.3v Power Issues with Hard Drives | nickearl.net
The Pesky PWDIS Feature In Newer SATA Specs | Tom's Hardware
Kung Fu Nuns Of Kathmandu Honored For Empowering Girls : Goats and Soda : NPR
What Is a Side-Channel Attack? How Hackers Crack Security Without Touching It
5 PC Parts That Tend to Die: How to Extend Their Lifespans
How to Use the Rule of Thirds in Photography
Applying the 80-20 Rule to Cybersecurity
Principle 1: Develop and Govern a Healthy Security Culture According to Mike Gentile — president and CEO at CISOSHARE and someone who has worked as a chief information security officer for many years — a lot has changed in the security space by 2020, but two things remain the same: 1. Senior executives don't prioritize cybersecurity enough for security programs to be fully effective. 2. The reason for point No. 1 is not that executives don't care — they do, and they don't want their name in the headlines after a breach — but that they lack a clear definition of security. Principle 2: Manage Risk in the Language of Business Principle 3: Establish a Control Baseline Principle 4: Simplify and Rationalize IT and Security Principle 5: Control Access with Minimal Drag on the Business Principle 6: Institute Resilient Detection, Response and Recovery
Multiple Ways to Banner Grabbing
What are my next steps after writing my first Selenium WebDriver test? - EvilTester.com
Because sometimes it's hard... some tips for "Working with WebDriver" - EvilTester.com
How to protect Windows networks from ransomware attacks | CSO Online
Watch out for unauthorized tools, scripts and Group Policy settings Identify employees at high risk for targeted phishing attacks Review Group Policy domain and script folders for malicious files Use multi-factor authentication for privileged accounts Review your backup strategies.
malwareunicorn.org
Chief Information Security Officer (CISO) Workshop - Security documentation | Microsoft Docs
Google - Site Reliability Engineering
7 points your security team needs to know about IPv6 (but probably doesn't) | CSO Online
1. IPv6 is more popular than most realize 2. Employees use IPv6 3. IPv6 is already in your enterprise 4. IPv6 is no more or less secure than IPv4 5. Vendor products lack IPv6 security features 6. Unprepared security teams can stop IPv6 deployment 7. IPv6 needs to be secured from the onset, not retroactively
Nginx and LDAP Authentication – Stuff I'm Up To
Custom NiFi Load Balancing Processor – David Vassallo's Blog
CISSP salary expectations - The Silicon Underground
How to Deal With the Microsoft Outlook IP Blacklist - LinuxBabe
An Anatomy of a Suspicious Website | Alexander's Blog
Weekly Tech Roundup #12 | Andrea Fortuna
“The saddest aspect of life right now is that science gathers knowledge faster than society gathers wisdom” – Isaac Asimov
Wietze Beukema: almost 300 Windows 10 executables are vulnerable to DLL hijacking | Andrea Fortuna
Ransomware Characteristics, Attack Chains and Mitigations | CyberWatch
America is Falling Because You Can't Maintain a Democratic Republic With a Stupid Population | Daniel Miessler
Harari model
Weekly Cybersecurity Roundup #13 | Andrea Fortuna
“Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge.” – Bruce Schneier
DIY MechBoard64 – Dangerous Prototypes
Learn The Secrets Of Matching Bottle Cap Threads To One Another | Hackaday
Stack rank: An employee perspective - The Silicon Underground
Shut Up and Encrypt
Frugal Radio: 2020 SDR Guide Ep 1 – The Incredible World of Software Defined Radio (RTL-SDR, Airspy, SDRPlay etc.)
GitHub - koriwi/freedeck-hardware: all the stuff you need to build your own FreeDeck
Salvaged Drill Gets A Magnetic Upgrade | Hackaday
The New Retirement Model | People Centre
Trump confirms cyberattack against Russian trolls during 2018 midterms | Engadget
Network Admin Stuff: Networking Next Step
Network Admin Stuff: ip-geo-location
Bootloader Fix on NVMe Drive - Cyber Kingdom of Russell John
How to Enable, Disable Keyboard, Mouse and Touch Devices via Terminal
Learn NixOS by turning a Raspberry Pi into a Wireless Router | Quansight Labs
The ACM Digital Library Should Remain Open : Scott Schneider
Hitting the Books: What astronauts can learn from nuclear submariners | Engadget
Collecting Nginx metrics with the Prometheus nginx_exporter -- Prefetch Technologies
Improving my Linux diff experience with icdiff -- Prefetch Technologies
Book Freak #46: How to Have a Happy Family | Cool Tools
Ask three questions at your weekly family meeting “1. What things went well in our family this week? 2. What things could we improve in our family? 3. What things will you commit to working on this week?” The Secrets of Happy Families: Improve Your Mornings, Tell Your Family History, Fight Smarter, Go Out and Play, and Much More Paperback – December 31, 2013 by Bruce Feiler
Book Freak #44: Dalai Lama’s Tips for Happiness | Cool Tools
When life becomes overwhelming stop and reflect “When life becomes too complicated and we feel overwhelmed, it’s often useful just to stand back and remind ourselves of our overall purpose, our overall goal. When faced with a feeling of stagnation and confusion, it may be helpful to take an hour, an afternoon, or even several days to simply reflect on what it is that will truly bring us happiness, and then reset our priorities on the basis of that. This can put our life back in proper context, allow a fresh perspective, and enable us to see which direction to take.” Train your mind to be resilient to disturbing events “Through training, we can change; we can transform ourselves. Within Buddhist practice there are various methods of trying to sustain a calm mind when some disturbing event happens. Through repeated practice of these methods we can get to the point where some disturbance may occur but the negative effects on our mind remain on the surface, like the waves that may ripple on the surface of an ocean but don’t have much effect deep down. And, although my own experience may be very little, I have found this to be true in my own small practice. So, if I receive some tragic news, at that moment I may experience some disturbance within my mind, but it goes very quickly. Or, I may become irritated and develop some anger, but again, it dissipates very quickly. There is no effect on the deeper mind. No hatred. This was achieved through gradual practice; it didn’t happen overnight.“ Begin every new encounter with a positive attitude “If you approach others with the thought of compassion, that will automatically reduce fear and allow an openness with other people. It creates a positive, friendly atmosphere. With that attitude, you can approach a relationship in which you, yourself, initially create the possibility of receiving affection or a positive response from the other person. And with that attitude, even if the other person is unfriendly or doesn’t respond to you in a positive way, then at least you’ve approached the person with a feeling of openness that gives you a certain flexibility and the freedom to change your approach as needed.” View your struggles as growth opportunities “Imagine what it would be like if we went through life never encountering an enemy, or any other obstacles for that matter, if from the cradle to the grave everyone we met pampered us, held us, hand fed us (soft bland food, easy to digest), amused us with funny faces and the occasional ‘goo-goo’ noise. If from infancy we were carried around in a basket (later on, perhaps on a litter), never encountering any challenge, never tested – in short, if everyone continued to treat us like a baby. That might sound good at first. For the first few months of life it might be appropriate. But if it persisted it could only result in one becoming a sort of gelatinous mass, a monstrosity really – with the mental and emotional development of veal. It’s the very struggle of life that makes us who we are. And it is our enemies that test us, provide us with the resistance necessary for growth.”
Building a data-driven culture with a data analysis framework
AWS Well-Architected Framework – Updated White Papers, Tools, and Best Practices | AWS News Blog
NetMotion surveys industry experts on remote access, COVID-19, and the future of VPN & SDP | NetMotion Software
Ben Garfinkel on scrutinising classic AI risk arguments - 80,000 Hours
This Website Runs On A Solar Charged Raspberry Pi: Here’s How
Unable to Access SYSVOL and NETLOGON folders from Windows 10 | Windows OS Hub
How To Network Boot (PXE) The Ubuntu LiveCD
How To Use Linux Screen | Linuxize
Experts found allegedly intentional backdoors in C-Data FTTH devicesSecurity Affairs
Easily Resize LVs and Underlying Filesystems - A Random Walk Down Tech Street
Recover Space By Finding Deleted Files That Are Still Held Open. - A Random Walk Down Tech Street
Who's making your log file grow in SQL Server? – Dimitri's Wanderings
Disk speed IO test tool – it's notes
http://woshub.com/how-to-measure-disk-iops-using-powershell/ https://gallery.technet.microsoft.com/DiskSpd-A-Robust-Storage-6ef84e62 diskspd.exe –c10G -d300 -r -w40 -t8 -o32 -b64K -Sh -L c:\diskpsdtmp.dat > c:\DiskSpeedResults.txt
Discover all headsets used in #MicrosoftTeams PowerBI report – msunified.net
Running Systems » Blog Archive » Linux LVM explained
Pi-Hole and Plusnet - Stuart Moore
FreeRADIUS and Docker – Stuff I'm Up To
Enterprises That Stopped IT Cloud Migrations Had 2.5x Outages During Global Pandemic | APMdigest - Application Performance Management
Software Failures Cost the Enterprise Software Market $61 Billion Annually | APMdigest - Application Performance Management
Atomic Host 101 Lab Part 5: Containerized and Non-Containerized Applications - A Random Walk Down Tech Street
Atomic Host 101 Lab Part 4: Package Layering, Experimental Features - A Random Walk Down Tech Street
Atomic Host 101 Lab Part 3: Rebase, Upgrade, Rollback - A Random Walk Down Tech Street
Atomic Host 101 Lab Part 2: Container Storage - A Random Walk Down Tech Street
Atomic Host 101 Lab Part 1: Getting Familiar - A Random Walk Down Tech Street
Atomic Host 101 Lab Part 0: Preparation - A Random Walk Down Tech Street
Encrypting More: /boot Joins The Party - A Random Walk Down Tech Street
qemu-img Backing Files: A Poor Man's Snapshot/Rollback - A Random Walk Down Tech Street
TermRecord: Terminal Screencast in a Self-Contained HTML File - A Random Walk Down Tech Street
Configuring PXE Network Boot Server on Ubuntu 18.04 LTS – Linux Hint
ParamSpider - Mining Parameters From Dark Corners Of Web Archives
Infosecurity.US - https://infosecurity.us - AppSecCali 2020 - Christian Folini's 'Practical OWASP CRS In High Security Settings'
Lightning Talk: Purple is the new black: Modern Approaches to Application Security - Tanya Janca - YouTube
Health Data Breach Trends: A Mid-Year Assessment
More than half of Canadians admit to have been a victim of cybercriminals - Security Boulevard
Conti Ransomware Deemed a Possible Successor of Ryuk
Police Buy Hacked Data, to Fish for Evidence—Is That Even Legal? - Security Boulevard
Accelerate CMMC Compliance with NIST and DFARS | PreVeil
NBlog - the NoticeBored blog: NBlog July 11 - the small but perfectly formed ISMS
OPSWAT Deep CDR now supports DICOM file format | OPSWAT
5 Ways to Upgrade Your Email Marketing Signature – Content Marketing
The Secret Service Tried to Catch a Hacker With a Malware Booby-Trap
As Offices Reopen, Hardware from Home Threatens ...
Remote Security Operations Center Concerns | ARIACybersecurity - Security Boulevard
Black Hat USA Debuts Cyber-Physical Systems ...
Review of the Uputronics GPS/RTC Raspberry Pi Expansion Board - Articles
ORDS 20.2 & the Database Management REST APIs, Updated – ThatJeffSmith
Recursive WITH upgrade | Oracle Scratchpad
Erman Arslan's Oracle Blog: Tips for Exadata POCs -- Exadata X8-2M , 19C Database Version, Oracle RAT and Data Masking
OWASP Threat Dragon - Cross-Platform Threat Modeling Application
Bad Governments on the Left and Right Meet in the Middle | Daniel Miessler
Exploit known, F5 BIG-IP appliances urgently need patching | Born's Tech and Windows World
What you need to know about Azure Reserved Instances, AHB and WVD
Zoom & Teams not GDPR compliant useable | Born's Tech and Windows World
0patch for 0-day RCE vulnerability in Zoom for Windows | Born's Tech and Windows World
Thunderbolt 4 introduced | Born's Tech and Windows World
6 Different Ways to List Disks in Linux Command Line
1. df 2. fdisk 3. lsblk 4. cfdisk 5. parted 6. sfdisk
Comparing 3 Great Web Security Books · System Overlord
Real-World Bug Hunting Web Application Hacker’s Handbook The Tangled Web
Hugo: a static-site generator [LWN.net]
A Hundred Days of Code, Day 003 - Methods | Janusworx
A Hundred Days of Code, Day 002 - Basic Exercises | Janusworx
A Hundred Days of Code, Day 001 - Beginning With Classes | Janusworx
12+ Free (or Low-Cost) Websites to Empower Your Programming Education | Codementor
Virtualization Is Key to the Future of IT. Therefore ... What? | Articles
JR East Redesigns All 78 of Their Central Tokyo Train Station Stamps | Spoon & Tamago
step by step configure pxeboot server in Ubuntu | PXE network boot server - linuxtopic
# Clonezilla pxelinux.cfg default entry LABEL 2    MENU LABEL ^2) Clonezilla Live    KERNEL clonezilla/live/vmlinuz    APPEND ramdisk_size=32768 initrd=clonezilla/live/initrd.img boot=live union=overlay username=user config components noswap edd=on nomodeset noeject locales=en_US.UTF-8 keyboard-layouts=NONE net.ifnames=0 ocs_live_extra_param="" ocs_live_keymap="NONE" ocs_live_batch="yes" ocs_lang="en_US.UTF-8" vga=788 ip=frommedia nosplash  fetch=tftp://172.17.199.199/clonezilla/live/filesystem.squashfs
https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/tech-brief/tech-brief-western-digital-power-disable-pin.pdf
3.3v Pin Reset - Album on Imgur
Update on Easy PXE boot testing post: minus PXELINUX - A Random Walk Down Tech Street
TFTP Server Logs (or lack there of) · Chris Schuld
tcpdump or bust. tcpdump port 69 -v
Can Employees Be Fired For Revealing Positive COVID-19 Cases At Their Workplaces? - FindLaw
Save time at the command line with HTTPie instead of curl | Enable Sysadmin
script-server (Web UI for scripts) | panticz.de
How to convert an ISO to a Docker image - TechRepublic
Right-to-repair advocates say hospitals need new rules to keep equipment working - The Verge
IT careers: How to get a job as a DevOps professional | The Enterprisers Project
Direnv - Manage Project-Specific Environment Variables in Linux
Managing tasks with todo.txt and Taskwarrior [LWN.net]
Ludicrously cheap HDMI capture for Linux
Doc Searls Weblog · The Future of Now
Windows Terminal: The Ultimate Guide
How to Add Voice to Your PowerShell Scripts
Phase 4 FAQ: Neutral Cost Recovery and Expensing
#MoreOnionsPorfavor: Onionize your website and take back the internet | Tor Blog
LasLabs Blog | PXE booting with Ubiquiti EdgeRouter - LasLabs Blog
configure edit service dhcp-server shared-network-name dlasley.net subnet 192.168.69.0/24 set bootfile-server 192.168.69.100 set subnet-parameters "filename "/pxe-boot/pxelinux.0";" set bootfile-name /pxe-boot/pxelinux.0 commit save
The Simplest TS100 Upgrade Leads Down A Cable Testing Rabbit Hole | Hackaday
TS100
Cryptography Dispatches: DSA Is Past Its Prime
Notorious - A New Keyboard-Driven Note Taking App for Linux
Executing Ansible playbooks in your Amazon EC2 Image Builder pipeline : idk.dev
I/O reporting from the Linux command line | Enable Sysadmin
Laptop migration
How To Optimize Ubuntu for Speed – Freedom Penguin
Amazon tunes in OTA TV channels through Fire TV Cube | FierceVideo
How to prepare for the SLES 15 Admin certification. - Blog dbi services
The History of the Barcode – Running Your Business
The 10 Best Scanning Tools for Linux System in 2020
How to Decode Apple Version and Build Numbers - TidBITS
How To Migrate Virtualbox VMs Into KVM VMs In Linux - OSTechNix
Introducing OpenShift cost management: A human-readable view into cloud-native application costs
Beyond simply providing a unified view of a deployment’s cost landscape, OpenShift cost management also enables: Cost models for applying markup ratios to monitored infrastructure, helping to reflect the real costs of a production environment. Tagging to map charges to projects and internal organizations, using an organization’s existing taxonomy.
The myth of NoSQL (vs. RDBMS) "joins dont scale" - Blog dbi services
Red Hat Insights: Your very own security consultant | Enable Sysadmin
What RHEL security-related features does Red Hat Insights offer? Well, here is a short overview: Advisor - detects existing security issues on RHEL systems and recommends solutions to remediate. Compliance - analyzes the level of compliance a RHEL system environment has to an OpenSCAP policy. Drift - compares RHEL hosts to each other to identify and further troubleshoot differences. Patch - determines which product advisories may apply to an organization's specific RHEL instances. Policies - enables organizations to define and monitor for specific internal policies. Vulnerability - reports and remediates on CVEs that impact RHEL systems (in cloud or on-premises).
Django Testing Toolbox · Matt Layman
Testing Accidents – Mike Blumenkrantz – Super. Good. Code.
New Oracle Machine Learning Features in 19c and 20c « Oralytics
How to create HostPath persistent volume in Kubernetes - UX Techno
COVID Diaries Pt. 5 | Greyhawk's Meanderings
Covid Diaries Pt. 6 | Greyhawk's Meanderings
Podcasts I’m Playing in 2020 | The Networking Nerd
Understanding Virtual Environments in Python | Codementor
Security 101: Encryption, Hashing, and Encoding · System Overlord
A guide to Terraform for Kubernetes beginners | Opensource.com
Q is for Quadraphonic (Shallow Thoughts)
/usr/bin/hda-verb /dev/snd/hwC0D0 0x17 SET_CONNECT_SEL 1
How to Use Jinja2 Template in Ansible Playbook
j
How to use wifi & enable hotspot at the same time - LinuxH2O
A look at password security, Part I: history and background - The Mozilla Blog
20 Things to Know for Becoming a Successful Linux System Administrator
Building, saving, and loading container images with Ansible | Enable Sysadmin
GnuPG Frequently Asked Questions
ssh whoami.filippo.io
Stressing the network when it's already down
How To Manage KVM Virtual Machines With Virt-Manager - OSTechNix
Microsoft Launches Free Service To Spot Malware In Cloud VMs
Do I Need Swap in Ubuntu? The Realistic Approach - Make Tech Easier
Extra commas in a CSV
Sandboxing in Linux with zero lines of code
Manage KVM Virtual Machines Using Cockpit Web Console - OSTechNix
All About CLAs and DCOs | ConsortiumInfo.org
Contributor License Agreement (“CLA”) Developer Certificate of Origin (“DCO”)
More stupid Bash tricks: Variables, find, file descriptors, and remote operations | Enable Sysadmin
Flask project setup: TDD, Docker, Postgres and more - Part 3 - The Digital Cat
How to Secure and Harden OpenSSH Server
Some PSAs for NUC owners | Armed and Dangerous
Fraunhofer test: Huge security flaws in common home routers | Born's Tech and Windows World
Welcome to the Digital Nomad Life
How to workaround vCenter Update Planner Update installation failed during VCSA 7.0 update | TinkerTry IT @ Home
20 Years of ORACLE-BASE.com | The ORACLE-BASE Blog
Meet CutiePi: A 100% Open Source And Ultra-Portable Raspberry Pi Tablet
Oracle ACFS: "du" vs. "df" and "acfsutil info" - Blog dbi services
Chris's Wiki :: blog/tech/TLSWhatIsSelfSignedCert
Google records every search and YouTube playback | Born's Tech and Windows World
Offline Domain Join using PowerShell and c# - LazyWinAdmin
Keeping virtual Domain Controllers apart on trusted VMware vSphere hosts - The things that are better left unspoken
Chris's Wiki :: blog/tech/TLSHowMultipleChains
MedSeg: AI(Artificial Intelligence)-based Free Online Segmentation Tool for Radiological Images
ThinkPad BIOS update on a stick!
Create USB Multiboot GNU/Linux with GLIM
The Complete Guide to ESXCLI Installation and VIB
Security 101: Beginning with Kali Linux · System Overlord
DogstarRadio.com Sirius Radio Satellite and Repeater Map
Backup Awareness Month, Backblaze, And A Simple Question | PenguinPunk.net
New Tech Vocabulary for 2020 Could Break Software Compatibility
It may become interesting for closed-source blobs, if some companies pledge not to ship any software or firmware with any reference to slavery in the source code.
DBA Appreciation Day | Late Night Oracle Blog
A Complete Guide On Discord Text Formatting: Strikethrough, Bold & More
List of data breaches and cyber attacks in June 2020 ­– 7 billion records breached - IT Governance UK Blog
DDoS Attacks Increase Almost 300% in Just One Year, Study Shows
On a year-over-year comparison with Q1 2019, there's a 278.17% increase. Compared to Q4 2019, that increase jumps to 542.46%. As for the attack size, the numbers don't get any higher. The biggest attack registered 176.29 Gbps, a 21.25% increase from Q1 2019, and the average sits at 1.385 Gbps, a 68.20% increase since Q1 2019. DDoS attacks are becoming more sophisticated, and criminals no longer want just to cripple a website or an online service. They are deploying smaller attacks that might not trigger protections at the ISP level, but which are powerful enough for other purposes. "The attacks are characterized in the size range of 1Gbps and 5Gbps which from our experience often last less than 15 mins and create less than 200 events per day," says the Nexusguard report.
John the Ripper explained: An essential password cracker for your hacker toolkit | CSO Online
How to Build Ansible Inventory in JSON Format – Linux Hint
Tips and tricks for curl and wget | Enable Sysadmin
7 IoT Tips for Home Users
Change Default Passwords Think With Your Head Inventory Your Assets Segment the Home Network Buy Products from Companies That Care about IoT Security Patch and Update Frequently Look for 5G SIMs
Panzer General - A supreme classic revisited
KITT-Lite - Python-Based Pentesting CLI Tool
KITT-Lite
PCI - A Checklist for Preparing for Your Organization's Next Audit
OWASP Application Security Verification Standard
Web App Developers Don’t Need to Be Security Experts to Use the OWASP ASVS | Pivot Point Security
Your Phone Is Vulnerable Because of 2G, But it Doesn't Have to Be | Electronic Frontier Foundation
Kube-Bench - Checks Whether Kubernetes Is Deployed According To Security Best Practices As Defined In The CIS Kubernetes Benchmark
Kube-Bench
HackerOne Reveals Top 10 Bug-Bounty Programs
Data Breach Settlement Has an Unusual Provision
Troy Hunt: Sustaining Performance Under Extreme Stress
Consumer Audit Trail for Data Analysis & Risk Assessment | Identity Blog
Catches of the month: Phishing scams for July 2020 - IT Governance UK Blog
"Don't Believe Proven Liars": The Absolute Minimum Standard of Prudence in Merger Scrutiny | Electronic Frontier Foundation
"There's a sucker born every minute" -Traditional (often misattributed to PT Barnum) "Insanity is doing the same thing over and over again, but expecting different results." -Rita Mae Brown (often misattributed to Albert Einstein) "Once is happenstance. Twice is coincidence. The third time it’s enemy action." -Ian Fleming
Best Deception Protection for Active Directory | Fidelis Cybersecurity
IIS-Raid - A Native Backdoor Module For Microsoft IIS (Internet Information Services)
Chris's Wiki :: blog/solaris/ZFSHierarchyQuotaLack
All My Stripes: The New Business Imperative of LGBTQ+ Inclusion - Security Boulevard
“Don’t talk, just act. Don’t say, just show. Don’t promise, just prove.” -Hiroko Tsuchimoto
It just works - Backup compression on TDE databases - Microsoft Tech Community - 1500316
TLS certificates are a top security concern for businesses
DSHR's Blog: Bill Shannon RIP
Pci passthrough - Proxmox VE
Ripple20 Threatens Increasingly Connected Medical ...
What AppSec Can Learn From Developers’ Feature Bug Workflows
SIFT Workstation Download
Firefox 78 is out – with a mysteriously empty list of security fixes – Naked Security
Innovation Tips and Priorities for Mid-sized Law Firms | DennisKennedy.Blog
Stupid Bash tricks: History, reusing arguments, files and directories, functions, and more | Enable Sysadmin
sudo systemctl status sshd !!:s/status/start/ sudo systemctl start sshd echo “HISTSIZE=5000” >> ~/.bashrc && source ~/.bashrc unset HISTFILE && exit kill -9 $$ pwd ls some/very/long/path/to/some/directory cd $_ pwd
Deploying a static website with Ansible | Enable Sysadmin
How to Create DNS Records in NameCheap - LinuxBabe
Maze Ransomware operators hacked the Xerox CorporationSecurity Affairs
Pandemic Shows Need for Digital Enterprise Strategy - Security Boulevard
InfiniBand Software on Linux
Microsoft releases emergency security updates to fix codecsSecurity Affairs
Fix mellanox element required kernel modules and user space packages · 07e34f90e7 - diskimage-builder - OpenDev: Free Software Needs Free Tools
dkms: ibacm: ibutils: ibverbs-utils: infiniband-diags: libibcm: libibcommon: libibmad: libibumad: libibverbs: libibverbs-runtime: libmlx4: libmlx4-dev: libmlx5: librdmacm: librdmacm-dev: librdmacm-runtime: mstflint: opensm: pciutils: perftest: qperf: rdma: rpm-build: srptools: vlan:
Flash OEM (IBM) Mellanox ConnectX-3 EN with stock firmware? | ServeTheHome Forums
flint -d <device> query full > flint_query.txt flint -d <device> hw query > flint_hwinfo.txt flint -d <device> ri orig_firmware.bin flint -d <device> dc orig_firmware.ini flint -d <device> rrom orig_rom.bin mlxburn -d <device> -vpd > orig_vpd.txt
How WFH is Changing Endpoint Security - Hysolate
Google Online Security Blog: System hardening in Android 11
vSphere Releases 7.0b and 7.0bs - VMware vSphere Blog
How to Upskill Your DevOps
How to Upskill Your Team with Kubernetes - Security Boulevard
How We Dealt With Our "Bathroom Issue" | Penniless Parenting
Not All Vulnerabilities Are Created Alike: Focus on What Matters Most - Blog | Tenable®
Docker Swarm Cheatsheet - buildVirtual
Missing structure in technical discussions
Understand Wi-Fi 4/5/6/6E (802.11 n/ac/ax)
How to Install driver of Mellanox ConnetcX 3 10Gbps Network Adpater in Promxox-VE 5.x or Debian 9 - Steve Dong - A System Administrator's Blog
UCSF paid a $1.14 Million ransom to decrypt files after Ransomware attackSecurity Affairs
How to Build the Right Security Assessment - Security Boulevard
Canadian Loans: A Comparison of 5 Lenders – Running Your Business
Find Your Most Expensive Lines of Code – Amazon CodeGuru Is Now Generally Available | AWS News Blog
Cloud Security for a Dynamic Environment – A Checklist | CSO Online
Public Cloud Security Shared Responsibility Model Provider Integration Private Cloud Security Software-Defined Security Application-Centric Security Hybrid Cloud Single-Pane Management Segmentation Secure Connectivity
cloud-ranges/companies at master · pry0cc/cloud-ranges · GitHub
How Cilium Protects Against Common Network Attacks — Cilium
Sysadmin stories from the trenches: Funny user mistakes | Enable Sysadmin
Tackling the Cybersecurity Challenges Within the Healthcare Industry | CSO Online
Linux Cybersecurity: What You Need to Know - LinuxLinks
Each operating system has its pros and cons: Apple has excellent built-in system protection tools. Linux has a safe sandboxing (program) design environment. Windows has powerful built-in antivirus features.
GoLang: Links to blog posts – working with Oracle Database « Oralytics
How to Use Docker Inspect - buildVirtual
Using Terraform to Deploy the VMware Nested ESXi Appliance · davidstamen.com
SPDX Specification Becomes the Second ISO/IEC JTC 1 Submission From JDF - The Linux Foundation
How to get a domain controller into a test failover – SAFELY! – Notes from MWhite
Sysmon and Alternate Data Streams
OPSWAT Expands OESIS Framework with Anti-Keylogger and Anti-Screen… | OPSWAT
7 Audacity Tips for Better Audio Editing on a Budget
Continuous Integration (CI) Fundamentals - Wahl Network
Using Terraform to Deploy the VMware Event Broker Appliance · davidstamen.com
git clone https://github.com/dstamen/Terraform.git #Clone the Github Repository cd Terraform/deploy-nested-esxi #Change to Runbook Directory vi modules/deploy-nested-esxi/main.tf #Update the configuration file to provide your vCenter Server and Appliance Settings and then Save the file terraform init #Initialize and install the provider if needed terraform plan #Validate the run book will work terraform apply #Deploy your VMs!
How to Check Memory Usage Per Process on Linux – Linux Hint
Chris's Wiki :: blog/python/DjangoAppAdaptations
6 ways HTTP/3 benefits security (and 7 serious concerns) | CSO Online
The 25 greatest Java apps ever written
My remotely proctored AWS Certified Solution Architect – Associate exam experience | Patrick Kremer
The crucial role of Linux in DevSecOps | Oracle Linux Blog
Minutephysics' 'The Astounding Physics Of N95 Masks' - Security Boulevard
Dealing with user namespaces and SELinux on rootless containers | Enable Sysadmin
CubicleNate
The Major Components of an Embedded Linux System – The New Stack
CISO MindMap 2020: Summary of Recommendations for Updating Security ProgramsRafeeq Rehman – Personal Blog
1. Improve SOC analyst productivity with SOAR 2. Reduction/consolidation of tools/technologies 3. Better protection monitoring of Cloud 4. Explore new architecture models like SASE 5. Consider zero trust and secure enclaves 6. Edge computing security 7. Include deception technologies as part of security tools 8. COVID19 and Work from Home
OWASP Top 10 Overview
9 Types of Cyber Attacks Organizations Must Prepare For - Security Boulevard
1. Network intrusion 2. Ransomware 3. Insider threats 4. Brute force attacks 5. DDoS attacks 6. Data exfiltration 7. Malware 8. Compromised credentials 9. Policy violations
How One College Professor Is Trying to Address the Cybersecurity Skills Gap - Security Boulevard
As Layoffs Loom, Be Cognizant of Increased Insider Risk
4 Ways to Keep Company Data Secure During WFH - Security Boulevard
Prioritize User Training and Security Policies Provide Secure Network Access Have a Zero-Trust Mindset Zero trust means that organizations should never automatically trust anything or anyone, no matter if these entities are inside or outside the organization. Keep Systems and Apps Updated Remotely
The State of WFH Security 3 Months In - Security Boulevard
Beyond Passing the Test: Lessons from My Infosec Certification Journey
Setting Up an ISO 27001-Compliant Remote Work Process - Security Boulevard
From a company’s perspective, some of the most common information security challenges are: Reduced security on devices used remotely: While at the office, companies have complete control of devices, defining secure physical and electronic layers. In remote work, employees often make use of personal devices and public networks. Loss of data on remote devices: Lack of proper options for data backup and recovery on remote devices can increase the damage from a data loss incident. Breach of legal requirements: Outside of the company’s environment, it is more difficult to ensure employees’ compliance with laws (e.g., GDPR) and contract clauses related to data protection. Low engagement of remote employees with security practices: Less contact with remote employees can make them less likely to follow security practices.
Hyperproof Releases New Features to Help Organizations Prepare for Compliance Audits | Hyperproof
SOC Teams Care Too Much About Detecting Cyberthreats and Not Enough About MTTD - Security Boulevard
Business Continuity: Planning for the Next Pandemic - Security Boulevard
80% of Drivers Don’t Remove Personal Information Before Selling Their Car - Security Boulevard
OSINT Tip: How to Analyze Exif Data - Security Boulevard
Software Development Life Cycle: Finding a Model That Works - Security Boulevard
How to Pass the Test of “Reasonable Security” When It Comes to CCPA - Security Boulevard
Top 7 must-have cybersecurity books
Tribe of Hackers: Cyber Advice from the Best Hackers in the World by Marcus Carey (July 23, 2019) The Ethics of Cybersecurity by Michele Loi (February 10, 2020) Cybersecurity Essentials by Charles Brooks and Christopher Grow (October 30, 2018) Cybersecurity – Attack and Defense Strategies by Yuri Diogenes (December 31, 2019) The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime by Scott Augenbaum (January 29, 2019) Cyber Security for Beginners: Understanding Cybersecurity and Ways to Protect Yourself by Ken Douglas (April 24, 2020) The Hacker Playbook 3: Practical Guide to Penetration Testing by Peter Kim (May 1, 2018)
Fzf - A Quick Fuzzy File Search from Linux Terminal
Police Data Leaked: A Sign of the Times? - HealthcareInfoSecurity
OSS-Fuzz - Continuous Fuzzing Of Open Source Software
Infosecurity.US - https://infosecurity.us - Using Similar Taxonomies To Understand Present And Future Security Challenges
Cognizant admitted data breach in April Ransomware AttackSecurity Affairs
An Oxymoron : Static Analysis of a Dynamic Language (Part 5)
An Oxymoron : Static Analysis of a Dynamic Language (Part 4)
An Oxymoron : Static Analysis of a Dynamic Language (Part 3)
An Oxymoron : Static Analysis of a Dynamic Language (Part 2)
An Oxymoron : Static Analysis of a Dynamic Language (Part 1)
Thoughts on the state of enterprise open source - ShiftLeft Blog
Data Driven Tests in JUnit 4 with Parameterized Tests - EvilTester.com
Documenting with PowerShell: Documenting DHCP server settings - CyberDrain
Department of Defense Officials Report on Cyber Risk-Based Decisions - Blog | Tenable®
CVE-2020-11896, CVE-2020-11897, CVE-2020-11901: Ripple20 Zero-Day Vulnerabilities in Treck TCP/IP Libraries Disclosed
Using Similar Taxonomies To Understand Present And Future Security Challenges - Security Boulevard
Stop Pitting Privacy Against Public Health, And Start Innovating To Address Both - Security Boulevard
Hacker Culture Reading List · System Overlord
‘BlueLeaks’: Group Releases 270GB of Sensitive Police Documents - VICE
Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release
Comparing Office Documents with WinMerge
The Unintended Harms of Cybersecurity - Schneier on Security
Scott’s Cyber Safety Primer – Scott Gruby's Blog
How COVID-19 sparked a revolution in healthcare machine learning and AI
The 10 Best Free Udemy Courses
Chasing the Perfect Podcast Microphone Sound | Daniel Miessler
linuxium.com.au: Demonstrating the usage of 'ISO' tools with a real-life example
What Is a Custom Android Recovery? Getting Started With TWRP
What the HEIC? Apple’s Highly Compressed Image Format Still Confuses - TidBITS
'Ripple20' Flaws in Medical Devices: The Risks
Alerts: Vulnerabilities in 6 Medical Devices - HealthcareInfoSecurity
Linked: Only 31% of Americans concerned with data security, despite 400% rise in cyberattacks
1. The company’s data security is the company’s problem, not the employee’s. That’s not to say that employees don’t care, engaged employees do care if there’s a data breach at their company, and want the company to do well and stay safe overall. But, they haven’t really been given an incentive to care that much. One because many of your employees probably aren’t very engaged at all, and also because: 2. There are no consequences for getting it wrong. How many times has a senior exec willfully routed around security protocols and faced zero consequences? How many times has someone you worked with fallen for a simple phishing email and had no real consequences? If I know that nothing is really going to happen to me if I am the security weak spot, or that the company isn’t really following it’s own guidelines, why should I spend a lot of time worrying about it? There’s plenty of other things to worry about and focus on. Which is exactly what I take away from this survey.
Powershell – Hard Link AD Accounts To Existing Office 365 Users | geekdudes
Replace or repair roof? Know when it's time. - The Silicon Underground
A user story about user stories | Armed and Dangerous
LKRG 0.8 Released For Increasing Linux Kernel Runtime Security - Phoronix
Typical benefits package for employees - The Silicon Underground
cause 46% of Americans don’t participate. That means 46
Introduction to Linux-based document management systems | Enable Sysadmin
Android 3.0 Honeycomb: The Android version we all forgot | Android Central
Abusing Kerberos Using Impacket
Track D 03 Stopping Cyberboom Mitiaging User error Ira Winkler - YouTube
Spyse: All-In-One Cybersecurity Search Engine
Linked: How The Pandemic Is Forever Changing The Employer-Employee Relationship. And Why That Matters.
“The tools offices provide natively, the utilities and services and yes, perks, that make working both an effective and human experience, cannot be the sole province of your employees just because the office has moved to the home. Unequal access to dedicated workspaces and better technology will undoubtedly affect work performance. What happens when some of your employees are able to reduce their distractions with dedicated home offices, better tech, daycare, and cleaning services, while others simply can’t afford to do the same? What new costs do you expect employees to foot that didn’t exist prior to the pandemic? It’s time to start asking these hard questions because they are going to be critical from now on, and the companies that thrive will be those that take advantage of the money saved by leaving their office rentals to support their team members. “
Are home warranty plans worth it? - The Silicon Underground
What enterprises need to consider on the journey to digital transformation [Q&A]
An Expanded PowerShell Scripting Inventory Tool • The Lonely Administrator
Building a PowerShell Inventory • The Lonely Administrator
Formatting PowerShell TimeSpans • The Lonely Administrator
WWoIT - Wayne's World of IT: Finding where a user is logging on from
WWoIT - Wayne's World of IT: Useful PowerShell command-lines #2
WWoIT - Wayne's World of IT: More useful command-lines
Apple Cider Vinegar + Dish Soap Fly Trap | Cool Tools
Fruit flies can materialize in even the most spotless kitchens. Until recently, I had no idea that they could be dealt with in a safe, effective, and cheap manner using apple cider vinegar and dish soap. By simply pouring apple cider vinegar into an open cup or bowl and adding a drop or two of dish detergent you can easily make an incredibly effective trap for ridding your kitchen of fruit flies. Place it near your fruit bowl or trash can and within a day you will have nipped the problem in the bud. Apple cider vinegar works as an attractant because of its strong sweet odor while the dish detergent decreases the vinegar’s surface tension so that when a fly touches the surface it immediately sinks and drowns. It’s particularly satisfying to see the collection of flies you have dealt with at the bottom of the glass. This has to be one of the best house keeping tricks I have ever picked up.
“Tips My Dad Says” 2020 Edition | Cool Tools
It’s Never Too Early to Teach | Don Jones®
Ditching X86, Apple Starts An ARM Race | Hackaday
20 Essential Photography Accessories for Beginners and Newbies
5 Simple Linux Tools For Enhanced Productivity - Tate Galbraith - Medium
https://en.wikipedia.org/wiki/Single-responsibility_principle while true; do cat file.txt; echo -e "\n\n$(date)\n\n"; sleep 1; done openssl x509 -text -noout < cert.pem openssl x509 -checkend 86400 -noout < cert.pem cd <dir> && tar --exclude='.*' -czvf logs.tar.gz *.logs dd if=/dev/urandom of=testfile bs=1024MB count=1 uname -a; echo -e "\n"; dpkg --list | grep linux-image
Store Data With Models · Matt Layman
How to stress test your Linux system | Network World
The Law of Classified Information: A Primer - Lawfare
BBP: You’ve Just Been Promoted... - The Ethical Hacker Network
Using Static Analysis to improve your Java Coding - EvilTester.com
Basic Differences Between JUnit 4 and Junit 5 - EvilTester.com
All You Need to Know About DNS Spoofing to Keep Your Organization Safe
Hubbard on Networking: Disable Weak SSH/SSL Ciphers in Cisco IOS
Turn on MFA Before Crooks Do It For You — Krebs on Security
NBlog - the NoticeBored blog: NBlog June 26 - things an ISO27k SoA doesn't say
Balance access control and accountability controls & tune IAM to business
Data Security in the SaaS Age: Thinking Small
New Lucifer DDoS botnet targets Windows systems with multiple exploitsSecurity Affairs
A daily average of 80,000 printers exposed online via IPPSecurity Affairs
Generating JUnit HTML Reports - EvilTester.com
Using Both JUnit 4 and Junit 5 - EvilTester.com
How to fix Java Language Level Issues - EvilTester.com
What is Software Testing? My working definition. - EvilTester.com
SauceCon 2020 - Automating Tactically and Strategically - EvilTester.com
Virtuoso Webinar - The Future of Testing - EvilTester.com
So You Want to Learn ICS Security… – tisiphone.net
The Basics of Web Application Security
Learn how to build a MEAN stack application with this Angular tutorial | Angular Templates
The Industrial Ethernet Book | Knowledge | Technical Articles | Cyber security model for manufacturing
Red Hat CEO: We Have A ‘Head Start’ Over VMware, Competitors In Kubernetes
Announcing SQL Developer, SQL Developer Data Modeler, & SQLcl versions 20.2 – ThatJeffSmith
Average Cost of a Data Breach: $116M
Automatically detecting Ransomware infections for free – Virtually Sober
My venture in hacking a fake vintage radio – Huan Truong's Pensieve
Calculating your Azure Log Analytics bill when you stream your Azure AD logs to it - The things that are better left unspoken
On UNIX Shells | Brian Reiter's Thoughtful Code
Windows 10: Juni 2020 Updates causes BSOD in lsass.exe | Born's Tech and Windows World
Exploiting Technology Inflection Points - Architecting IT
Maybe the vendor doesn’t keep up with innovations around new technology, consumption models or automation.  Perhaps the vendor decides to revamp a product line that means a change to another vendor is no different from adopting the new strategic platform.  Either way, a stagnant or confusing portfolio offers the chance to gain benefits from making a change.    
How to Send Emails Using Amazon Simple Email Service (SES)
What's new in vSphere 7?Electric Monk | Electric Monk
Attaching your own CentOS 7 yum repository to AWS SSM - Blog dbi services
Oracle Cloud basics for beginners - Blog dbi services
Upgrade Webinars 1 and 2 - A quick recap, slides download and more
Bad Quality Intel Chips Motivated Apple To Choose ARM, Says Ex-Intel Engineer
“It was abnormally bad. We were getting way too much citing for little things inside Skylake. Basically our buddies at Apple became the number one filer of problems in the architecture. And that went really, really bad.”
Customize your Linux terminal with your favorite logo | Opensource.com
10 Best Linux Apps You Must Have For Everyday Use [2020 Edition]
1. Liferea — Feed Reader 2. Fragments — A BitTorrent Client 3. GNOME Boxes — Virtual Machine Solution 4. Krita — A Digital Painting App 5. Podcasts — GNOME Podcast Client 6. Calibre — E-book Manager 7. VSCode — Free Code Editor 8. Stacer — Linux System Optimizer 9. KTouch —Typing Tutor 10. Déjà Dup — A Backup Tool
Break Out of Your Career Rut | People Centre
Raspberry Pi High Quality Camera powers up homemade microscope - Raspberry Pi
REvil ransomware gang scans healthcare victim's network for PoS systemsSecurity Affairs
Gungjung Tteokbokki with Tofu Recipe, Korean Royal Court Rice Cake Stir Fry, Gluten Free, Vegan | Penniless Parenting
Microsoft Defender ATP Now Available For Ubuntu And Other Linux Distros
The ineffective CISO – Open Source Security
What enterprise developers need to know about security and compliance - Red Hat Developer
GitHub - r-darwish/topgrade: Upgrade everything
Are 14 people really looking at that product? - Dev Genius - Medium
It’s Time to Start Learning Coding: Top 20+ Best Websites To Learn Programming in 2020 | Codementor
A look at the ESP8266 for IoT [LWN.net]
5 modern alternatives to essential Linux command-line tools | Opensource.com
ncdu htop tldr jq fd
Getting Started with GIMP
How to assess user activity in Linux | Network World
Automated MythTV-related maintenance tasks
GitHub - 1N3/Sn1per: Automated pentest framework for offensive security experts
Linux Ransomware - Notorious Cases and Ways to Protect - Hacked
Setting up a home NAS system: Sysadmin After Dark | Enable Sysadmin
Windows 10 May 2020 Performance For WSL vs. WSL2 - Phoronix
TASMOTA Now Supports ESP32 Targets including some Ethernet and Camera Boards
COVID-19 May Have Just Saved US Healthcare ~ Cyber Thoughts
The latest headless CMS, a new Firefox release, huge leaps in open source audio engineering, and more open source news | Opensource.com
Healthcare CISOs Share COVID-19 Response Stories
Meet the Groundswell of Open Source COVID-19 Efforts
Testing Intel FSGSBASE Patches For Helping Elevate Linux Performance - Phoronix
FSGSBASE
Planned vs. Perceived Obsolescence — My Money Blog
How to Disable Dock on Ubuntu 20.04 [The Easy Way]
gnome-extensions enable ubuntu-dock@ubuntu.com gnome-extensions disable ubuntu-dock@ubuntu.com
Core Modernization Leads the way to Business Success
Adding Observability To Your Python Applications With OpenTelemetry - The Python Podcast
Red Hat Enterprise Linux 8.2 brings faster Python 3.8 run speeds - Red Hat Developer
Use Azure, they said. It will be fun, they said. | a Linux Rat in the Lab
LinuxCheck: Linux information gathering tool | Andrea Fortuna
Doc Searls Weblog · So far, privacy isn’t a debate
6 Best Netflix Chrome Extension To Make The Most Out Of Netflix In 2020
How to Download and Install RHEL 8 for Free
Gestalt IT Podcast - Orchestration is the reason enterprises haven’t adopted containers. - CormacHogan.com
Configurig the postfix MTA to securely forward to a smarthost on macOS | Brian Reiter's Thoughtful Code
The 10 Best Linux Hardware and System Info Tools in 2020
CPU-X I-NEX Hardinfo KDE HAL Device Manager lshw-gtk Sysinfo Neofetch HWinfo CPU-G KInfoCenter
Top 6 Free and Open Source Video Conferencing Solutions for Education
Fraidycat - organize your content - LinuxLinks
Securing a Containerized Django Application with Let's Encrypt | TestDriven.io
vtop - A Linux Process and Memory Activity Monitoring Tool
Top 10 SQL Developer Tips for 2020 – ThatJeffSmith
Toward Applied Andragogy in Cyber Security Education | Chris Sanders
Andragogy
June 28 Is Insurance Awareness Day – Running Your Business
How to install NextCloud 19 on Ubuntu 18.04/19.04/19.10/20.04 – Marksei
AWS Solutions Constructs – A Library of Architecture Patterns for the AWS CDK | AWS News Blog
Updating the vCenter Server Appliance (VCSA) with PowerCLI - Revisited · davidstamen.com
VMware vSphere 7.0 Hands On Lab are available now | ESX Virtualization
Building a Disruption-Free Enterprise IT | APMdigest - Application Performance Management
Fixes for Some Vagrant Issues on Fedora - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Code Only Says What it Does - Marc's Blog
Fundamentally, debugging is an exercise in changing what a program does to match what it should do.
Terraform Apply - The Associate Certification Exam - Wahl Network
Educational Radio, Educates | Hackaday
How to Talk with Your Parents About Their Finances
OctoPrint: a baby monitor for your 3D printer - Raspberry Pi
'Hampton' No More: Man Sheds Family Name With Ties To Confederate General : Live Updates: Protests For Racial Justice : NPR
Original Juneteenth Order Turns Up At U.S. National Archives : Live Updates: Protests For Racial Justice : NPR
The 15 Best True Story Podcasts for Real Crazy Stories
https://www.constantpodcast.com/ https://gimletmedia.com/show/heavyweight/ https://wondery.com/shows/this-is-actually-happening/ https://www.ttfa.org/ https://www.revolutionspodcast.com/ https://www.futilitycloset.com/podcast/ https://genwhypod.com/ https://www.bbc.co.uk/programmes/p02s5rx7/episodes/downloads https://www.npr.org/podcasts/469516571/modern-love http://outsideinradio.org/ https://thisislovepodcast.com/ http://www.thesecretroompodcast.com/ https://headgum.com/dead-eyes https://www.thisamericanlife.org/ https://getmortified.com/podcast/
High Performance Cheap Windows VPS Hosting with Pure SSD Storage
Checking Out Raspberry Pi OS 64-Bit on Raspberry Pi 4 8GB RAM
Build AWS images with Image Builder :: Major Hayden 🤠 — Words of wisdom from a social nerd
Configuring Autologon during OSD using Autologon.exe – CCMEXEC.COM – Enterprise Mobility
About PowerShell update notifications | >_
Remove and Reinstall Microsoft WSUS | PeteNetLive
Agile DevOps Needs Cloud Optimization | APMdigest - Application Performance Management
Automating dotnet core SDK updates on Mac | Brian Reiter's Thoughtful Code
Chris's Wiki :: blog/programming/ProductAndUtilityCode
OpenVPN Server on Centos7 with Active Directory authentication. – Nerd Drivel
AppDynamics Receives FedRAMP Authorization | APMdigest - Application Performance Management
EVPN: The Great Unifying Theory of VPN Control Planes? « ipSpace.net blog
How to Enable HTTP/2 in Apache on Ubuntu
Linux tools for improving your time management | Opensource.com
Mastodon Fun - Sharing Free Software and Ubuntu Touch Together
VMware Cloud on AWS: A Cost-Effective Platform for Disaster Recovery – Ather Beg's Useful Thoughts
Upgrading to WSL2 | Fun with virtualization
Virtualization The Future: VMware Learning Zone Premium Package 6 Month Promotion
E0B9142C-1325-4D6F-AC64-E7AC775BC2B2.jpeg (600×1136)
Starting Your Network Automation Journey · Daniel Teycheney
Adobe Flash Player dies this year and you'll be told to uninstall it
David Byrne | Radio
PXE Boot different OS images | Adam Young’s Web Log
Pi Zero HoneyPot
Adobe Flash: End-of-Live date again announced | Born's Tech and Windows World
Ubiquiti UniFi US-8 Gigabit Switch - The Tech Journal
Managing Deployment Secrets with Azure Key Vault - Cloud for the win!
Terence Luk: Configuring an Azure Traffic manager to load balance a Windows Server AD FS WAP and Citrix NetScaler AD FS WAP
5 Carpentry HACKS with a DECK of CARDS
Automatic keyboard switch tester – Dangerous Prototypes
What Is an Electric Vehicle and How Does It Work?
Oracle Linux 8.2 Released with UEK6, Latest Toolset
What’s New in Oracle Linux 8.2 Linux Kernel 5.4 GNOME Desktop Environment 3.32+ Unbreakable Enterprise Kernel Release 6 (UEK6) Red Hat Compatible Kernel (RHCK) Secure Boot available by default Clang toolset updated to version 9.0.0 Rust toolset updated to version 1.39 Go toolset updated to 1.13.4 GCC Toolset 9 GCC version updated to 9.2.1 GDB version updated to 8.3 MySQL 8.0 Python 3.8 Nested Virtual Machines (VM) capability added; this enhancement enables an Oracle Linux 7 or Oracle Linux 8 VM that is running on an Oracle Linux 8 physical host to perform as a hypervisor, and host its own VMs. virt-manager application deprecated; Oracle recommends using the Cockpit web console to manage virtualization in a GUI.
GitHub - jkutianski/qmk_compaq_mx-11800: Compaq MX-11800 QMK implementation
Ask Hackaday: Are 80 Characters Per Line Still Reasonable In 2020? | Hackaday
School’s In Session With HackadayU | Hackaday
The Ups And Downs Of The Server Cycle - IT Jungle
When Did Apple Become Popular? A Brief History of the Rise of Apple
Copy And Paste Deemed Insecure | Hackaday
Turns out most of the things you want to do with your computer are the very things that are a security risk.
Great lessons from great men
What 80,000 Hours learned by interviewing people we respect 'anonymously' - 80,000 Hours
8 Lessons from 20 Years of Hype Cycles
Lesson 1. We're terrible at making predictions. Especially about the future. Lesson 2. An alarming number of technology trends are flashes in the pan. Lesson 3. Lots of technologies just die. Period. Lesson 4: The technical insight is often correct, but the implementation isn't there Lesson 5: We've been working on a few core technical problems for decades Lesson 6: Some technologies keep receding into the future Lesson 7: Lots of technologies make progress when no-one is looking Lesson 8: Many major technologies flew under the Hype Cycle radar
Become a Vulnerability Management Guru in 10 Days - Security Boulevard
Breaking Down CIS Controls
An Obsession with Retro Japanese Rounded-Corner Windows | Spoon & Tamago
How to Manage Your Tasks in the Terminal with Taskbook
How to Enable HTTP/2.0 in Nginx
5 Lessons Learned From Patching During a Pandemic - Security Boulevard
Digital Transformation Moves Application Security to the Top CISO/CSO Priority - Security Boulevard
Winning at Vulnerability Management: 8 Best Practices - Security Boulevard
1. Scan hosts more frequently than networks: Network-based scanners add significant overhead as they scan through network services. They also require attention such as configuring settings, opening firewall ports and so on. Host-based scans, on the other hand, do not traverse the network; they eliminate network overhead and allow more continuous scanning. 2. Scan images rather than instances: In modern cloud-native applications, most of the server instances are installed from one image. Testing the image for vulnerabilities instead of scanning the instances is yet another way that organizations can achieve continuous detection without straining network resources. 3. Augment active scanning with “scanless” non-disruptive methods: Use data from existing DevOps, security and IT repositories such as patch/asset management systems to conduct scanless, rule-based profiling of potential vulnerabilities across all network nodes. When these non-disruptive, scanless results are consolidated with the results of periodic active scanning, the organization can achieve virtually real-time visibility into vulnerabilities without impacting performance. This approach can be implemented using open source tools such as osquery and QRadar. 4. Use multiple factors and context-based risk assessment to prioritize remediation: A variety of external and internal sources should be correlated to better understand the severity of a specific vulnerability within the organization’s unique environment. Examples of external sources would be the CVSS score as well as threat intelligence repositories. Internal sources would be the organization’s asset management and change management systems to understand the business criticality and security posture of the assets threatened by the vulnerability. 5. Maintain a single source of truth for all relevant teams: Enterprises typically have multiple teams working on vulnerability remediation. For example, the security team is charged with the responsibility for vulnerability detection, but it is the IT or DevOps team that is expected to remediate. Effective collaboration is essential to create a closed detection-remediation loop. Each team usually has specialized stacks of databases, processes and tools that can and should be tightly integrated into a centralized vulnerability management platform with the capacity to orchestrate remediation, so that they share a single source of truth. This best practice can be implemented in-house or it can be achieved through third-party solutions. 6. It’s not all about patching: Vulnerability remediation must take shape in a reality where patches are not the only solution. Other remediation approaches include configuration management and compensating controls, such as shutting down a process, session or module. The optimal remediation method—or combination of methods—will differ from vulnerability to vulnerability. To achieve this best practice, it is important to maintain a knowledge base of how to match the best remediation solution to a vulnerability, based on the organization’s cumulative vulnerability management experience. It is also possible to take advantage of third-party knowledge bases that rely on very large data sets. 7. Use remediation playbooks: To match the scalability and velocity of today’s threat environment, vulnerability remediation must be as automated as possible. One highly effective way to achieve such automation is to create predefined playbooks that are tailored to the organization’s environment. Here’s an example of a simple playbook scenario: 8. Use vulnerability management metrics that improve and fine-tune detection, prioritization and remediation processes: Purely quantitative metrics such as a vulnerability count, average CVSS scores of detected vulnerabilities, number of scans run or vendor-based criticality do not provide meaningful insight into the effectiveness of your vulnerability management efforts. As discussed in more detail in this blog on vulnerability metrics, the more meaningful metrics are qualitative—such as coverage, vulnerability dwell time, the average number of vulnerabilities per asset over time and to what extent SLAs are being met. Make it a cross-enterprise objective to improve the vulnerability remediation metrics that have a real impact on your organization’s KPIs.
How to Secure CI/CD services | Orca Security - Security Boulevard
How to sell open source software | Opensource.com
Odroid-H2+ advances to faster Gemini Lake SoC, adds dual 2.5GbE ports
Odroid-H2+
Java's 25th birthday prompts a look at which tech products have survived since 1995 - TechRepublic
Home Assistant, the Python IoT Hub [LWN.net]
Chris's Wiki :: blog/linux/FedoraRemovingMustBeOptIn
Yes, you read that correctly: Win7 machines don’t get free security patches, but they do get a free copy of Chredge @ AskWoody
Chredged
Chris's Wiki :: blog/sysadmin/DNSUpdatesAndSecondaries
Adobe will tell you to uninstall Flash by the end of 2020 | Engadget
Install Docker on Ubuntu using Script | DEVOPS MY WAY
Introducing AWS Snowcone – A Small, Lightweight, Rugged, Secure Edge Computing, Edge Storage, and Data Transfer Device | AWS News Blog
Windows 10: Update plans explained | Born's Tech and Windows World
Redirecting URLs with mod_rewrite | Fat of the LAN
Deleting old log files | Fat of the LAN
find /path/to/logs/ -mtime +90 | xargs rm -rf
Esxtop: Uses and Performance Troubleshooting
VMware Snapshots: Patching vCenter
Building a Elasticsearch cluster using Docker-Compose and Traefik | Marco Franssen
Working with Celery and Django Database Transactions | TestDriven.io
Moving to cloud-based SIEM: the cost advantage - Microsoft Security
What's Anonymous Up to Now?
Akamai Discloses Details of Massive DDoS Attack - Security Boulevard
AWS mitigated largest DDoS attack ever of 2.3 TbpsSecurity Affairs
Storage Trends – etbe – Russell Coker
How to virtually lead engaging technical presentations – IBM Developer
Time to upgrade your monitor @ tonsky.me
Fat of the LAN | Living off the fat of the lan
UniFi RADIUS with a certificate - anyone doing this successfully? | Ubiquiti Community
802.1x authentication with Unifi controller and Ubiquiti access points - rieskaniemi.com
Top 6 security best practices for agile development environments
1. Utilize the hacker in that developer 2. Always consider the “evil” user interacting with the system 3. Uphold continuous integration practices, tools and platforms 4. Review user stories with every iteration and adapt as necessary 5. Innovate with security 6. Cultivate the culture of security
CMMC compliance only for employees handling CUI - PreVeil
The 4 Most Important Components of Security Posture (Part 2 - People)
The 4 Most Important Components of Security Posture (Part 1 - Asset Inventory)
1. Inventory 2. People/Users 3. Security controls 4. Network configuration and segmentation
How to Picture Your Enterprise Security Posture - Security Boulevard
Install An SSL Cert For Ansible Tower Using LetsEncrypt | Greg Sowell Consulting
Oracle Long Term Support vs Innovation Releases
Healthcare Exchange Standards: Web API security as foundation for #FHIR
When Security Takes a Backseat to Productivity — Krebs on Security
Leveraging ISO 27001 for CMMC Requirements | Pivot Point Security
The Real Robotic Revolution - VICE
Static Application Security Testing: SAST Basics - Security Boulevard
8 Best Books to Learn and Master Linux [For All Levels]
S3 Bucket Audit Report using AWS PowerShell Script – Secure your S3 Buckets – Techno Chat|Tech Blog!!
Discover & Attack Raspberry Pi’s on a Network – ls /blog
How to Install Ralph Asset Management System on Ubuntu 20.04
Explicit content and cyberthreats: 2019 report | Securelist
Weekly Tech Roundup #10 | Andrea Fortuna
“The Internet is a telephone system that’s gotten uppity.” – Clifford Stoll
Stay ahead of multi-cloud attacks with Azure Security Center - Microsoft Security
Ransomware from Your Lawyer's Perspective
1. What happens in the first few hours after discovering ransomware is mission critical to my legal analysis. 2. Do we negotiate with the cyber terrorists? 3. Be ready to work with law enforcement and to know whom to engage.
Roman Dodecahedrons Part II | Tinkerings
Roman Dodecahedrons Part I | Tinkerings
Computers as I used to love them @ tonsky.me
ci-templates - templates for Gitlab CI pipelines — ci-templates documentation
Who-T: It's templates all the way down - part 2
Whitelisting explained: How it works and where it fits in a security program | CSO Online
Legal Documents You Should Prepare Now for COVID-19 - FindLaw
If that's true, what are the documents you should prepare now? Here's a list. An advance health care directive: This form allows you to identify someone who will speak for you if you become too sick to communicate or physically incapacitated. It also allows you to indicate your preferences on life-prolonging procedures. A health care proxy also allows you to name someone to make medical decisions for you. A living will: This document can also address your preferences on life-prolong procedures, as well as other preferences. HIPAA releases: These are documents where you name a person to communicate with medical providers about your private medical records. A power of attorney: With this document, you name someone to make financial and legal decisions on your behalf when you can't do so. A will: This document instructs survivors how your assets will be divided up after your death. It also allows you to designate guardians for your minor children. It's always best to prepare, especially now. There's an old Chinese proverb that says, "The best time to plant a tree was 20 years ago. The second best time is now." It's not too late to plant the tree.
Abuse of HTTPS on Nearly Three-Fourths of all Phishing Sites - Security Boulevard
T-Mobile Outage Causes Unfounded Panic About a DDoS Attack That Didn’t Happen - VICE
Exploiting a crisis: How cybercriminals behaved during the outbreak - Microsoft Security
Ancient History Of The Phone Jack | Hackaday
Join The Movement With This Mini Cyberdeck | Hackaday
Fetch COVID-19 US state data and upload to site as JSON in Python 3. - Dark Artistry
Too old for protests so I brought them to me. - Dark Artistry
GitHub - evilsocket/opensnitch: OpenSnitch is a GNU/Linux port of the Little Snitch application firewall
Solving the PowerShell Object Age Challenge - Part 2 • The Lonely Administrator
Solving the PowerShell Object Age Challenge - Part 1 • The Lonely Administrator
Why does reseating RAM work? - The Silicon Underground
House money pit solutions - The Silicon Underground
In Defense of Working One More Year (OMY) — My Money Blog
T-Mobile outage cuts off users across the US | Engadget
Hertz Used Rental Cars: Good or Bad Idea? Big List of Pros and Cons — My Money Blog
Improving Linux container security with seccomp | Enable Sysadmin
‘Anonymous’ takes down Atlanta Police Dept. site after police shooting – Naked Security
Latest Intel CrossTalk Vulnerability Now Patched in Debian GNU/Linux, CentOS and RHEL - 9to5Linux
[Howto] My own mail & groupware server, part 3: Git server – /home/liquidat
Data Security in the SaaS Age: Focus on What You Control
1. Create: This is probably better called Create/Update because it applies to creating or changing a data/content element, not just a document or database. Creation is generating new digital content or altering/updating of existing content. 2. Store: Storing is the act committing digital data to some sort of storage repository, and typically occurs nearly simultaneously with creation. 3. Use: Data is viewed, processed, or otherwise used in some sort of activity. 4. Share: Exchange of data between users, customers, or partners. 5. Archive: Data leaves active use and enters long-term storage. 6. Destroy: Permanent destruction of data using physical or digital means such as crypto-shredding.
The Bright Side of the Dark Web - Dark Reading
High-Level vs. Low-Level Programming Languages, Explained
15 Essential Tips for Ubuntu Linux Power Users
7 Useful PowerPoint Templates for More Efficient Meetings
How to Fix Your Microphone Problems in Windows 10
5 Common Internet of Things (IoT) Security Issues and Fixes
1. IoT Home Hub Devices Record Everything 2. They Can Be Hacked From the Outside 3. Devices Don’t Use Encryption 4. IoT Devices Aren’t Properly Updated 5. Devices Use Default Factory Passwords
10-minute home cardio workout - NHS
22 Essential iPhone Keyboard Tips and Tricks
Erman Arslan's Oracle Blog: ODA -- "Patch your ODA with ODA Patch Bundle" - Stay away from PSUs, CPUs and/or other patches
Axiom - A Dynamic Infrastructure Toolkit For Red Teamers And Bug Bounty Hunters!
Examining the US Cyber Budget - Schneier on Security
GNU Health Embedded Open Source Health Platform Works on Raspberry Pi 3/4, and soon Olimex SBC's
Ethical Hacking Basic Concepts – Linux Hint
A Beginner’s Guide To Lithium Rechargeable Batteries | Hackaday
Lessons In Li-Ion Safety | Hackaday
Quantum Computing And The End Of Encryption | Hackaday
Vernier Calipers And Micrometer Screw Gauges, Measuring Without Compromise | Hackaday
Burning Chrome | Hackaday
Homebrew Coil Winder Makes Toroids A Snap To Wind | Hackaday
Modernizing Passwordless Authentication: What Enterprises Can Learn From the U.S. Government - Security Boulevard
Lesson 1: Usability Is a Must Lesson 2: Secure Accordingly Lesson 3: No Legacy Left Behind 
Cyberattack Fears Haunt State Employees More Than Natural Disasters and Terrorist Attacks - Security Boulevard
Solder To Aluminum | Hackaday
Windows 10 Version 2004: Deprecated/removed features | Born's Tech and Windows World
Some Virtualization Papers Worth Reading - Marc's Blog
Binary Math Tricks: Shifting To Divide By Ten Ain’t Easy | Hackaday
Ubuntu 20 vs Sonos: SMBv1 | Nelson's log
PowerShell to Rename Datastores - Notes of a scripter
$datastoreNames = get-datastore datastore1* foreach ($Datastore in $datastoreNames){     write-host $Datastore.name "- " -NoNewline     $VMhostFQDN = (get-vmhost -id $(get-datastore $datastore).ExtensionData.host.key).name     $VMhostname = $VMhostFQDN.Split(".")[0]     $datastorenewname = $VMhostname + "-localstorage"     Get-datastore -name $datastore | Set-datastore -Name $datastorenewname }
How CERN Made High Quality Electronics In The 1970s | Hackaday
Protecting virtual Domain Controllers on vSphere with Virtualization-based Security - The things that are better left unspoken
My Windows Terminal Color Schemes - Thomas Maurer
DSHR's Blog: Informational Capitalism
ESP32 Becomes Music Player In Under 40 Lines Of Code | Hackaday
Threat Modeling Application Released By OWASP: Threat Dragon 1.0 - Security Boulevard
RS-232 and RS-485 - Security Boulevard
Security of Health Information - Security Boulevard
The Easy Way to HIPAA Compliant Password Security – LogonBox Journal
Step by Step Azure NAT Gateway – Static Outbound Public IP address #ANG #NAT #WVD #Azure #Security #Cloud #MVPBuzz #AzOps #ITPRO #VirtualNetworks #PowerShell | Robert Smit MVP Blog
The top 5 states for cybersecurity jobs - Security Boulevard
Consider these numbers: In the United States alone, there’s an estimated cybersecurity workforce shortage of nearly half million workers (source) The ratio of supply to demand (meaning the number of workers to the number of openings) is 1.9 for the industry, compared to 4.9 national average for all jobs (source) The cybersecurity specialist occupation is growing at an annual compound rate of 30 percent (source) The U.S. Bureau of Labor Statistics (BLS) projects a 32 percent growth in the employment for information security analysts between 2018 and 2028 While the demand is strong across the country, some states rise to the top based on criteria such as the number of openings and salary. Let’s take a look at some of the best states for cybersecurity jobs. (Note: Except for Virginia, these are not listed in any particular order of ranking).
Concretedog: £12 HDMI-USB Video capture card on Ubuntu (cheap portable Rpi Monitor!)
How to Cyber Security: Software is manufacturing - Security Boulevard
Legacy vulnerabilities: How to find and remediate them | Synopsys
Top 5 Open Source Serverless Security Tools - Security Boulevard
Snyk Docker-Lambda Protego Lumigo CLI AWS Serverless Developer Tools
Dependency Management: 3 Tips to Keep You Sane - Security Boulevard
#1 Prioritize. Some dependencies are more important than others, so it is important to be able to prioritize them, particularly when it comes to vulnerabilities. You need to understand exactly which open source vulnerabilities are being accessed by your code and which vulnerabilities aren’t so that you can update your most critical dependencies first.  #2 Automate. Maintaining your dependencies can be extremely time sensitive when it comes to vulnerabilities and bug fixes. You can save time and reduce your exposure by automating dependency updates in your software projects and have your dependencies updated when new versions are released. #3 Establish policies. Establishing a clear policy up front about open source usage and dependency management helps prevent headaches later in development when it is more costly to resolve them. Your policies act as a playbook by telling your development and security teams how to handle these threats in your open source components. Without policies to give clear guidance, managing dependencies efficiently tends to be extremely hard if not close to impossible.
My Top Five Cyber Security Books - Signal Sciences
The Evolution of AppSec: Past, Present, and Future - Security Boulevard
Uncommon Sense Security 2020-03-17 16:46:00 - Security Boulevard
Cleaning up Splunks .CSV export - Security Boulevard
The Top 22 Time Saving Tools for IT Admins - JumpCloud
Two-Thirds of Healthcare Organizations Have Suffered a Security Incident - Security Boulevard
Web Application Security at Every Stage of the SDLC - Security Boulevard
Apache Struts research, Part 2: Execution environments | Synopsys
Apache Struts research, Part 1: Building 115 versions of Struts | Synopsys
Road to Detection: YARA-L Examples — Part 4 of 3 - Anton on Security - Medium
Chronicle Road to Detection: YARA-L Language — Part 3 of 3
Chronicle Road to Detection: Approach — Part 2 of 3
Chronicle Road to Detection: Context — Part 1 of 3 - Anton on Security - Medium
Bluetooth security in Windows 10 - Security Boulevard
Kids' Cybersecurity Activity Book to the Rescue
IT and Cyber Security Challenges in Healthcare Industry - Security Boulevard
Current CMMC Milestones For 2020
How To Reduce Your Attack Surface with System Hardening
Healthcare Is 20 Years Behind Banks on Cybersecurity in Canada, Experts Say - Security Boulevard
5 Best Practices for TLS Certificate Management | Keyfactor - Security Boulevard
01 | Know the importance of TLS certificates 02 | Centralize inventory of TLS certificates 03 | Define ownership and policies 04 | Focus on detection and prevention 05 | Adopt automation and self-service
CCPA enforcement begins in July – and this time it’s for real - Security Boulevard
Cyber Security Roundup for June 2020 - Security Boulevard
86% of data breaches for financial gain – up from 71% in 2019  43% web application (cloud-based) – these attacks have doubled, reflecting the growth in the use of cloud-based services. 67% of data breaches resulted from credential theft, human error or social attacks.  Clearly identified cyber-breach pathways enable a “Defender Advantage” in the fight against cyber-crime  On-going patching successful – fewer than 1 in 20 breaches exploit vulnerabilities The vast majority of breaches continue to be caused by external actors. 70% with organised crime accounting for 55% of these.  Credential theft and social attacks such as phishing and business email compromises cause the majority of breaches (over 67%), specifically: 37% of credential theft breaches used stolen or weak credentials, 25% involved phishing Human error accounted for 22%
What is Boolean? - Security Boulevard
Eliminate AppSec Sprawl - Security Boulevard
The Lean, Mean Vulnerability Management Machine - Security Boulevard
https://www.hsgac.senate.gov/imo/media/doc/Testimony-Feeney-2017-06-21.pdf
Financial Sector Cybersecurity Framework Profile Consolidates Regulatory Requirements - Security Boulevard
https://www.hsgac.senate.gov/imo/media/doc/Testimony-Feeney-2017-06-21.pdf
Financial Sector Cybersecurity Framework Profile Consolidates Regulatory Requirements - Security Boulevard
Working from Home Cybersecurity Guidance - Security Boulevard
Run Audio and Video calls Securely Educate Employees on Phishing attacks Automate Virtual Personal Network configurations (VPNs) Control the use of Personal Devices for Corporate Work Stop Personal Email and Unauthorised Cloud Storage Use Keep Collaboration Tools Up-to-date
OWASP Security Knowledge Framework - Security Boulevard
An SSDLC relies on four parts: Security requirements Test automation and code quality checks Security test automation Manual verification
Three Areas of Cybersecurity Strength for Hospitals During a Pandemic - Security Boulevard
Training and Awareness in a Pandemic Keep Your Anti-Virus and Anti-Malware up to Date Multi-Factor Authentication for Both Employees and Patients Monitor, monitor, monitor
The CMMC Accreditation Body signs MOU with the U.S. Department of Defense - Security Boulevard
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis
8 NIST Security Controls to Focus on During, and After, a Crisis
IR-4: Incident Handling IR-8: Incident Response Plan PL-8: Information Security Architecture PM-16: Threat Awareness Program CA-2: Security Assessments CA-7: Continuous Monitoring SI-4: Information System Monitoring SI-5: Security Alerts, Advisories, and Directives
Why Traditional Security Is Failing Us, Part 2 - Security Boulevard
Managed IT Security for Healthcare - JumpCloud
11 Remote Learning Resources & Cybersecurity Best Practices for EdTech
Kubernetes Security – A Useful Bash One-Liner – Professionally Evil Insights
for res in $(kubectl api-resources -o name);do kubectl get $res -o yaml | tee -a k8s.dump;done
Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level - Security Boulevard
https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8286-draft.pdf
8 Most Common Attack Vectors - Security Boulevard
Here are the top 8 most common attack vectors: 1. Compromised and Weak Credentials – The perennial top attack vector, compromised credentials account for more than 80% of breaches globally. With password reuse rampant (passwords are reused an average of 2.7 times), one breached credential offers attackers  access to multiple services. Multi-factor authentication, password managers, and user education on proper identity best practices can help thwart this common attack vector. 2. Misconfiguration – Misconfiguration has resulted in many high profile breach events, with disastrous consequences. There have been dozens of breaches related to misconfiguration of AWS S3 buckets alone. These oversights are often the result of well-intentioned developers either rushing to get products to market, or simply unfamiliar with secure configuration of the services that they are using. Avoiding misconfigurations is easier said than done, but procedures and systems that audit and automate secure configuration are a great starting point, in addition to ongoing training for developers. 3. Malware – Malware comes in many different forms – viruses, ransomware, etc. Basically, any type of harmful software. Ensuring that all systems have the latest anti-malware software installed is important, as is limiting user privileges, and educating users on what to look out for when clicking links or installing software. 4. Missing or Poor Encryption – Missing or weak encryption can result in sensitive data, such as customer information or credentials, being stolen. Weak encryption can be just as bad as no encryption at all, as many legacy encryption algorithms can be cracked trivially using modern compute power. Whenever possible, use strong encryption for data-at-rest, data-in-transit, and data being processed. 5. Phishing – the human element always has, and likely always will be, a key contributing factor in information security failure. Attackers know they can lure users into clicking malicious links or divulging sensitive data, so they continue to (successfully) rely on this attack vector. 6. Denial of Service Attacks – DoS, and their distributed big brother, DDoS attacks, are meant to flood the resources of a system or site, rendering it unusable. There are a number of subscription services that can help identify and mitigate the effects of even very large scale DDoS attacks.  7. Malicious Insiders – the “double agent” of the modern corporate world, a malicious insider is an employee who abuses their privileges as an authorized user to conduct and attack against company information systems. Since these users are legitimate, it can be more difficult to detect these types of attacks than most others.  8. Trust Relationships and Third Party Risk – There are many interconnected systems, both within and across organizations. This complex set of relationships has the potential to be exploited by attackers, as most famously happened in the Target breach where the initial infiltration was via a third party HVAC vendor. Minimizing privileges, leveraging zero-trust and privileged access management, can help thwart such attacks.
Cooking up Better Security Incident Communications - Security Boulevard
Dates. There are no dates at all in their FAQ. When did Home Chef become aware of the incident and, even better, when was the data compromised?  The FAQ page doesn’t even have a date the FAQ itself was updated. As a newcomer to your page, I can’t tell if this happened last week or last year. If I need to turn to Google for answers, then you are missing something important. Require password resets. Home Chef’s guidance to the question: “Should I Reset My Password?” is: Although passwords were encrypted, we recommend you change your Home Chef password in an abundance of caution following the four-step process. The essence of this statement seems good, and I am sure from a PR perspective it is considered the safe answer. But I see a couple of problems with it: Based on the sample of the breach data, the passwords appear to be hashed using “bcrypt”. Technically, hashed is not the same as encrypted. In layman terms, you can get away with using the term Encrypted here, but knowing that the information security community will probably read this information, a little more precision is preferred. In this case, I would have felt more at ease knowing that Home Chef uses “bcrypt”, as it is a password hashing algorithm that I would recommend. The advice implies that changing your password is recommended, but especially for people who are overcautious. Nowhere does Home Chef’s FAQ indicate how their password encryption is special; in a world where we normally tell customers that it is necessary to change their compromised password (even one that is encrypted), why would that now be considered just an abundantly cautious recommendation?  You have to dig for this FAQ. It is not on the homepage of the homechef.com website. Instead you have to visit the home page, look for the FAQs & Support section under Resources (in the footer), and then look for the articles on the FAQ.  I don’t believe it is being intentionally buried, but Home Chef is not really putting it out there either. If this was a small breach, I would be less concerned about it. But we are talking about 8 million records that include emails, password hashes, last 4 digits (of CC number) and more. The FAQ about the breach should be more obviously accessible on the web page.
Five key lessons from the 2020 U.S. Cyberspace Solarium Commission report - Security Boulevard
1. Enhancing the deterrence to malicious cyberspace actors 2. Enhancing the resilience of the US economy to cyber-attacks 3. Reforming the government in such a way as to increase its deterrence capacity 4. Strengthening the cybersecurity capacity of private sector entities 5. Focusing on election security
How to Choose the Right Cloud Access Security Broker - Security Boulevard
Enemy Unseen – Part II: Why Dark Web Monitoring Is Essential
Shodanfy.py - Get Ports, Vulnerabilities, Informations, Banners, ..Etc For Any IP With Shodan (No Apikey! No Rate-Limit!)
Newsletter: June 13, 2020 – Notes from MWhite
Creating a Custom Windows 10 Image and Capture it using HyperV | Nerd Drivel
Review: Magic Mouse 2 and Magic Trackpad 2 on Fedora - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
PowerShell to Get OS Type and Count - Notes of a scripter
foreach ($VM in $VMs){     $OSName = $VM.ExtensionData.Guest.GuestFullName     If(!($OS_hashtable.ContainsKey($OSName))){         $OS_hashtable.add($OSName,0)     }     $Value = $OS_hashtable.$OSName     $NewValue = $Value + 1     $OS_hashtable[$osName] = $NewValue } $OS_hashtable | FT -AutoSize
Emerging from Digital Shock: IT Leaders Preparing for New Work Order | APMdigest - Application Performance Management
92% of SMBs think they can recover from a disaster, but many don't have plans in place - TechRepublic
92% of SMBs think they can recover from a disaster, but many don't have plans in place 16% don't even know their recovery time objective. they could recover data lost in a disaster in under 10 minutes and 30% in under an hour with 26% of telecom execs reporting an RTO of 10 minutes, finance/accounting and retail/e-commerce saying under one hour, and healthcare positing that it would take one full day to fully recover from a data loss.
48% of employees are less likely to follow safe data practices when working from home - TechRepublic
48% of employees are less likely to follow safe data practices when working from home
Software security testing is cool (because it’s fun to break stuff) | Synopsys
Insight 6/2/2020: Walking Their Path - Security Boulevard
So that’s my plan. Embrace and celebrate each child’s differences and the different paths they will take. Understand that their experiences are not mine and they have to make and then own their choices, and deal with the consequences. Teach them they need to introspect and learn from everything they do. And to make sure they know that when they fall on their ass, we’ll be there to pick them up and dust them off.
Automation: Helping Speed Vulnerability Response - Security Boulevard
VMWare vCenter takeover via vCloud Director (CVE-2020–3956 filed by Citadelo on June 1st, 2020) - Security Boulevard
Understanding Azure AD’s Premium P2 Tier - Security Boulevard
Understanding Cyber Resilience: Breach Curves - Security Boulevard
Healthcare Remained the Most Breached Industry in Q1, Research Shows - Security Boulevard
Why NHS, UK Healthcare Orgs Need to Boost Their Security
ISO 27001: Understanding the needs and expectations of interested parties - Security Boulevard
What Does Successful Vulnerability Discovery Look Like? - ZeroNorth
Organizations looking to build and scale effective application security programs must create a foundation that includes five key practices. Prioritization. Not every issue flagged by vulnerability scanning tools needs to be addressed with the same rigor. There are a variety of reasons for this, but the key thing is to be able to determine which issues will impact your organization most. Normalization. Disparate tools generate different information about vulnerabilities. Some use industry-standard frameworks, which helps, but this isn’t always the case. To make sense of your vulnerability data from an overall risk perspective, you need to use the same scorecard for all your tools. Consolidation of Views. Most security testing tools are used within a particular stage of the SDLC. This is important for discovering vulnerabilities in the development pipeline, but it creates stage-specific silos. To get a holistic view of risk across testing results, you must be able to consolidate a single view of the software value stream. Consolidation of Effort. Once you have a consolidated view, you need to translate the information into an action plan. A particular vulnerability will often manifest in multiple instances. You need to report “units of work,” consolidating issues within a certain scope, like the same repository or server type. Accountability and ownership. The teams who created the pipelines and codebases with identified vulnerabilities should do the remediation work. This builds a security-minded and risk-aware culture throughout the enterprise. To do this, you need to identify who is responsible for known vulnerabilities.
How to overcome the top 6 application security challenges | Synopsys
1. Hiring and retaining security experts is difficult and costly. 2. Your legacy or third-party applications might carry security risks. 3. Lumpy demand requires elastic capacity. 4. You need to respond to changes on a dime. 5. No single testing tool can catch every vulnerability. 6. Tools alone are not enough to keep you safe.
6 Issues that Undermine Your Vulnerability Management Team’s Ability to Keep Systems Patched - Security Boulevard
1. Difficulty in identifying vulnerable systems 2. Issues with vulnerability scanners 3. Overwhelming vulnerability scan reports 4. Inaccurate and inefficient prioritization of vulnerabilities 5. Knowing whether to act or not to act 6. Reporting on your patching posture
https://www.preveil.com/wp-content/uploads/2020/03/CMMC-whitepaper-with-mapping.pdf
CMMC Compliance in Office 365 with PreVeil
How SOAR Can Take Your Security Budget Further in Turbulent Times - Siemplify
Seven reasons why businesses get hacked - SecureLink
Humans are the weakest link Cybersecurity technology is very strong, but expertise is weak Cybercriminals have the edge Cybercrime pays Humans do fall asleep in the cyber battlefield Technology as a whole moves very fast and the pace is relentless In cyberspace, you only know what you know
Certificate Automation for F5 BIG-IP | Keyfactor - Security Boulevard
The last 1717 days - Security Boulevard
Security Posture Questions (and Answers) - Security Boulevard
NIST: Adopt a Secure Software Development Framework (SSDF) to Mitigate Risk of Software Vulnerabilities - Security Boulevard
CI/CD and the Promise of Agile Transformation - Security Boulevard
SMBs Overwhelmingly Believe They Are Ready to Deal with Cybersecurity Incidents
24% think they can recover their lost data in less than 10 minutes, and for 29% of them, that time extends to one hour. 
ISO 27001: What’s the difference between a risk owner and an asset owner? - Vigilant Software - Compliance Software Blog
Why Hackers Live With Their Moms - Security Boulevard
What Does it Take to Be an Effective Developer Manager? - Security Boulevard
What is Cyber Risk Management
What is NIST SP 800 30 - Security Boulevard
Magellan Healthcare Attack a Harsh Reminder for the Need to Be HIPAA Compliant - Security Boulevard
Mathematics and programming: exploring the links - Raspberry Pi
“In my vision, the child programs the computer and, in doing so, both acquires a sense of mastery over a piece of the most modern and powerful technology and establishes an intimate contact with some of the deepest ideas from science, from mathematics, and from the art of intellectual model building.” – Seymour Papert, Mindstorms: Children, Computers, And Powerful Ideas, 1980
How to block web browser-based localhost port-scans | Ctrl blog
Chris's Wiki :: blog/linux/SwapOnZramMixedFeelings
GitHub Pages & Jekyll: Who Needs Expensive Web Hosting?
Chris's Wiki :: blog/sysadmin/DualDisplayVsMultiDesktop
Dell U2412M
Adobe fixes critical flaws in Flash Player and FramemakerSecurity Affairs
Student loan company that stole indo from consumers leaks sensitive dataSecurity Affairs
Group Policy Elevation of Privilege Vulnerability (CVE-2020-1317, Important) - The things that are better left unspoken
Chris's Wiki :: blog/tech/DualDisplaysNaturalSplit
Firefox GPU RAM leak | Nelson's log
Comparing the Struts 1 and Struts 2 Web Application Frameworks - Developer.com
Migrating Struts Applications to Struts 2
java_tips: Migration from struts1 to struts2
Tutorials4u - Struts1 to Struts2 Migration
IBM releases toolkits implementing FHE to process data while encryptedSecurity Affairs
fully homomorphic encryption (FHE)
Lamphone
Native SSH Port Forwarding (Tunneling) on Windows 10 | Windows OS Hub
Blue teams helping red teams: A tale of a process crash, PowerShell, and the MITRE ATT&CK evaluation - Microsoft Security
SMBleed could allow a remote attacker to leak kernel memorySecurity Affairs
Misconfigured Kubeflow workloads are a security risk - Microsoft Security
The science behind Microsoft Threat Protection: Attack modeling for finding and stopping evasive ransomware - Microsoft Security
How to Backup Active Directory Domain Controller? | Windows OS Hub
Dark Basin, a hack-for-hire group that remained under the radar for 7 yearsSecurity Affairs
The ROI of Industrial Cybersecurity: What You Need to Know - Blog | Tenable®
11 security tips to help stay safe in the COVID-19 era - Microsoft Security
CISO MindMap 2020: What do InfoSec professionals really do?Rafeeq Rehman – Personal Blog
A Look at What Makes a Vulnerability Survive in the Remediation Race - Blog | Tenable®
GE FILTERGATE
The Day the Sun Brought Darkness | NASA
How to Protest Without Sacrificing Your Digital Privacy - VICE
The Sun Has Been Hibernating for Years. It Might Be Waking Up - VICE
How to Program an ESP8266 or ESP32 Microcontroller Over Wi-Fi with MicroPython « Null Byte :: WonderHowTo
How to Write Your Own Bash Script to Automate Recon « Null Byte :: WonderHowTo
Build an Off-Grid Wi-Fi Voice Communication System with Android & Raspberry Pi « Null Byte :: WonderHowTo
Facebook paid for a 0-day to help FBI unmask child predator – Naked Security
Windows 10 Built-in Packet Sniffer - PktMon
CIS CSC #12 – Boundary Defense – The Personal Blog of Sean Goodwin
How Organizations Can Reduce the Economic Incentives of Vulnerabilities
SMBleed (CVE-2020-1206) and SMBLost (CVE-2020-1301) Vulnerabilities Affect Microsoft SMBv3 and SMBv1 - Blog | Tenable®
What Is the Lifespan of a Vulnerability?
As Hardware Becomes Ever More Impressive, Software Suffers Rough Edges - TidBITS
Digital signatures with GnuPG | Enable Sysadmin
SOC 2 & ISO 27001… The ULTIMATE Security Attestation | Pivot Point Security
Having such a strong security posture could shorten your sales cycle The marketing value of dual attestations is “huge” Having all that documentation and detail minimizes the time and effort associated with onsite audits and simplifies the process of responding to questionnaires and other due diligence by stakeholders As noted above, by having such a robust security posture, you could well avoid the cost, legal and reputational impacts of a data breach
ECDSA: Handle with Care | Trail of Bits Blog
Strategic Defense | Thom Langford
"The people who get on in this world are those that get up and look for the circumstances they want and if they can't find them, they make them." - George Bernard Shaw
PXE and Kickstart: repos | Adam Young’s Web Log
PXE Setup: Debugging Kickstart | Adam Young’s Web Log
PXE Setup Part the First | Adam Young’s Web Log
Credential Dumping: Domain Cache Credential
Make It So: Accelerating the Enterprise with Intent-Based Network Security
How to operationalize privacy by design
Sysadmin security: Auditing your perimeter and access points | Enable Sysadmin
Kaleidoscopic space art made with Raspberry Pi onboard the ISS - Raspberry Pi
OpenZFS removed offensive terminology from its code | Ars Technica
How Misconfigured Containers May Create Cybersecurity Issues For Companies
Driving healthcare IT transformation with global systems integrators
Does your GI RU/RUR patch level have to match your database's?
“Before 18c, the Oracle Grid Infrastructure (GI) /Clusterware (CRS) version must be of equal or the highest version down to the 4th digit in the possible combinations at all times.“ “Starting from 18c, the Oracle Grid Infrastructure (GI) /Clusterware (CRS) version must be of equal or the highest version down to the first digit in the possible combinations at all times.“
How to Monitor Your VMs with RVTools
network segmentation and security part two how it can improve
SysAdmin Software For Your Budget | Diary of a Network Geek
Why your IT team needs cyber security training - IT Governance UK Blog
Facilitation, collaboration, and webcams: A story about Principles of Authentic Participation - Justin W. Flory's blog
This blog post is a story, or perhaps open source lore. So, here is the abridged summary: The Sticky Idea: How did a discussion topic at a one-day open source sustainability conference evolve into a three-month extended collaboration? Facilitation, Roosevelt-style: The people are here. How do you facilitate a conversation with no scope and few bounds? Is there a next chapter to this story?: The Working Group is winding down. What happens to the Principles next?
Digital transformation in financial services without breaking the bank
COVID-19 and its effects on cyber espionage and national security - IT Governance UK Blog
Knoxville Pulls IT Systems Offline Following ...
Linux kernel earns CII best practices gold badge - The Linux Foundation
WinRM Penetration Testing
Looking at Big Threats Using Code Similarity | Securelist
EvilPDF - Embedding Executable Files In PDF Documents
RMIScout - Wordlist And Bruteforce Strategies To Enumerate Java RMI Functions And Exploit RMI Parameter Unmarshalling Vulnerabilities
Atlas - Quick SQLMap Tamper Suggester
Recox - Master Script For Web Reconnaissance
GitMonitor - A Github Scanning System To Look For Leaked Sensitive Information Based On Rules
Security and Salt | The Networking Nerd
Are Academic Healthcare Systems Top COVID-19 Attack Targets?
Inappropriate Access to Records Continued for 8 Years
Key Mime Pi: Turn Your Raspberry Pi into a Remote Keyboard · mtlynch.io
Raspberry Pi Zero W
Kali Linux Top Forensic Tools (2020) – Linux Hint
Ransomware Attacks Hit 2 More Healthcare Organizations
Data Breach Lawsuit Filed Against Pediatric Care Provider
Federal Agencies Reported Fewer Security Incidents in 2019
But FISMA's 71 security audits of "high-value assets" - the critical systems that government agencies use - showed that many of these systems remain susceptible to common attacks, such as spear phishing. The audits also showed that these assets are prone to poor patch management, password reuse, insecure default configuration and weak password policies, according to the report.
Honda Ransomware Confirms Findings of Industrial Honeypot Research | SecurityWeek.Com
Another Intel Speculative Execution Vulnerability - Schneier on Security
The new SGX attacks are known as SGAxe and CrossTalk. Both break into the fortified CPU region using separate side-channel attacks, a class of hack that infers sensitive data by measuring timing differences, power consumption, electromagnetic radiation, sound, or other information from the systems that store it. The assumptions for both attacks are roughly the same. An attacker has already broken the security of the target machine through a software exploit or a malicious virtual machine that compromises the integrity of the system. While that's a tall bar, it's precisely the scenario that SGX is supposed to defend against.
Medical Device Repair Again Threatened With Copyright Claims | Electronic Frontier Foundation
Medical care and the maintenance of medical devices are too important to let overreaching copyright claims get in the way. We at EFF are proud to be able to support iFixit and we hope that the device manufacturers will let the repair community continue to do its vital work instead of wasting everyone’s time with unfounded legal threats.
Complete Guide to Install Zotero on Ubuntu 20.04
Building a Corporate Culture That Values Cybersecurity
"Think about the type of culture you want. Think about the kind of behaviors that would actually reflect that culture. Where do you want to see improvements? What would show that what you're doing is working? They're the kind of behaviors you want to wrap metrics around." - Jessica Barker
Former IT Administrator Sentenced in Insider Threat Case
After resigning from his job in July 2018, Charles E. Taylor of Jacksonville, Arkansas, caused more than $800,000 in damage to his former firm, which had to replace several routers and rebuild and restore its internal computer network, according to the U.S. Attorney's Office for the Northern District of Georgia, which oversaw the case. In addition to his 18-month prison sentence, Taylor must undergo three years of supervised release and pay restitution of $834,510,
1st city in US named for Columbus puts his statue in storage - Japan Today
SANS Cyber Security Certifications & Research
Where the CISO should report depends on structure, industry, and maturity
List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached - IT Governance UK Blog
Unilever CISO on Security Priorities for Remote Workforce
In the interview, Ford also discusses: Why email security is still one of the weakest links in the security chain; How organizations should review their approach to identity and access management; The growing importance of CASB technology; How organizations can achieve a passwordless environment.
Cycldek: Bridging the (air) gap | Securelist
Securosis - Blog - Article
Back in 2009, we introduced a concept called The Data Breach Triangle, which gave us a simple construct to enumerate a few different ways to stop a data breach. You need to break one of the legs of the triangle. Data: The equivalent of fuel – information to steal or misuse. Exploit: The combination of a vulnerability or an exploit path to allow an attacker unapproved access to the data. Egress: A path for the data to leave the organization. It could be digital, such as a network egress, or physical, such as portable storage or a stolen hard drive.
Florence, Ala. Hit By Ransomware 12 Days After Being Alerted by KrebsOnSecurity — Krebs on Security
Oracle on Azure- Sizing vs. Optimizing
Automating business for Covid-19 continuity | ITProPortal
Add your personal aliases to bashrc the smart way | Arcolinux.com
Domain Persistence: DC Shadow Attack
How To Install Docker on Ubuntu 20.04 LTS - idroot
sudo apt update sudo apt upgrade sudo apt install apt-transport-https ca-certificates curl gnupg-agent software-properties-common curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add - sudo add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable" sudo apt update sudo apt install docker-ce docker-ce-cli containerd.io apt list -a docker-ce docker --version systemctl status docker docker container run hello-world
Which cloud strategy is right for you in 2020? | Enterprise Channels MEA
A hybrid cloud strategy combines the best of both worlds of public cloud and the non-cloud-ready aspects of existing IT infrastructure. And often, even if hybrid cloud isn’t the organisation’s plan in the first place, it will end up being the preferred approach once established.
How to Install KVM on Ubuntu 20.04
Evil-Winrm : Winrm Pentesting Framework
Senators demand answers over Juniper Network's 2015 backdoor incident | Engadget
PineTab Linux Tablet Is Now Available for Pre-Order, Powered by Ubuntu Touch - 9to5Linux
What is the Raspberry Pi Smart Mirror? – Linux Hint
Vicarious trauma and OSINT – a practical guide – We are OSINTCurio.us
Wide Mouth Canning Jar Accessories | Cool Tools
Norpro Stainless Steel Wide-Mouth Funnel
Cyber ransom demands up 200 percent in 2019
Canning 101: A Field Guide to Jars – Food in Jars
3 Behind-the-Scenes Actions That Make Your Apps More Secure - Fossbytes
1. Security Training 2. Careful Programming 3. Security Testing
Thai Coconut Salmon or Tilapia Recipe; Easy, Delicious, Gluten Free, Paleo | Penniless Parenting
How to Optimize Your Bedroom for Better Sleep | Penniless Parenting
ipcalc in powershell – Laurent Schneider
Best Practices for Organizing Data on Your Computer | Alexander's Blog
Windows Forensic Analysis: some thoughts on RDP related Event IDs | Andrea Fortuna
10 Tips for Maintaining Information Security During ...
Update Planning for Remote Employees Ensure Communication Is Clear Put an IP Security Clause in Employment Contracts Conduct Regular IP Compliance Training Assemble Your Team of Stakeholders Assign an Independent Assurance Manager Choose Your Decommissioning Path Wisely Get Promises in Writing On the Way Out, Too Keep Surrendered Equipment Intact Look After a Security Team That Might Be Burning Out Insider cyberthreats are always an issue during layoffs -- but with record numbers of home-office workers heading for the unemployment line, it has never been harder to maintain cybersecurity during offboarding.
How and Why to use Variation in Software Testing - EvilTester.com
Do Healthcare Providers Need Help? ~ Cyber Thoughts
"Must Have" Free Resources for Malware Analysis | SANS
"Must Have" Free Resources for OSINT | SANS
Top 5 Steps to Immerse yourself into the Cyber Security field | SANS
Security Certification Roadmap - Paul Jerimy
How Frugal Are You? | The Do’s and Don’ts to Living Frugally  – BeingFrugal.net
Avoid spoiling your kids if you truly want to live a frugal lifestyle. To conclude, living frugally doesn’t have to be boring and you don’t have to avoid buying nice things or going out once in a while. The essence of frugal living is focusing on what is important to you. Instead of splurging on everything that takes your fancy, you live moderately in certain areas of your life and you spend money on things that really spark joy within your financial means. Living frugally means that you live within your means and you don’t overspend. Many people today live outside of their means and spend money they don’t have by using credit cards and other unnecessary credit facilities.
RationalPlan 5.5 Adds Kanban Board for Agile Project Management
Chris's Wiki :: blog/sysadmin/ChangeSubtleDangerExample
GitHub - juliocesarfort/public-pentesting-reports: Curated list of public penetration test reports released by several consulting firms and academic security groups
Creating Solaris 11 VMs with Vagrant | rootpool
BT auditor highlights new IT vulnerabilities - IT Governance UK Blog
KPMG found that BT had misstated its financial statements as a result of “material weaknesses related to general IT controls and risk assessments”
Major release: Lynis 3.x - Linux Audit
A strong relationship between security and engineering teams accelerates the transition to DevSecOps - TechRepublic
"Embracing an "everyone is part of the security team" approach shifts DevOps to DevSecOps, according to a report from Cobalt.io."
Security faux pas: 56% of employees use personal computers to WFH - TechRepublic
56% of employees use personal computers to WFH
URLCrazy - Generate And Test Domain Typos And Variations To Detect And Perform Typo Squatting, URL Hijacking, Phishing, And Corporate Espionage
Open Source Product Analytics With PostHog - The Python Podcast
Personal Data in URLs – PrivacyWise
I'd like to speak to your CIPO, please | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
PowerShell Tips 1 | Adventures in a Virtual World
Sandboxie went GPL3! | Fun with virtualization
New – Amazon EC2 C5a Instances Powered By 2nd Gen AMD EPYC™ Processors | AWS News Blog
Home Lab Email Server: Getting around ISP Port Blocks | dlford.io
How to Make your own Custom Lighter Stickers | dlford.io
FreeNAS ZFS optimizations and considerations for SSD and NVMe - The Tech Journal
Terence Luk: Disabling Teams File Sharing and Disabling OneDrive for Office 365
The 10 Best Mailing List Managers for Linux System in 2020
Explained: Why this photo crashes some Android phones | Nokiamob
APC Smart-UPS 1500 Battery Replacement – CubicleNate's Techpad
Coursera Together: Free online learning during COVID-19
Live Cheaply and Invest In Yourself — My Money Blog
AI takes traditional Chinese painting in a new direction | Engadget
Xieyi
[Howto] My own mail & groupware server, part 2: initial mail server setup – /home/liquidat
A Beginners Guide to Snaps in Linux - Part 1
A secure and private open source alternative to Alexa | Opensource.com
How to Use Ansible Template Module – Linux Hint
Eliminate spam using SSL with an open source certification authority | Opensource.com
Next Generation coreboot Server Platform
Is your team a "glue team?" | Opensource.com
[DRAFT] Automated Server Installs - Server - Ubuntu Community Hub
10 Actionable SSH Hardening Tips to Secure Your Linux Server
PermitEmptyPasswords no Protocol 2 ClientAliveInterval 300 ClientAliveCountMax 2 X11Forwarding no use Fail2Ban sshd -T
Homemade Japchae Recipe, Korean Glass Noodle Stir Fry, Gluten Free, Vegan, Paleo Option | Penniless Parenting
Japchae
5 Steps to Install Proxmox VE on a ZFS RAID Array | dlford.io
5 Steps to Set Up a Fast, Secure NGINX Reverse Proxy Server | dlford.io
A lesson in economic violence
Business Resilience Tips for Entrepreneurs – Running Your Business
What is a serverless database? - Blog dbi services
The Thrifty DBAs Guide to Open Source Database Security Tools | Integrigy
AutoUpgrade in trouble when you are short on RAM
Domain Persistence AdminSDHolder
Cyber Security for Protests
Cybersecurity for Activists: How to Protect Yourself When Protesting for Change | Security Gladiators
Git-Scanner - A Tool For Bug Hunting Or Pentesting For Targeting Websites That Have Open .git Repositories Available In Public
How to Enable Offline Chat Communications Over Wi-Fi with an ESP32 « Null Byte :: WonderHowTo
Maze Ransomware leaks files of ST Engineering groupSecurity Affairs
Working with Dockerfiles - buildVirtual
Astsu - A Network Scanner Tool
Unpatched Microsoft Systems Vulnerable to CVE-2020-0796 | CISA
Virtual Summit Dives Into Healthcare Cybersecurity Issues
Easy Security Tools for Ubuntu 20.04 Users
1. Tor Browser 2. Enigmail 3. GSConnect 4. KeePassXC 5. DNSCrypt 6. Encrypt Archive 7. F-Droid (Phone Only) 8. Antivirus?
5 Signs It's Time to Hire Balbix for Vulnerability Management
How Network Segmentation Can Improve Security: Part One - Delta Risk
The Capital One Data Breach a Year Later: A Look at What Went Wrong and Practical Guidance to Avoid a Breach of Your Own - Security Boulevard
What happened: An EC2 instance running WAF software (ModSecurity) was compromised in Capital One’s account via SSRF. The AWS metadata service was queried, and it returned information about a role that was attached to the instance as well as the access token for the role. The role was titled *-WAF-* but had unnecessary permissions to read from S3 (and most likely kms:decrypt as well). A bucket was found via the role that had access to a sensitive S3 bucket. Data was decrypted and exfiltrated from the account. On an editorial note, this feels like the next “S3 exposure” type of event; however, there were a couple of key differences. Back in 2017/2018, when publicly exposed S3 buckets started popping up everywhere, there were two main issues.  At scale, enterprises just couldn’t keep a handle on how all of their buckets were configured and they were struggling with a lack of visibility.  The “Authenticated Users” bucket ACL was much more permissive than people thought (it was all logged in AWS users that would have access to a bucket instead of just authenticated users to the local account), so people were essentially making buckets wide open because of poor naming on AWS’ part and a lack of understanding of what each ACL did. 
True IT Stories: Creative WFH Solutions - Security Boulevard
1. Providing Hardware 2. Being Available 3. Setting Up Your New Office
William Bernstein and Safe Withdrawal Rates — My Money Blog
“If past history was all there was to the game, the richest people would be librarians.” - Warren Buffett "Even the most sophisticated retirement projections contain so much uncertainty that the entire process can be summarized as follows: Below the age of 65, a 2% spending rate is bulletproof, 3% is probably safe, and 4% is taking chances. Above 5%, you’re taking an increasingly serious risk of dying poor. (For each five years above 65, add perhaps half of a percentage point to those numbers.)" - The Ages of the Investor: A Critical Look at Life-cycle Investing.
Learn at home #3: building resilience and problem solving skills - Raspberry Pi
Tricks for Working with Data in Python – Linux Academy
Super Easy Ricotta Cheese Cheesecake Recipe- Gluten Free, Egg Free, Allergy Friendly | Penniless Parenting
Super Easy Ricotta Cheese Cheesecake Recipe- Gluten Free, Egg Free, Allergy Friendly Ingredients: 3 cups ricotta cheese (26oz) 1 cup sugar 1 teaspoon vanilla extract 1/2 cup all purpose gluten free flour mix, or wheat flour 1/2 teaspoon baking powder 1-2 teaspoons cocoa powder (optional) Instructions: 1. Mix all your ingredients together other than the cocoa powder. 2. If making a cocoa swirl, remove some of the batter and mix it with cocoa powder, then pour it into the batter, swirling around the chocolate part with a knife. 3. Bake at 350 for 22 minutes.
Racism is not a political issue. Racism is a MORAL issue.
The Linux Foundation introduces Cloud Engineer Bootcamp for cloud job seekers | ZDNet
#Privacy: Michigan State University struck by ransomware attack - PrivSec Report
How to use Kali Linux & Raspberry Pi for Wireless Penetration Testing
An Introduction to the io_uring Asynchronous I/O Framework | Oracle Linux Blog
Cooking up secure code: A foolproof recipe for open source - Help Net Security
Software Composition Analysis (SCA)
Linux security: Protect your systems with fail2ban | Enable Sysadmin
A new Java-based ransomware targets Windows and Linux | TechCrunch
How to configure vmkernel ports with Terraform - mwpreston.net
Virtualization Security | Security Blog | VMware
Per-zone DNS resolution for homelabs | Patrick Kremer
Introduction to Computer Networking, Binary, and Hexadecimal | dlford.io
3 Simple Steps to Send Email Alerts From a Linux Server | dlford.io
How the vExpert program improves my life -
3 Best Tips for ZFS Memory Tuning on Proxmox VE 6 and Higher | dlford.io
How to Home Lab: Part 8 - Introduction to Docker: Installation and Usage. | dlford.io
How to Home Lab: Part 7 - Log Management | dlford.io
How to Home Lab: Part 6 - Hosting on the Web | dlford.io
How to Home Lab: Part 5 - Secure SSH Remote Access | dlford.io
How to Home Lab: Part 4 - NGINX Reverse Proxy | dlford.io
How to Home Lab: Part 3 - Host an Intranet Site with pfSense and NAT | dlford.io
How to Home Lab: Part 2 - Managing Proxmox VE | dlford.io
How to Start a Home Lab: Part 1 - Proxmox VE | dlford.io
5 Steps to Safely Replace a Drive in a Linux ZFS Array | dlford.io
5 Powershell Commands to Fix Most Windows 10 Problems Easily | dlford.io
sfc /scannow dism.exe /online /cleanup-image /restorehealth Get-AppXPackage | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register "$($_.InstallLocation)\AppXManifest.xml"} chkdsk /x /f /r shutdown /r
Video : Using Podman With Existing Dockerfiles (Oracle Database and ORDS) | The ORACLE-BASE Blog
Top 10 Java stories of May: TIOBE Index, Spring Boot 2.3, Java 16 plans & more - JAXenter
The 50 Practical Examples of The SED Command in Linux
COVID Diaries Pt. 4 | Greyhawk's Meanderings
Using Unison Across Linux, macOS, and Windows - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
ORACLE-BASE - Podman : A Basic Example of Using Podman With Dockerfiles (Oracle Database and ORDS) on Oracle Linux 8 (OL8)
Wearables Like the Apple Watch Show Promise in Detecting COVID-19 Infections - TidBITS
From Earth to orbit with Linux and SpaceX | ZDNet
How to Audit Your Linux System’s Security with Lynis
The 20 Best Open Source BI Tools and Software in 2020
Low-cost air quality sensor works with Raspberry Pi
New software security tool to detect bugs in OS - Tech Explorist
Linux Fu: Raspberry Pi Desktop Headless | Hackaday
Raspberry Pi 4 B: How Much RAM Do You Really Need? | Tom's Hardware
The 14 most loved programming languages, according to Stack Overflow - Business Insider
1. Rust 2. TypeScript 3. Python 4. Kotlin 5. Go 6. Julia 7. Dart 8. C# 9. Swift 10. JavaScript 11. SQL 12. Bash/Shell/PowerShell 13. HTML/CSS 14. Scala
8 IT jobs in flux | The Enterprisers Project
1. "Architect astronauts" 2. ITOps 3. Line support engineers 4. QA engineers and testers 5. Developers 6. Scrum master 7. Database administrators 8. Anyone unwilling to change
Announcement: RapidDisk version 6.1 released – Random [Tech] Stuff
Open source software for open infrastructure | Ubuntu
How to Create a Multiple Choice Menu in Bash Scripts - Putorius
Using Snap Packages in Linux - A Beginners Guide to Snapd - Putorius
Doc Searls Weblog · Bad $20
Android: Why this photo is bricking some phones - BBC News
The Ayabmuk World - Lawfare
Cybersecurity Lessons From the Pandemic, or Pandemic Lessons From Cybersecurity - Lawfare
ENISA: "Proactive detection – Measures and information sources" reportSecurity Affairs
How to Use Kali Linux Forensics Mode – Linux Hint
Security & Privacy by Design (S|P) Principles
Why should you teach cybersecurity to your kids? - Security Boulevard
Age gap for cyber security? Think twice before you post ‘Stranger danger’ Cyberbullying Oversharing and cyber theft Securing online accounts
OneDrive causes network performance issues | Born's Tech and Windows World
Dial-up pool - Doge Microsystems
Essential Keyboard Shortcuts for Visual Studio Code
What the NIST Zero Trust Architecture Means for Business Continuity - Security Boulevard
Introducing The Adventures of CISO Ed & Co. (Pandemic Edition) - Security Boulevard
DoS Attacks in the Age of Remote Work  - Why Modern ISPs can’t Look Over Internet of Things Security
'Anonymous' Hackers' Group Is Back; Here's Why The World Fears Them
KeyStore Explorer
[Howto] My own mail & groupware server, part 1: what, why, how? – /home/liquidat
https://mailu.io/1.7/ https://mailcow.email/
Windows Incident Response: Tips on Using RegRipper v3.0
The state of threats to electric entities: 4 key findings from the 2020 Dragos report - Security Boulevard
1. Power outages as opportunities for adversaries 2. Supply chain compromise and CIP-013 3. OT communications gateways 4. The state of threats to electric entities in the United States
COVID-19 Response: Following Best Telehealth Security Practices - Security Boulevard
The Role of Luck in Long-Term Investing, and When To Stop Playing The Game — My Money Blog
BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier - Security Boulevard
Simple Unix file encryption | Nelson's log
Full Lifecycle Cloud Security - DivvyCloud
Full Lifecycle Cloud Security, Part II - DivvyCloud
Leveling Up: How to Improve Your ACSC Recommended Maturity Model
The Adventures of Microservice - The Birth of Microservice - Security Boulevard
Thirty-four Years in IT - Leadership Chaos, Career Derailed (Part 10) - Security Boulevard
Thirty-four years in IT - The Application That Almost Broke Me (Part 9) - Security Boulevard
Thirty-four years in IT - Swimming with the Itanic (Part 8) - Security Boulevard
Thirty-four Years in IT - Addressing Application Security (Part 7) - Security Boulevard
Thirty-four years - Building out Disaster Recovery (Part 6) - Security Boulevard
Thirty-four years - System Administration, Backups, and Data Centers (Part 5) - Security Boulevard
Thirty-four years - Security and firewalling (Part 4) - Security Boulevard
Thirty-four years - The System Office, Novell Directories, and Building a State Backbone (Part 3) - Security Boulevard
Thirty-four Years - Networking and Software Development (Part 2) - Security Boulevard
Thirty-four Years - Instructor, Machinist, CNC and CAD/CAM (Part 1) - Security Boulevard
Sharing Security Career Tips During a Global Pandemic - Security Boulevard
Amid a Major Skills Shortage, CISOs Are Turning to Security Analytics and Threat Intelligence - Security Boulevard
Windows Ransomware Must Not be Unspeakable When People Die in Large Numbers Due to That (and Windows Has Intentional Back Doors) | Techrights
The Ongoing CPU Security Mitigation Impact On The Core i9 10900K Comet Lake - Phoronix
Mitchell's Blog
CMMC-AB Credentialing and Accreditations National Conversation - YouTube
VirtualBox 6.1.x Windows 10 2004 Upgrade Problem Resolution « Bob on Medical Device Software
Cloud Security Tips for Distributed Companies - Security Boulevard
Executives Bypass Security Protocols for Fear IT Admins Might Peek into Their Private Lives - Security Boulevard
Immunity Passports Are a Threat to Our Privacy and Information Security | Electronic Frontier Foundation
Watch EFF Cybersecurity Director Eva Galperin's TED Talk About Stalkerware | Electronic Frontier Foundation
How to Unlock Hidden Browser Games in Edge, Firefox and Chrome
How the Role of the Modern Security Analyst is Changing - MixMode
Lennart Koopmann - How to Make a Small Raspberry Pi Display Look Better
10 Nerdcore, Nerd Folk, and Nerdy Artists for Your Playlist
The OWASP ZAP HUD - Security Boulevard
Detecting Bad OpenSSL Usage | Trail of Bits Blog
How to Monitor Your Employees — While Respecting Their Privacy
Introduction - Purify Docs
Octopus Scanner Malware: open source supply chain attack via NetBeans projects on GitHubSecurity Affairs
COVID Diaries Pt. 2 | Greyhawk's Meanderings
COVID Diaries Pt. 1 | Greyhawk's Meanderings
How to clear a local Applocker policy | >_
Getting Started with OpenSSL and PowerShell [Tutorial]
NetWalker gang threatens to release Michigan State University filesSecurity Affairs
ANDRAX v5R NH-Killer - Penetration Testing on Android
API Security and Hackers: What's the Need? ............Security Affairs
Credential Dumping: LAPS
ADCollector - A Lightweight Tool To Quickly Extract Valuable Information From The Active Directory Environment For Both Attacking And Defending
Migrating Clients Off Active Directory - JumpCloud
https://github.com/TheJumpCloud/jumpcloud-admu
How Does AD Accommodate WFH? - JumpCloud
Security Compliance Reports with Scan - Security Boulevard
Why Manual Penetration Testing and Automation are Important Aspects of an AppSec Program - Security Boulevard
The 4 Most Important Components of Security Posture (Part 1 - Asset Inventory) - Security Boulevard
Top Ransomware Attack Vectors: RDP, Drive-By, Phishing
RDP Drive-by Phishing
CIP - Security Boulevard
CIP is neither as simple as Modbus nor as complex and heavy as PROFINET.
CDM: The Next Chapter – MeriTalk
The ‘Next Chapter’ in Cyber Risk: Are Federal Agencies Prepared? - Blog | Tenable®
Capital One Must Turn Over Mandiant's Forensics Report
5 advantages of the principle of least privilege - SecureLink
1. Creates an environment with fewer liabilities 2. Limits the possibility of catastrophic damages 3. Protects against common attacks, like SQL injections 4. Data classification promotes a healthy network 5. Superior data security and audit capabilities Best practices of POLP There are several best practices that organizations should consider following when implementing least privilege access in their security policies. Make least privilege model the default for all accounts. Elevate privileges on a situational and timed basis only. One-time use permissions are a good way to provide necessary access while maintaining control. Monitor and track all network activity, including individual logins, system changes, and access requests. It’s critical to always understand who is on your network and what they are doing. Ensure a flexible access management platform is in place so that privileged credentials can be securely elevated and easily downgraded. Identify and separate high-level system functions from lower-level functions. Audit privileges granted to users and applications. Conduct this review regularly to make sure all authorized permissions are still relevant.
Career Choice Tip: Cybercrime is Mostly Boring — Krebs on Security
ICT solutions provider NTT Com discloses security breachSecurity Affairs
The YouLoop Passive Loop Antenna Reviewed on HF Reception
The Design of Everyday Things, Revised and Expanded Edition
The Design of Everyday Things, Revised and Expanded Edition
Windows lifecycle fact sheet - Windows Help
How to Search Reddit Effectively: Useful Tips and Tricks to Know
Cheap Speakers Sound Great In A Proper Enclosure | Hackaday
Raible Designs | Secure by Design Book Review
Patching Oracle Database Appliance From 18.8 to 19.6 - Blog dbi services
Part 4 - SQL Server TDE and Extensible Key Management Using Azure Key Vault - Microsoft Tech Community - 1427692
Peeking Inside Executables And Libraries To Make Debugging Easier | Hackaday
ZeroSSL Streamlines SSL Certificate Administration
How to Manage Your Tasks Using the Japanese Kanban Technique
How to Upgrade or Switch Linux Distros Without Losing Data
How to Make a DIY HDTV Antenna and Ditch Cable for Good
The 5 Best Sites to Learn the Basics of Music Theory
https://underdefense.com/wp-content/uploads/2019/09/UnderDefense-vSICO-main-activities.pdf
Cisco security breach hits corporate servers that ran unpatched software | Ars Technica
Windows 10 Version 2004 will be released on May 27, 2020 | Born's Tech and Windows World
Chris's Wiki :: blog/tech/SSHRSAKeysPersistence
Introduction to ZTP
C’mon, not all disagreements are opportunities to change your own mind – Julia Galef
Free SSL with NGINX and LetsEncrypt on Debian 10 - Low End Box
Reading Research: A Guide for Software Engineers - Marc's Blog
Identity-related Features in Windows 10 version 2004 build 19041 - The things that are better left unspoken
Identify Source of Active Directory Account Lockouts: Troubleshooting
AZ-500 Study Guide: Microsoft Azure Security Technologies 2020 - Thomas Maurer
Part 4 - SQL Server TDE and Extensible Key Management Using Azure Key Vault - Microsoft Tech Community - 1427692
Part 3 (Portal) - SQL Server TDE and Extensible Key Management Using Azure Key Vault - Microsoft Tech Community - 1427688
Part 2 (PowerShell) - SQL Server TDE and Extensible Key Management Using Azure Key Vault - Microsoft Tech Community - 1427682
Part 2 (Portal) - SQL Server TDE and Extensible Key Management Using Azure Key Vault - Microsoft Tech Community - 1427685
Part 1 - SQL Server TDE and Extensible Key Management Using Azure Key Vault - Microsoft Tech Community - 1427679
Intro - SQL Server Transparent Data Encryption and Extensible Key Management Using Azure Key Vault - Microsoft Tech Community - 1427549
The secret life of discontinued apps
Massive amounts of corporate data now stored on employee USB devices
The effect of GDPR two years on
Azure Networking 101 « ipSpace.net blog
Texas Department of Transportation (TxDOT) hit by a ransomware attackSecurity Affairs
GDPR Enforcement Loosens Amid Pandemic
https://www.iso27001security.com/ISO27k_FAQ.pdf
The evolution of ransomware in 2019
WiFi Goes Open | Hackaday
Les McKeown: "Predictable Success" | Talks at Google - YouTube
ChinaTalk: An Industrial Espionage Parable - Lawfare
Mara Hvistendahl's "The Scientist and the Spy,"
6 mistakes when choosing a managed services provider | Synopsys
1. Ceding control 2. Limiting visibility 3. Underestimating growth 4. Choosing a managed services provider that loves their tool 5. Relying exclusively on automated testing 6. Choosing a provider that leaves all the fixes to you
Zero Day Initiative — MindShaRE: How to “Just Emulate It With QEMU”
Fireworks in Japan were Originally Meant to Ward Off Epidemics | Spoon & Tamago
Weekly Tech Roundup #8 | Andrea Fortuna
“I see technology as being an extension of the human body.” – David Cronenberg
Dezinformatsiya — Adam Caudill
The most effective disinformation is built on a couple things: Existing cracks in society. It is far easier to exploit existing mistrust, doubts, and divisions than it is to take a unified group and split them apart. There needs to be an existing fissure that can be widened. Elements of truth. While outright lies can have a useful impact, the most effective efforts are those that are built on at least some degree of truth.
A Test of Time: COAST and an award-winning paper - CERIAS - Purdue University
Learning AI at school — a peek into the black box - Raspberry Pi
1. Perception: Computers perceive the world using sensors 2. Representation & reasoning: Agents maintain models/representations of the world and use them for reasoning 3. Learning: Computers can learn from data 4. Natural interaction: Making agents interact comfortably with humans is a substantial challenge for AI developers 5. Societal impact: AI applications can impact society in both positive and negative ways
NVD - Statistics
ZFS focus on Ubuntu 20.04 LTS: ZSys general principle on state management · ~DidRocks
The pros and cons of vulnerability scanning - IT Governance UK Blog
FinalRecon - The Last Web Recon Tool You'll Need
Bipartisan Bill Would Boost Cybersecurity Research
Under the bill, the new technology directorate would receive $100 billion from 2021 to 2025 to invest in 10 focus areas that will be reviewed and updated every four years. These are: Cybersecurity, data storage and data management technologies; Artificial intelligence and machine learning; Quantum computing and information systems; High-performance computing, semiconductors and advanced computer hardware; Robotics, automation, and advanced manufacturing; Natural or anthropogenic disaster prevention; Advanced communications technology; Biotechnology, genomics and synthetic biology; Advanced energy technology; Materials science, engineering and exploration relevant to the other key technology areas
Why (and When) You Need Computer Forensics | Pivot Point Security
Websites Conducting Port Scans - Schneier on Security
Bluetooth Vulnerability: BIAS - Schneier on Security
How to Deploy Photon OS on VMware
Top 8 Container Security Best Practices – Notes from MWhite
1. Docker runtime security 2. Docker image authenticity 3. Use Docker secrets to manage sensitive data 4. Limiting resources 5. Using a SECCOMP profile to limit system call 6. Access management 7. Complete lifecycle management 8. Container monitoring
IOCREST IO-PEX40152 PCIe x16 to Quad M.2 NVMe PEX Switch PCIe Card Review - The Tech Journal
Book Review: Call Sign Chaos: Learning to Lead – The Personal Blog of Sean Goodwin
You don’t always control your circumstances, but you can always control your response. The first is competence. Be brilliant in the basics. Don’t dabble in your job; you must master it. Second, caring. To quote Teddy Roosevelt, “Nobody cares how much you know, until they know how much you care.”
Verifying Windows binaries, without Windows | Trail of Bits Blog
The Friday 15: All About PAM in 15 Minutes - Security Boulevard
The 9 Types of Security Vulnerabilities
The 9 Types of Security Vulnerabilities: 1. Unpatched Software 2. Misconfiguration 3. Weak Credentials 4. Phishing, Web & Ransomware 5. Trust Relationship 6. Compromised Credentials 7. Malicious Insider 8. Missing/Poor Encryption 9. Zero-days & Unknown Methods
Hungry for Automated Security Controls? Try These Recipes
Microsoft warns of PonyFinal ransomware attacks - Security Boulevard
Modern Cyber Defense Books - Security Boulevard
Modern Cyber Defense Books
How to build hands-on cybersecurity skills on a budget
The 3 Reasons CVSS Scores Change Over Time - Security Boulevard
1. CVSS Base Score changes 2. CVSS Temporal Score changes 3. CVSS Environmental Score changes
Enemy Unseen – Part I: How the Dark Web is Shaping Cybercrime - Security Boulevard
5 Tips How to Secure Your Backups | ESX Virtualization
Secure Your Backup Architecture itself Encrypt your backups, configuration backups (including the credentials) Cloud Repository for Backup Copy jobs with Immutability feature (a Must) Cloud Connect, Passwords and more… 3-2-1 Backup Rule AntiVirus Quarantine
Book Review: Operator Handbook · System Overlord
A Look at the 5 Most Common Types of Cyberattacks - Blog | Tenable®
Malware: This catch-all term encompasses a number of different cybersecurity threats, including everything from viruses and worms to banking trojans, adware, spyware and ransomware. Once these programs gain access to a targeted system, they can steal, destroy, encrypt or corrupt valuable databases, files and applications. Phishing/social engineering: We've all received emails that might look normal at first but have one or more suspicious details, urging us to click on a URL or download a file. Often used to steal login details and the confidential info those credentials protect, phishing scams are also used as delivery systems for malware or other exploits, and they can be deployed via email, phone or SMS. Man-in-the-middle attacks (MitM): These entail intrusions upon two-party transactions — e.g., between an individual and their bank — intended to steal data shared between the two. MITM attacks may be especially dangerous for organizations that have employees who work remotely on public Wi-Fi (at a coffee shop or library), as they can only be carried out over unsecured networks or if one party's device is already compromised. Denial of service (DoS): Hackers overwhelm servers or networks with frivolous traffic to render IT infrastructure useless in denial-of-service attacks, often to force the victim to pay a ransom. DoS campaigns can originate from one computer and internet connection or many; the latter are distributed DoS attacks, often coordinated by botnets.3 Botnet-driven DoS attacks can simultaneously cripple dozens of organizations across multiple continents, as seen in the infamous Mirai and WannaCry attacks. Structured Query Language injection: SQL remains the most common method by which essential communications in a relational database occur.4 The injection of malicious code puts a database at the mercy of an unauthorized user, who can then steal any business-critical information within it.
GitHub - keydet89/RegRipper3.0: RegRipper3.0
Why Your Cyber Resilience Plan Doesn’t Include Windows 7 | Webroot
Jaeles v0.9 - The Swiss Army Knife For Automated Web Application Testing
Managing cybersecurity like a business risks: Part 1—Modeling opportunities and threats - Microsoft Security
Vulnerability Disclosures Drop in Q1 for First Time ...
"Everything that is an outlier for us is due to COVID-19," he says. "But based on that, I could give you reasons why the numbers should be higher or should be lower because you can argue either way based on theories of COVID-19's impact." "Everything that is an outlier for us is due to COVID-19," he says. "But based on that, I could give you reasons why the numbers should be higher or should be lower because you can argue either way based on theories of COVID-19's impact." "It is very difficult to say at this point, because we have just finished up with Q1, and it is so soon after COVID," he says. "We are close to on par for last year. It may have been a case with it just being a slow first quarter."
Vulnerabilities Disclosed in Q1 2020 Decreased by 19.8% – RBS
How Elite Protectors Operationalize Security ...
Principle 1: Rehearse the Plan Principle 2: Watch the Target Principle 3: Don't Rely on the Perimeter Principle 4: The Right Mindset Principle 5: The Right People The key tenets of U.S. Special Operations Forces (SOF) are expressed in the "SOF Truths" that humans are more important than hardware and quality is better than quantity.
How to Pay a Ransom: A Step-By-Step Guide for ...
Step 1: Assess the Situation Step 2: Enlist Outside Help Step 3: Test the Decryption Codes Side Note: Don't Try to Negotiate Step 4: Decrypting the Network How to Avoid This Mess at All Costs
The Problem with Artificial Intelligence in Security
3 Questions Your Board Has About Cybersecurity - Security Boulevard
Where are we on the cyber-risk spectrum? Where do we want to be? How do we get there?
Valak a sophisticated malware that completely changed in 6 monthsSecurity Affairs
Thermal Imaging as Security Theater - Schneier on Security
How to Rotate and Compress Log Files in Linux with Logrotate
Overdose Death Solved with Digital Forensics | SENSEI ENTERPRISES, INC.
How to Write an Installable Django App – Real Python
Disrupted CVE Assignment Process – Michael Catanzaro
Bao: a lightweight static partitioning hypervisor [LWN.net]
Android Mirroring App 'Scrcpy' Just Added a Bunch of New Features - OMG! Ubuntu!
Ten Open-Source EDR Tools to Enhance Your Cyber-Resilience Factor
1. OSSEC 2. TheHive Project 3. osQuery 4. Nessus Vulnerability scanner 5. SNORT 6. Ettercap Project 7. Infection Monkey 8. Cuckoo Sandbox 9. GRR Rapid Response 10. MIG by Mozilla
Why you should be securing access to web applications - SecureLink
94% of enterprises already use a cloud service 83% of enterprise workloads will be in the cloud by 2020.
Understanding Azure AD's Premium P1 Tier - JumpCloud
Benefits of Azure AD Premium P1 Azure AD Premium P1 offers the following features: All of the features listed for Azure AD Office 365 apps SSO for an unlimited number of pre-integrated SaaS applications Self-service application assignment to enable users to self-discover and request access to applications; this enables cloud app discovery On-premises write-back for all password changes Group-based access management and provisioning (comes with additional provisioning customization) Advanced usage reporting Application proxy for remote access to on-prem applications Microsoft® Identity Management (MIM) Client Access Licenses (CAL) + MIM server for simplified lifecycle user management Conditional access based on device state or location and group Automated password rollover for group accounts For Windows® 10 Pro: desktop SSO, Microsoft Passport for Azure AD, and Administrator Bitlocker recovery MDM auto-enrollment, self-service BitLocker recovery, additional local admin tooling to Windows 10 Pro devices via Azure AD Join The premium features offered by Azure AD Premium P1 are attractive. However, there are drawbacks to consider with AAD Premium P1 as a holistic identity management solution.  Drawbacks of Azure AD Premium P1 As mentioned earlier, Azure AD is designed to work in conjunction with a directory service and lacks certain features most organizations find necessary. For example, no matter the subscription tier, AAD lacks the ability to manage user access to networks via RADIUS. Also, AAD’s system management capabilities are exclusive to Windows 10 Pro, so organizations invested in systems beyond Windows (such as macOS® and Linux®) or beyond a single version of Windows may struggle to make AAD work on its own. Organizations that enact AAD likely need to buy additional solutions to manage Mac, Linux, and additional Windows systems.  Because of this, many IT administrators choose to implement their AAD instances in conjunction with a directory service. They often use on-prem Active Directory, which syncs with AAD via Azure AD Connect, allowing users to leverage their AD credentials for SSO to web applications and Azure infrastructure. To be fair, Microsoft’s reference architecture specifically includes AD on-prem as part of the overall approach. Unfortunately, this ingrains many admins in hybrid infrastructure, which is less than ideal for cloud-forward organizations looking to leave behind the time-intensive and costly nature of legacy hardware. Additionally, AD’s RADIUS authentication is done via an on-prem NPS server, which represents additional on-prem infrastructure, so many IT admins looking to move past legacy hardware find that AD + AAD isn’t the ideal choice. Admins looking to use Azure AD Premium P1’s expanse of services typically choose it for its cloud-based infrastructure, so finding a cloud-based directory service to complement AAD may be a better fit.
What the World's Elite Protectors Teach Us about ...
Principle 1: Know What You're Protecting Principle 2: Plan Obsessively Principle 3: Harden the Target Principle 4: Study the Threat but Don't Obsess
6 Steps Consumers Should Take Following a Hack
Don't Panic Be Prepared to Defend Yourself Notify the Right Authorities Be Proactive Use Some Good Digital Tools Practice Cyber Hygiene
How To Manage the Pen Testing Skills Shortage - Security Boulevard
Automating nmap scans
nmap -sT -A <scan_target> nmap -sT -A -iL <address_file> nmap -sT -A -iL <address_file> -oA nmap_current
Cloud Security Architect Proves Hardest Infosec ...
CMMC "ownership"​ Heat Map - IT vs Cyber vs Process Owners
When Bandwidth Doesn’t Last | Imperva
Creating and Modifying PDF Files in Python – Real Python
Downtime Costs up to $50,000 per Hour for SMBs Struggling with Cybersecurity, New Research Shows - Security Boulevard
A tenth of SMBs said their downtime cost more than $50,000 per hour, and 13% said it cost between $40,000 and $50,000 per hour. A quarter put the per-hour cost of downtime for their business at between $20,000 and $40,000.
What You Need to Know About Reverse Proxy - Security Boulevard
The Mediocre Programmer – What is The Mediocre Programmer?
Patterns of Compromise: The EasyJet Data Breach - CounterPunch.org
Photoframe Hack
Sysadmin careers: The 5 steps of problem solving | Enable Sysadmin
How to Install and Configure Apache Tomcat 9 on Ubuntu 20.04 LTS
Financial Independence - simulating ODEs with python
$13 RPI_AC108 Audio Board Ships with a 4-Mic Array for Raspberry Pi
Sysadmin skills: What junior sysadmins need to know | Enable Sysadmin
Working Remotely with FOSS tools – life one degree north, one-o-three degrees east
The Best Linux Drawing Tablet in 2020 (Reviews)
6 things Oracle could do for a better ODA - Blog dbi services
1) Make robust and reliable releases 2) Make a real GUI 3) Integrate Data Guard management 4) Get rid of GI for ODA lites 5) Make IPs modifiables 6) Be proud of this product!
Automate AWS deployments with Ansible + Terraform - Blog dbi services
3D map of a heart's 'brain' | Engadget
Jaffar's (Mr RAC) Oracle blog: Oracle Cloud & Third party tools
According to Commvault, over 80% of companies are using the multi-cloud today. Commvault Cloud Backup solution provides support backup and recovery for over 40% clouds. This can ease backup and recovery operations between clouds.
Announcing Our State of Software Security: Open Source Edition Report - Security Boulevard
40% of IT professionals believe that public clouds are more secure than on-premise environments - Security Boulevard
Nearly 9 out of 10 participants in the survey use software-as-a-service (SaaS) as their main delivery mechanism for business-critical applications, and “organizations cite, on average, a 9% increase over the next 24 months.” Moreover, research shows that over a third of business-critical operations will be migrated to the cloud in the next 24 months. 55% of businesses said that 41% of server workloads will be in the cloud within 24 months, but more than a half of their servers will remain on-premise or in “customer-managed colocation facilities.”
New Healthcare Legislation: Striking a Balance Between Privacy and Convenience
Preparing for SEC Cyber Compliance with JumpCloud
Growing Needs Of Cybersecurity Professionals - An Statistical Analysis
When Remote Work Isn't an Option: Industrial Security in the COVID-19 Era - Blog | Tenable®
Learn How to Embrace Risk-Based Vulnerability Management - Blog | Tenable®
iFixit Creates Free Medical Repair Database - TidBITS
MultiCD - Create a MultiBoot Linux Live USB
Doc Searls Weblog · The GDPR’s biggest fail
Cultural Approaches to Transformations
9 Types of Digital Security Risks | securitywing
1. Data risk 2. Cybersecurity risk 3. Reputational risk 4.Talent shortage and cultural risk 5.Privacy risk 6. Third-party risk 7. Technology risk 8. Artificial intelligence risk 9.compliance risk
How GitOps Raises the Stakes for Application Security
How to Talk to Senior Executives About Cybersecurity - Security Boulevard
1. Align with business goals 2. Use Visualizations 3. Quantify 4. Show trends
Reporting Cyber Threats: Executives at Risk - Security Boulevard
Run Scripts on Remote Employee Workstations & Laptops - JumpCloud
Webinar Recap: Re-Think your PKI: Build, Buy or Bring in Reinforcements - Security Boulevard
Luckily, you’ve got options to stand up and manage a modern PKI: Traditional In-House PKi: Deploy and manage your own PKI internally, using internal infrastructure and staff to run it Managed In-House PKI: Deploy PKI in-house and bring in help from a third-party provider for additional expertise and oversight. PKI as-a-Service/Managed PKI: Use a third-party service provider to deploy, manage, and host your PKI infrastructure in the cloud
Worst (and best) Practices for Giving Online Speeches | The Notes Guy in Seattle
An Information Security Glossary of Terms | Daniel Miessler
How Cloud-init can be used for your Raspberry Pi homelab | Opensource.com
How to create and manipulate tar archives using Python - LinuxConfig.org
OMG! Run for the hills! FIVE new Windows zero-days published @ AskWoody
https://cset.georgetown.edu/wp-content/uploads/CSET-A-National-Security-Research-Agenda-for-Cybersecurity-and-Artificial-Intelligence.pdf
FaradaySEC | Multiuser Pentest Environment
Exploring OSQuery With Jupyter – JerryGamblin.com
Nishang - Offensive PowerShell For Red Team, Penetration Testing And Offensive Security
Nishang
GitHub - jaeles-project/jaeles: The Swiss Army knife for automated Web Application Testing
Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers
Build support for open source in your organization - Microsoft Security
Success in security: reining in entropy - Microsoft Security
Cybersecurity best practices to implement highly secured devices - Microsoft Security
How to Audit Web Applications & Servers with Tishna « Null Byte :: WonderHowTo
8 Top Free and Open source Desktop GIS mapping software | H2S Media
What to do if you think you'll be laid off - The Silicon Underground
Percona Managed Database Services
The Best Free Homeschool Printables and Templates for Parents
GoboLinux - the alternative Linux distribution
How To Write Log Files In RAM Using Log2ram In Linux - OSTechNix
Everyone in InfoSec Should Know How to Program · System Overlord
Windows DNS Server Denial of Service vulnerability | Born's Tech and Windows World
Wells Fargo cannot follow its own phishing security advice – Jason Pearce
Machine Learning 101: Outliers introduction – Marksei
Windows 10 Search Cheat Sheet: Shortcuts and Tips to Know
The Raspberry Pi Hub: 45+ Tips, Tricks, Tutorials, and Guides
Bolt Depot - Fastener Information - Terminology, Measurement, Materials and more
ZRAM Boosts Raspberry Pi Performance | Hackaday
Raspberry Pi Performance: Add ZRAM and these Kernel Parameters
Systemantics | Cool Tools
This book made me 1) not worry about understanding a colossal system — you can’t, 2) realize I can change a system — by starting a new one, and 3) avoid starting new systems — they don’t go away. -KK
Deno
Why CIS Benchmarks are Critical for Security and Compliance
Jacqueline von Ogden
HVAC Installation Cost 2019 - What's a Fair Price for a New Heating and Air Conditioning Installation?
How to Avoid Fraud and Service Gaps While Building a Sustainable Contact Center Strategy for the Future | Pindrop
CERIAS - Center for Education and Research in Information Assurance and Security - Purdue University
Business Case Studies for CISOs | SANS Institute
The Importance of C-Suite and Boards Engaging in Third-Party Cyber Risk Management
How to Easily Set Up a DNS over TLS Resolver with Nginx on Ubuntu
Passive Income Ideas: 35 Strategies to Boost Your Income In 2020
Downeast Maine Pumpkin Bread | Allrecipes
Flourless Chocolate Cake I | Allrecipes
Flourless Chocolate Cake I | Allrecipes
Hungarian Flourless Hazelnut Cake | Allrecipes
Hungarian Flourless Hazelnut Cake | Allrecipes
Irish Potato Candy | Allrecipes
The Industrial Revolution 5.0 (or 6.0) — Symptom of Totally Incompetent Management at the European Patent Office | Techrights
Freedom Is Not Possible Without Privacy | Techrights
Oracle SQL Developer for the DBA Slides & Video – ThatJeffSmith
Mitsubishi hackers may have stolen details of prototype missile
Comprehensive Guide on Password Spraying Attack
Framework for Managing Identity in Healthcare Introduced
How CISOs Can Achieve Better Network Visibility
Australia Digital Health Records System Attacked
Toll Group Data Leaked Following Second Ransomware Incident
With apologies to Oscar Wilde: "To suffer one ransomware outbreak may be regarded as a misfortune; to suffer two looks like carelessness."
Cybersecurity Leadership: What’s Your 180-Day Plan?
GAO: Chemical Plants Vulnerable to Cyberattacks
Is China Making a Major Strategy Mistake? | Daniel Miessler
Are There Such Things as Anti-Fragile Stocks? | Daniel Miessler
Analysis of the 2020 Verizon Data Breach Report | Daniel Miessler
Software Bill of Materials (SBOM) work at NTIA
CERTIFICATIONS | NetSec OPEN
The Need for Compliance in a Post-COVID-19 World
4. Are there any specific regulations that address remote work? This March, NIST released a draft revision of NIST 800-124, Rev 2 Guidelines for Managing the Security of Mobile Devices in the Enterprise. NIST also developed NIST 800-46 Rev. 2 Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. Both these NIST guidelines are mapped to applicable NIST SP 800-53 security controls and Cybersecurity Framework Version 1.1 functions, categories, and subcategories so you can check your compliance with these controls and update them as necessary.
60% of Insider Threats Involve Employees Planning ...
More than 80% of employees planning to leave an organization bring its data with them. These "flight-risk" individuals were involved in roughly 60% of insider threats analyzed in a new study. Researchers analyzed more than 300 confirmed incidents as part of the "2020 Securonix Insider Threat Report." They found most insider threats involve exfiltration of sensitive data (62%), though others include privilege misuse (19%), data aggregation (9.5%), and infrastructure sabotage (5.1%). Employees planning an exit start to show so-called flight-risk behavior between two weeks and two months ahead of their last day, the researchers discovered. Most people who exfiltrate sensitive information do so over email, a pattern detected in nearly 44% of cases. The next most-popular method is uploading the information to cloud storage websites (16%), a technique growing popular as more organizations rely on cloud collaboration software such as Box and Dropbox. Employees are also known to steal corporate information using data downloads (10.7%), unauthorized removable devices (8.9%), and data snooping through SharePoint (8%).
Unpatched Open Source Libraries Leave 71% of Apps ...
Unpatched Open Source Libraries Leave 71% of Apps Vulnerable PHP and JavaScript developers need to pay close attention because different languages and frameworks have different rates of vulnerability, research finds.
Web Application Attacks Double from 2019: Verizon DBIR
Cybersecurity Extends Far Beyond Security Teams & ...
Announcing Oracle Solaris 11.4 SRU21 | Oracle Solaris Blog
Burp Suite Professional for Web Application Security Part Two
Burp Suite Professional for Web Application Security
EPIC - PA Supreme Court Says State Can Fire Employee for Facebook Post
called social media “the modern public square.”
Linux security: 8 more system lockdown controls | Enable Sysadmin
How to analyze disk space usage on Linux from the Terminal
Booting ISO images, 2020 edition - Random notes from mg
Turn your Raspberry Pi homelab into a network filesystem | Opensource.com
Self Hosting with Raspberry Pi and Argo Tunnels - Nick - Medium
Grafana 7.0 Released
CCNA Training » JSON Tutorial
PostgreSQL Shared Buffers vs free RAM - Blog dbi services
RagnarLocker Deploys a Virtual Machine to Hide Ransomware
Oracle Standard Edition on AWS ☁ socket arithmetic - Blog dbi services
TL;DR: 4 vCPU count for 1 socket and 2 sockets count for 1 server wherever hyper-threading is enabled or not.
Top STIG – Part 5 (Default Passwords) | Late Night Oracle Blog
Warning: Infected Cookie Consent logo delivers Ransomware | Born's Tech and Windows World
Minimalistic-offensive-security-tools - A Repository Of Tools For Pentesting Of Restricted And Isolated Environments
Mom, You Can’t Post Pictures of My Child—Because GDPR - Security Boulevard
How to Clear the Logs & History on Linux Systems to Cover Your Tracks & Remain Undetected « Null Byte :: WonderHowTo
Security 101: Cross-Site Scripting
Postel's law in development
A look at how Jitsi became a ‘secure’ open-source alternative to Zoom
Windows: Reverse RDP attacks in third-party software possible | Born's Tech and Windows World
Key cybersecurity trends for 2020
Cybersecurity best practices to help protect businesses
How to Use VPR to Manage Threats Prior to NVD Publication
Securing the cloud for healthcare
How To Boot From USB Drive In Virtualbox In Linux - OSTechNix
How to Set Up OpenStreetMap Tile Server on Ubuntu 20.04 - LinuxBabe
How To Create Multiboot USB Drives With Ventoy In Linux - OSTechNix
Percona users detail open source database challenges
Hardening QEMU through continuous security testing
Healthcare resource planning optimization built from the frontline
Linux Fu: Alternative Shells | Hackaday
Oracle’s Linux Team Wishes the Java Community a Happy 25th | Oracle Linux Blog
Linux at Home: DIY security solutions for the home - LinuxLinks
stup - Daily notes in the terminal
Transfer speeds
Raspberry Pi HAT offers up to 40W class D amp
Scientists create a cyborg eye that mimics the real thing | Engadget
Who invented the index fund? A brief (true) history of index funds
Work From Home Productivity (15 Methods You Don't Normally Hear)
Bans on Foreign Equipment in U.S. Critical Infrastructure - Lawfare
U.S.-China Rivalry After COVID-19: Clues and Early Indications from Southeast Asia - Lawfare
Reexamining the Solarium Commission’s Proposal for a National Cyber Director - Lawfare
New Teensy 4.1 Arrives With 100 Mbps Ethernet, High-Speed USB, 8 MB Flash | Hackaday
A More Open Raspberry Pi Camera Stack With Libcamera | Hackaday
The Vaccine Factory Inside You: RNA Vaccine Basics | Hackaday
Open MCT - Open Source Mission Control Software — Open MCT
As I See It: COBOL In The Time Of COVID - IT Jungle
Trends from the Trenches Digital - Part 2 - Live Panel | BioTeam
Trends from the Trenches Digital - Part 1 - Keynote | BioTeam
Share your keyboard and mouse between computers with Barrier - Raspberry Pi
Setting up two-factor authentication on your Raspberry Pi - Raspberry Pi
Notes from DEVOPS 2020 Online conference - Rule of Tech
An empirical guide to the behavior and use of scalable persistent memory – the morning paper
Understanding, detecting and localizing partial failures in large system software – the morning paper
Troy Hunt: The Unattributable "db8151dd" Data Breach
db8151dd
MSP360 – Evolving Cloud Backup with AWS for Over a Decade | AWS News Blog
TOGAF Certification: 5 Reasons Why You Should Do It – Technology
Import OVA as Proxmox VM | It's full of stars!
The Best Office Desk Chair for Back Pain and Posture: 9 Great Options
7 Naming Tips for Your Hardware Devices: Routers, USB Drives, and More
Polyglot Club Official Website - Practice languages and find friends
Introducing Coffee Break Languages - Coffee Break Languages
OPSEC Is For Everyone, Not Just Those With Something To Hide - Pt 3
OPSEC Is For Everyone, Not Just For Those With Something To Hide Pt. 2
Why OPSEC Is for Everyone, Not Just for People with Something to Hide
Employees Share an Average of 8 Passwords between Personal and Work Accounts, Survey Shows - Security Boulevard
Windows File Auditing Log and more with FileAudit - Security Boulevard
May Open Source Security Vulnerabilities Snapshot - Security Boulevard
Ramsey Malware - Schneier on Security
TEMPEST Comes To GNU Radio | Hackaday
Dr. Anthony Fauci, Infectious Disease Slayer | Hackaday
Windows Server: Disabling SSL 3.0, TLS 1.0, and TLS 1.1 | PeteNetLive
DSHR's Blog: The Death Of Corporate Research Labs
A Pulse Oximeter From Very Little | Hackaday
Books You Should Read: The Boy Who Harnessed The Wind | Hackaday
Crunching Giant Data From The Large Hadron Collider | Hackaday
SSH, OATH OTP and LDAP – Stuff I'm Up To
Top epidemiologist Marc Lipsitch on whether we're winning or losing against COVID-19 - 80,000 Hours
Always-on Grafana dashboard using Raspberry Pi touchscreen | Logan Marchione
Majority of CEOs lose sleep over cybersecurity worries
SD cards are about to get insanely fast
The hidden cost of GDPR data access requests
Advanced Observability Teams See Big Efficiency Gains - Part 2 | APMdigest - Application Performance Management
Advanced Observability Teams See Big Efficiency Gains - Part 1 | APMdigest - Application Performance Management
Watchman - A File and Directory Watching Tool for Changes
The Cyberspace Solarium Commission Makes Its Case to Congress - Lawfare
An open source HTTP router to increase your network visibility | Opensource.com
Problems with installing modules from the PowerShell Gallery - ivobeerens.nl
What's in My Portfolio (and How I Manage It)
24 open source tools for the serverless developer: Part 1 : idk.dev
Hackers Steal $10M in "Wonderfully Done" fraud from Norway’s State Investment Fund
Sharingan - Offensive Security Recon Tool
Sharingan
BSidesSF 2020 - Brianne Hughes' 'How To Write Like It's Your Job' - Security Boulevard
Cybersecurity and COVID: 5 Lessons - Security Boulevard
Internet Exploiter: Understanding vulnerabilities in Internet Explorer
It's Time to Broaden the Definition of a Vulnerability - Security Boulevard
Patch Management Policies & Processes | Avast - Security Boulevard
Guide: 21 OSINT Tools for Threat Intelligence - Security Boulevard
Data Security and Threat Models - Security Boulevard
BSidesSF 2020 - Clint Gibler's 'How To 10X Your Company’s Security (Without A Series D)' - Security Boulevard
GitHub - sqitchers/sqitch: Sensible database change management
How to create an Active Directory Domain on Windows Server 2019 - The Tech Journal
A Brief Summary of NIST Password Guidelines | Enzoic
DevSecOps Delivered: Automated GitHub Pull Requests
Gain Early Access and Help Shape Our AI Risk Engine - Security Boulevard
5 CISO Priorities During the COVID-19 Response - Security Boulevard
1. Secure remote users. 2. Identify risk as quickly as possible. 3. Work nimbly. 4. Stay vigilant and educate against new phishing techniques. 5. Lean on AI.
Infosec Professionals Are More Worried About Corporate Security than Their Own Home Security - Security Boulevard
What organizational psychology teaches us about employee engagement | Opensource.com
Microsoft Teams Shifts [Hands-On Tutorial]
The Dramatically Changing Role of the CISO - Security Boulevard
Healthcare organizations targeted with password spraying attacks - TechRepublic
Staying SOC 2 Compliant with Remote Workers - JumpCloud
In New Normal, Digital Transformation Accelerates in Industrial Networks - Security Boulevard
Antivirus & Multiple Detections
Understanding Cyber Resilience: The 4 Stages of a Breach - Security Boulevard
Security: COVID-19 Is Changing How America Works - Security Boulevard
very organization needs to … Understand their remote access needs in terms of users, applications and resources to assess respective physical, virtual or user-based connection capacity and throughput. Enterprises will need to determine if key applications and resources, whether on-premises or cloud, will require increased capacity during times of crisis and apply to an emergency capacity plan. If you have not mapped out a user, role, application and resource access policy and data protection obligations, don’t wait for this emergency to spur unauthorized access incidents. Assess your licenses and capacity shifting options in advance and work in advance with security and IT vendors to ensure that you can add bandwidth capacity, as well as deploy software to handle burst load and added regional workforce shifts. Having these provisions in place will allow greater flexibility and time to work through emergency access conditions, such as In Case of Emergency (ICE licenses) that automatically accommodates burst licenses and means to shift licenses among appliances. Move from physical to virtual and cloud secure access. Many secure access vendors now have physical appliance ordering backloads or regional and country fulfillment limitations that can take months before deployment and configuration tuning can commence. If the opportunity presents itself, move to virtual and cloud appliances and clientless mode to realize more rapid on-demand implementation and scale options. Don’t wait to communicate and invoke an endpoint security policy. Enforcing endpoint compliance and offering self-remediation capabilities will reduce phishing, ransomware and other threats introduced by increased remote users and potential at-risk device use. Don’t assume scalability from your next-generation firewall: Some organizations have activated SSL-VPN functions within their next-generation firewall (NGFW). While NGFW offers basic tunneling services, the SSL decode and tunnel management do impact NGFW performance. As companies expand the number of people remotely connecting to network and cloud resources from home, the sheer transaction volume will require a significant and often costly increase in NGFW capacity—including the purchase and management of more NGFW appliances and licenses. Consider dedicated VPN solutions that overcome emergency capacity, scale and management challenge, but typically offer a broader array of application support and endpoint security options. Support global load balancing and application delivery controller technology so that users are directed where resources are best available that ensure consistent user experience and application responsiveness. Enable mobile device security options to accommodate broader corporate and personal device use that can provide for more flexible access while ensuring these devices meet corporate security policy and safeguard sensitive data. Allow capabilities that simulates being on-premises, which often include Layer 3 access to a specific subnet, HTML5 access to local machines or virtual desktop infrastructure. This allows privileged users and service technicians emergency means to allow for full troubleshooting or make necessary system changes.
UK Power Grid Network Middleman Struck by Digital Attack
NIST Introduces Framework for Secure Software Development - Security Boulevard
Cloud Series: Authorize Anyone, Anything with Macaroons - Security Boulevard
Great Minds Think Alike: Aligning Security With Business Priorities - Security Boulevard
3-2-1 Backup Rule: The Rule of Thumb to Solve Your Data Loss Problems - Hashed Out by The SSL Store™
DigitalOcean Accidentally Leaks Customer Data - Security Boulevard
The Definitive Cyber Security Statistics Guide for 2020 - Hashed Out by The SSL Store™
Cloud LDAP for MSPs - JumpCloud
Avoiding healthcare vendor compliance nightmares with third-party remote access best practices - SecureLink
Data Classification: Protecting Sacred Data in the Cloud - Security Boulevard
Green data: A quick reputation hit—likely related to publicly available data or confidential company records. Yellow data: Issuing a breach notification because sensitive customer data has been exposed. Red data: Major news cycle, extreme fines, loss of customer confidence and trust, potential loss of more than 50% of revenue, all the way to a company extinction-level event.
4 Major Signs You Need to Focus on Network Vulnerabilities - Blog | Tenable®
#1. It's been a while since you’ve performed an assessment #2. The IT budget is short on security #3. Observable unawareness of cybersecurity among staff #4. Disorganized accounts
The 15 Best Hacking Apps for Android Device in 2020
May Device Threat Report - Security Boulevard
Kubernetes Autoscaling Explained - Top 3 Methods - Security Boulevard
1. Pod Replica Count 2. Cluster Autoscaler 3. Vertical Pod Autoscaling
Understanding What's Happening In Your Directory - JumpCloud
How could artificial intelligence help in avoiding data breaches? - Security Boulevard
Report: More Unknown Devices on Corporate Networks - Security Boulevard
Quick Tip #4 - Dshell - Security Boulevard
5 Ways to Protect Scanning Credentials for Linux, macOS and Unix Hosts
Choosing the Right Architecture for Your Nessus Agent Deployment - Blog | Tenable®
Tenable Bolsters Container Security to Capture Open-Source Vulnerabilities
CVE-2020-2883: Oracle WebLogic Deserialization Vulnerability Exploited in the Wild - Blog | Tenable®
5 Ways to Protect Scanning Credentials for Windows Hosts - Blog | Tenable®
BSides Knoxville 2020 - Alyssa Miller's 'Reality Lost: Deepfakes Changing The Face of Attacks' - Security Boulevard
Set Up Your Own WireGuard VPN Server on Debian - LinuxBabe
How to Stop Phishing Attacks | BizTech Magazine
X-Force IRIS Overcomes Broken Decryption Mechanism in Jest Ransomware
Why organizations shouldn't automatically give in to ransomware demands - TechRepublic
Chris's Wiki :: blog/sysadmin/ManyNFSFilesystemsWhy
Chris's Wiki :: blog/solaris/ZFSGuaranteeFreeSpace
SSH Authorized_Keys and LDAP – Stuff I'm Up To
Coronavirus-themed attacks May 10 – May 16, 2020 - Security AffairsSecurity Affairs
Security-business alignment hinges on shared definitions of security
Rational Security
Are we ready for Cloud Workspaces? - ShiftLeft Blog
TL;DR - Yes, we are getting there, and we ❤️ them already!
ShiftLeft Scan ❤️ GitHub - ShiftLeft Blog
Summary: Capital and Ideology | Daniel Miessler
Daniel Miessler - "Inequality manifests itself in identifiable patterns throughout history, and it’s possible to identify those patterns, and to counter the forces that lead to them by creating a political system that’s inclusive and participatory by design." "We used to be heavily focused on three basic levels of society: workers, soldiers, thinkers, and these three can be seen repeating for millennia throughout history"]
UK Supercomputing Service ARCHER Still Offline ...
As Businesses Rush to the Cloud, Security Teams ...
Office Cyber Security and COVID-19: Are You Prepared? - Delta Risk
1. Physically check all equipment and devices 2. Segment users until in compliance 3. Use automated tools to validate compliance Preparing for the Future of Office Cyber Security and COVID-19 Processes How long did it take you to transition to working effectively as a remote employee? When working remotely, is the way you work impacted significantly? Do you know who to call if you have a technical issue? Are those calls or emails answered promptly? Are lines of communications to your supervisors, co-workers, and subordinates open? Are there any tasks that you’re unable to do from home? How could we fix this going forward with technical solutions or changes to our existing processes? Technology Was your home Internet access adequate to conduct work as you were accustomed? Did you have to take any office equipment home to do your work? Are you doing any company work on any personal equipment (laptop, home computer, printer, computer monitor, etc.)? What technology or equipment makes working at home easier? What technology or equipment do you miss most from the office? If you could add one thing to your home office, what would it be? Are you able to access all required network resources? Was it difficult to set up your home office for work tasks? Did you know what equipment you needed to set up for work from home?
HITRUST hopes vendor-risk tool can help health care during pandemic
How To Configure a Shared Mailbox in Office 365. – TDSheridan Lab
Performance Testing Strategy for Digital Enterprise Platforms | APMdigest - Application Performance Management
Configuring Windows Firewall Rules with PowerShell | Windows OS Hub
Democratising Enterprise Storage Pricing - Architecting IT
Moving to Unstructured Data Stores - Architecting IT
On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege @ AskWoody
CVE-2020-1048
Security incident at the Santander Bank website in Belgium | Born's Tech and Windows World
DevSecOps Leadership Forum: 500 Innovators Learning from Shared Experiences
Why diagrams are critical to your open source project documentation | Opensource.com
DSHR's Blog: Economics Of Decentralized Storage
New HCL Notes, Domino, & Connections content is back on Domino! | The Notes Guy in Seattle
Erman Arslan's Oracle Blog: OBIEE - Exadata - GRID -- Two tips on OBIEE Patching and Grid Patching/Upgrade
How to Use GhettoVCB to Back up Your VMs
Terence Luk: Troubleshooting slow Windows VDI logon performance with Citrix Director and Windows Event Logs
Azure Cloud Shell - For Real! - Cloud for the win!
Cloud Governance - The Best Way - Cloud for the win!
Right Tool For The Job - Cloud for the win!
Building a Multi Regional Web Application with Azure Front Door - Cloud for the win!
Check CVE-2020-1048 with AutoRuns | >_
BackBox Linux 7 released! - BackBox.org Blog
Simple Dialer is a free, open-source alternative to your default phone app
How to Redial Busy Phone Lines Automatically on Your iPhone or Android Phone « Smartphones :: Gadget Hacks
Brane Dump: Private Key Redaction: UR DOIN IT RONG
Commands To Check Bad Sectors On Hard Disk In Linux – Itsubuntu.com
Encrypt a USB stick | dt.iki.fi
Mandrake – owning Android devices since 2016 – Bitdefender Labs
How to create a bridge network on Linux with netplan - TechRepublic
How to Remote Control Your Raspberry Pi Camera from the Web | Tom's Hardware
How to Install Parse Server with dashboard on Ubuntu 20.04 – TecAdmin
How to Build a Raspberry Pi Motion Sensor  - IoT Tech Trends
Paging for Fun and Profit | byterock [blogs.perl.org]
Best Notepad++ Alternatives for Linux – Linux Hint
linuxium.com.au: How to create an ISO that mimics the installed packages from an ISO or those locally installed using 'isomimicpkgs.sh'
Jaffar's (Mr RAC) Oracle blog: Migration methods to Autonomous Database (ADB) - Part IV (DBMS_CLOUD.COPY_DATA)
Pretty Print Relative Dates in Python | levlaz лев 列弗
Brazil and Mexico report record surge in coronavirus cases as Latin America reels - Japan Today
Virus-isolated silver surfers ride a new tech wave - Japan Today
How Has Russia Responded to COVID-19? - Lawfare
Doc Searls Weblog · Will our digital lives leave a fossil record?
Statsfs: A New RAM-Based File System For Linux Kernel Statistics
Sysadmin security: 8 Linux lockdown controls | Enable Sysadmin
In a new course this fall, students will create and study the history of digital fakes | The Daily Pennsylvanian
Elizabeth Scheyder
davy wybiral: Raspberry Pi 4 Complete Guide
How to connect to CentOS 8 Desktop from Windows using RDP protocol
802.11n AP <-> Client Kick-Off Script (Py) – Jon's FOSS Blog
Find Linux System Hardware Information With Hwinfo - OSTechNix
How to Quickly Launch Ubuntu Virtual Machine with Multipass
Ask iFixit: I Spilled Liquid on My Laptop—Now What?
ALGOL 60 at 60: The greatest computer language you've never used and grandaddy of the programming family tree • The Register
Python Scripting For Ethical Hacking Part 1 – ls /blog
Suddenly Remote: What the Open Source Community Can Teach Us - InformationWeek
Communication Resiliency Overcoming tone deafness No sacred cows
Caesar III open source game engine 'Julius' has a new release | GamingOnLinux
What’s in a New Bill to “Warn” Americans Downloading Foreign Apps? - Lawfare
Reviving a QIC tape backup solution from 30 years ago | Matt's Tech Pages
Of course, Oracle Clusterware is certified on OL8/RHEL8 as well
4 Tips to “Quarantine” the Latest Ransomware Threats | Pivot Point Security
One: Secure Your Endpoints Two: Keep Your Staff Aware Three: Apply Patches Four: Bring in the Big Guns – Hire a Professional
How Including a Standardized Control Assessment in Your ISO 27001 Internal Audit Can Pay Huge Dividends for SMEs | Pivot Point Security
Group Behind WannaCry Now Using New Malware - HealthcareInfoSecurity
Ensuring Business Continuity in Times of Crisis
AMA issues new principles to restore trust in data privacy | American Medical Association
Expert released PoC exploit for CVE-2020-1967 DoS flaw in OpenSSLSecurity Affairs
CVE-2020-1967
Lateral Movement: Pass the Hash Attack
CISSP vs. Master’s Degree – Please Take a Neutral Corner!
Errata Security: CISSP is at most equivalent to a 2-year associates degree
Global Ransomware and Cyberattacks on Healthcare Spike during Pandemic – Bitdefender Labs
Security 101: Two Factor Authentication (2FA) · System Overlord
Oracle Database Appliance: which storage capacity to choose? - Blog dbi services
PrintDemon – patch this ancient Windows printer bug! – Naked Security
Understanding Vulnerability Scoring: CVSS Explained
How to get security clearance and win more contracts
ABCs of UEBA: O is for OUTLIER | Gurucul UEBA
Kali Linux OVA for Air-Gapped Use Build Process | slice2
4 GDPR Violations that Multiple Companies have been Fined for - Security Boulevard
Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe
Security Architects Partners Posts | Trusted IT Consulting
Operational Thoughts in Trying Times
Jaffar's (Mr RAC) Oracle blog: Migration methods to Autonomous Database (ADB) - Part III (SQL Developer)
Python Software Foundation News: Capital One - Lessons From Adopting Python as a Team
Setting up Network Bound Disk Encryption(NBDE) on CentOS 8 - James
Putting container updates on a diet – Alexander Larsson
BleachBit - Spring cleaning all year long
How to Present in an online meeting like a CHAMPION
Sodinokibi ransomware uses MS API to encrypt open and locked filesSecurity Affairs
SilverTerrier gang uses COVID-19 Lures in BEC attacksSecurity Affairs
SilverTerrier
Samsung's PCIe 4.0 SSDs come in a range of new form factors | Engadget
After 5 Years, Finnix 120 Released: One Of The Oldest System Rescue Linux Distros
Use Raspberry PI as your personal web crawler with Python and Scrapy - peppe8o
Ransomware attack targeted Texas state court system - HoustonChronicle.com
Texas high courts hit by ransomware attack, refuse to pay - ABC News
Texas court IT hit by ransomware | News | The Legal Description
How To Find Hard Disk Data Transfer Speed In Linux - OSTechNix
https://www.engadget.com/hackers-21-million-ransom-celebrity-lawyer-064511797.html
CPRA's top-10 impactful provisions
California Privacy Rights Act The CPRA is truly an omnibus data protection law, modeled on the EU General Data Protection Regulation, and would create a much broader set of privacy rights and obligations than the CCPA. .5. Entry into force January 2023 with look back to January 2020 1. Sensitive data: New definition, limits on use and sharing, mandated link or respect of global opt-out 2. New enforcement agency: California Privacy Protection Agency 3. Expanded breach liability: Definition now includes email/password combos 4. Audits and risk assessments: To be prescribed through regulation for high-risk processing 5. Automated decision-making and profiling: Restrictions for certain industries 6. Data correction: New consumer rights 7. Children’s data: Strengthened opt-in rights and enhanced penalties for violations 8. Data retention: Necessity-based limitations 9. Employee data: Expanded moratorium 10. Service provider/contractor/third party: New obligations and clarifications
Are IP addresses 'personal information' under CCPA?
[Part 2] Interactive and transferrable code risk visualization – DiabloHorn
Pitney Bowes Battles Second Ransomware Attack
CISO stress-busters: post #1 overcoming obstacles - Microsoft Security
How to Gather Information on PostgreSQL Databases with Metasploit « Null Byte :: WonderHowTo
6 Free Cybersecurity Training and Awareness Courses
Researchers Analyze Oracle WebLogic Flaw Under Attack
Celebrity personal data taken in ransomware attack – Naked Security
The Ultimate List of SANS Cheat Sheets | SANS Institute
DDoS attacks in Q1 2020 | Securelist
Healthcare giant Magellan discloses data breach after ransomware attackSecurity Affairs
STAMINA, a new approach to malware detection by Microsoft, IntelSecurity Affairs
STAtic Malware-as-Image Network Analysis (STAMINA)
The Santa Clara Principles During COVID-19: More Important Than Ever | Electronic Frontier Foundation
#CQLabs – How UAC bypass methods really work by Adrian Denkiewicz | CQURE Academy
Maxfield Chen - Proxying Unaware Thick Clients
GitHub - salesforce/cloudsplaining: Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report with a triage worksheet.
You should be working asynchronously (async) | Remote.com Blog
Asynchronous Communication: What It Is & Why You Should Care About It
FTC Assessing Whether Its Health Data Breach Rule Is Stale
Cognizant: Ransomware Attack Expense at Least $50 Million
BSides NoVA 2020 - 1430 - Vulnerability Management; Let's talk Vulnerability Chaining - YouTube
BSides NoVA 2020 - 1100 - Voight-Kampff for email addresses - YouTube
DIY Decking makeover
Exegol - Exegol Is A Kali Light Base With A Few Useful Additional Tools And Some Basic Configuration
Empowering your remote workforce with end-user security awareness - Microsoft Security
Oracle Linux 8 (OL8) : Vagrant and Docker builds for 19c Database | The ORACLE-BASE Blog
Building a Shelly 2.5 USB to TTL adapter cable | die-welt.net
Serial communication on modern Linux | Opensource.com
Wifipumpkin3 - Powerful Framework For Rogue Access Point Attack
One Tool to Rule Them All - Security Boulevard
Mayhem Moves to Production with the Department of Defense - Security Boulevard
Australian Transport Company Hit with Nefilim Ransomware Months after a Maito Ransomware Attack - Security Boulevard
These Are The Top 10 Most Exploited Vulnerabilities In Past 3 years
Homemade Corn Shnitzel Recipe -- Gluten Free, Vegan, Frugal, and Delicious | Penniless Parenting
PowerShell 7 Video Series | PowerShell
Health Data Breach Update: What Are the Causes?
COVID-19: 3 Future Scenarios - HealthcareInfoSecurity
OneFS 8.2 firmware improvement: isi_upgrade_helper - FastStorage
Oracle Database 19c is certified on OL8 and RHEL8
Oracle Materialized View Refresh : Fast or Complete ? - Blog dbi services
Improve Your Tests With the Python Mock Object Library – Real Python
Oracle Linux 8 (OL8) : Updates – UEK6, Podman, Database 19c Certification | The ORACLE-BASE Blog
Jaffar's (Mr RAC) Oracle blog: Migration methods to Autonomous Database (ADB) - Part II (MV2ADB)
Jaffar's (Mr RAC) Oracle blog: Migration methods to Autonomous Database (ADB) - Part I (Data Pump)
How to Create a Team, Channel and SharePoint Site to Collaborate with Clients
Dynamically Reset Those Tiny BlackArch Linux Terminals | slice2
[blackarch ~]# printf ‘\e[8;20;90t’ [blackarch ~]# printf ‘\e[8;30;90t’ [blackarch ~]# printf ‘\e[8;40;90t’ [blackarch ~]# printf ‘\e[8;50;95t’ [blackarch ~]# printf ‘\e[8;40;100t’
Infosecurity.US - https://infosecurity.us - BSides Knoxville 2020, Adam Compton's 'A Hillbilly's Guide To Staying Anonymous Online'
Do not trust any public VPN service, Create your own Secure SOCKS5 Proxy for just $5 – Techno Chat|Tech Blog!!
Remembering WannaCry | Avast - Security Boulevard
Backing Up VCSA in vSphere 7 – Notes from MWhite
How to install MABS (Microsoft Azure Backup Server) and use it to protect on-premise virtual machines - Blog dbi services
An open source camera stack for Raspberry Pi using libcamera | ブログドットテレビ
Cyber Command Needs New Acquisition Authorities - Lawfare
Go back in time with a Raspberry Pi-powered radio - Raspberry Pi
What one cybersecurity company has learned from responding to Maze ransomware
Track Your Screen Time in Linux with ActivityWatch
Open source algorithms for network graph analysis help discover patterns in data - Help Net Security
Nmap Basics - The Security Practitioner's Swiss Army Knife
Citizen DJ / Homepage
I made a Radio Time Machine that covers 100 years (10 decades) of music, from the 1920s to the 2020s. Each decade has its own Spotify playlist, with on average 500 songs from that decade that are played randomly. I used a Pi 4, Arduino Nano, and Mopidy library. [Repost in landscape mode] : raspberry_pi
I is for Introvert (Shallow Thoughts)
How to Use Loops in Ansible Playbook
Lnav Log Files Navigator Helps You Analyze Log Files in a Mac OS or Linux Terminal
Excellent Utilities: Watson - CLI tool to track time - LinuxLinks
The Lars, Mark, and Daniel Club
Intel and Penn Medicine are developing an AI to spot brain tumors | Engadget
Find If A User Is Using Password-based Or Key-based SSH Authentication
Thunderbolt port flaw lets hackers steal your data | Engadget
Any PC Manufactured Before 2019 Is Vulnerable To 'Thunderspy' Attack
Learn at home: a guide for parents #2 - Raspberry Pi
Handle DB-Links after Cloning an Oracle Database - Blog dbi services
Running a Medical Practice on Open Source
Chris's Wiki :: blog/sysadmin/OurFileserverScale-2020-05
Working from home – Is it negotiable? – Scott Gruby's Blog
Women are better at cybersecurity than men
Make your router reboot automatically when internet connection is lost
EARN IT: Privacy, Encryption, And Policing In The Information Age | Hackaday
Inputs Of Interest: I’m Building An ErgoDox! | Hackaday
Need a USB cable? Build one! – Josef Adamčík
Mystery Inflammatory Syndrome In Kids And Teens Likely Linked To COVID-19 : Shots - Health News : NPR
Hospitals Lose Money During Pandemic; Healthcare Workers Face Layoffs, Cut Hours : NPR
AWS Networking 101 « ipSpace.net blog
'SideScanning' technology offers deeper multi-cloud visibility
Random thoughts of Ebenezer: Toilet roll roller
Everyone’s Afraid | Don Jones®
Portable MRI Machine Comes To The Patient | Hackaday
Ask Hackaday: Wink Hubs, Extortion As A Service? | Hackaday
What Will You Do With An Extra 1.2 Gigahertz? | Hackaday
Keeping IT Support Human during WFH - Code as Craft
Doc Searls Weblog · Choose One
Great lessons from great women
“There are two kinds of people, those who do the work and those who take the credit. Try to be in the first group; there is less competition there.” – Indira Gandhi, “To me success means effectiveness in the world, that I am able to carry my ideas and values into the world — that I am able to change it in positive ways.” – Maxine Hong Kingston, “You know, failure hurts. Any kind of failure stings. If you live in the sting, you will undoubtedly fail. My way of getting past the sting is to say no, ‘I’m just not going to let this get me down.’” – Sonia Sotomayor, “Failure is an important part of your growth and developing resilience. Don’t be afraid to fail.” – Michelle Obama “If your dreams do not scare you, they are not big enough.” – Ellen Johnson Sirleaf, “My object in life is not simply to make money for myself.” – Madam C. J. Walker, “If you look at what you have in life, you’ll always have more. If you look at what you don’t have in life, you’ll never have enough.” – Oprah Winfrey “No one has ever become poor by giving.” – Anne Frank “You can only become truly accomplished at something you love. Don’t make money your goal. Instead, pursue the things you love doing, and then do them so well that people can’t take their eyes off you.” – Maya Angelou, “Power is not given to you. You have to take it.” – Beyoncé “We teach girls to shrink themselves, to make themselves smaller. We say to girls: You can have ambition, but not too much. You should aim to be successful but not too successful, otherwise you will threaten the man. If you are the breadwinner in your relationship with a man, pretend that you are not, especially in public, otherwise you will emasculate him.” – Chimamanda Ngozi, “We as women should shine light on our accomplishments and not feel egotistical when we do. It's a way to let the world know that we as women can accomplish great things!” – Dolores Huerta,
Uncle Sam to agencies: No encrypted DNS for you! – Naked Security
ILOVEYOU: The Love Bug virus 20 years on – could it happen again? – Naked Security
U.S. unemployment surges to a Depression-era level of 14.7% - Japan Today
This week, the Bank of England projected that Britain will see its biggest annual economic decline since 1706, when the European powers were embroiled in the War of the Spanish Succession.
Did Former Green Berets Violate the 1794 Neutrality Act by Invading Venezuela? - Lawfare
Doc Searls Weblog · Reality 2020.05.08
AppSec_Best_Practices_vs._Practicality.pdf
How the Spanish flu of 1918-20 ravaged Japan - Japan Today
"Sumo Kaze" (sumo cold)
Unix and Adversarial Interoperability: The ‘One Weird Antitrust Trick’ That Defined Computing | Electronic Frontier Foundation
The Technium: 68 Bits of Unsolicited Advice
MS-Teams on Windows Server: Keep an eye on your RAM | Born's Tech and Windows World
Chris's Wiki :: blog/linux/SoftwareRaidResyncOnSSDs
Chris's Wiki :: blog/linux/Ubuntu2004ISOAutoinst
Learn How To Configure Windows Server 2019 Active Directory
ChaosSearch 2.0 Introduced | APMdigest - Application Performance Management
How to Refresh AD Groups Membership without Reboot/Logoff? | Windows OS Hub
#for the local computer klist -li 0:0x3e7 purge #For the user klist purge #Ticket Granting Ticket klist tgt
Top 5 Trends, Insights and Recommendations to Plan your Enterprise WAN for 2020 and Beyond | APMdigest - Application Performance Management
1. OPERATIONAL COMPLEXITY IS THE BIGGEST HURDLE TO WAN TRANSFORMATION 2. SAAS ADOPTION IS GROWING; MULTI-CLOUD NETWORKING IS BECOMING TABLE STAKES 3. PERFORMANCE, SECURITY AND USER-EXPERIENCE ARE TOP OF MIND. WAN OPTIMIZATION IS STILL POPULAR 4. BARRIERS TO SCALING SD-WAN INCLUDE PERFORMANCE ISSUES, DIY COMPLEXITY AND COST CONCERNS 5. MANAGED SD-WAN IS SEEING A SIGNIFICANT UPTICK GLOBALLY
My Rubrik Forward 2020 Session Picks - Wahl Network
Planning Ahead for a Secure SAP S/4HANA Migration
As Remote Work Becomes the Norm, Security Fight ...
Threat-Modeling Basics Using MITRE ATT&CK
Using Nmap As a Lightweight Vulnerability Scanner
[Part 1] Experimenting with visualizations and code risk overview – DiabloHorn
Today, More Than Ever… | Diary of a Network Geek
So, like I promised, things are getting weird. Next week, I’ll be in the office a bit. My co-worker and I are coming in every other day, to try and help keep the potential for exposure to COVID-19 to a minimum for us. I pray that it goes well.
Lateral Moment on Active Directory: CrackMapExec
Impacket Guide: SMB/MSRPC
Back to Work After Lockdown: Cyber Risks of the Post-Pandemic Era
Belgian DPA Sanctions Company for Non-Compliance with the GDPR’s DPO Requirements | Privacy & Information Security Law Blog
Testing Medical Device Security During COVID-19 Crisis
How to Turn Your Raspberry Pi into a Wireless Access Point
US defence agency targets Android privacy - Mobile World Live
Can you connect as SYSDBA without password into a PDB directly?
The Tools Hackers Are Using Against Your Oracle Database | Integrigy
Qemu 5 was recently released | Fun with virtualization
Traceroute: Introduction and Troubleshooting Tips
VyOS from Scratch – Edition 1 – blog.kroy.io
Windows 10 Version 2004 release between 26th & 28th May | Born's Tech and Windows World
Fresenius probably victim of a Snake Ransomware attack | Born's Tech and Windows World
Syslog-ng on the edge - Blog - syslog-ng Community - syslog-ng Community
5 open source tools IT leaders should know about now | The Enterprisers Project
Excellent Free Tutorials to Learn ABAP - LinuxLinks
How to setup Apache Tomcat cluster with 3 Nodes on Ubuntu
Doc Searls Weblog · Figuring the future
Zoom acquires security startup Keybase to offer end-to-end encryption | Engadget
Microsoft Cult-Like Tactics Destroy Hospitals by Ripping Apart Everything Microsoft (and the NSA) Cannot Control | Techrights
Linux stories: When backups saved the day | Enable Sysadmin
Second wave of coronavirus infections feared around world - Japan Today
GoDaddy confirms security breach affecting 28,000 hosting accounts | Engadget
Input Output & Error Redirection in Linux [Beginner's Guide]
The 25 Best Open Source Security Tools To Protect Your System
Metasploit Nmap OSSEC OWASP ZAP Security Onion OpenVAS Wireshark Nikto W3af Wapiti CipherShed Wfuzz OSQuery SonarQube Snort VeraCrypt Moloch Aircrack-ng Tcpdump SQLMap Zeek Kali Linux GRR – Google Rapid Response Grabber Arachni
SSH Tunnel - Local, Remote and Dynamic Port Forwarding | Jakub Arnold Blog
Deep Dive into Kerberoasting Attack
Kaiji - a new strain of IoT malware seizing control and launching DDoS attacks - Bitdefender BOX Blog
Designing Firmware Resilience for 3 Top Attack Vectors
Openstack RDO && KVM Hypervisor: Just another KVM setup on Deepin 20 Beta
Top STIG – Part 4 (Encrypted Transmission and PKI) | Late Night Oracle Blog
Ansible Collections: init · Tomáš Tomeček
Print your own laboratory-grade microscope for US$18 | EurekAlert! Science News
Essential Hotkeys for Ubuntu 20.04 Beginners
Leary's Rose - YouTube
Interpersonal circumplex - Wikipedia
Recover data from Azure backup - Blog dbi services
Upgrade Testing with a Refreshable PDB - does this work?
GAO: HHS Has Failed to Act on Security Recommendations
2020 Berkshire Hathaway Annual Shareholder Meeting Video, Transcript, and Notes — My Money Blog
How to Use Apple AirPods in Debian | levlaz лев 列弗
SAP Finds Cybersecurity Shortfalls With SuccessFactors, Concur - Bloomberg
"said several of its cloud-computing products do not meet the company’s cybersecurity standards."
Java Heap Space Error During IntelliJ Gradle Plugin Build | levlaz лев 列弗
How to Get CPU Temperature on Ubuntu Linux
7 Tips for Security Pros Patching in a Pandemic
Is a Major Change to Military Justice in the Works? - Lawfare
Getting Started With Basic Google Searches - Black Hills Information Security
Love Bug's creator tracked down to repair shop in Manila - BBC News
It was 20 years ago today... The Love Bug remembered
What's the best long-term investment?
Firewall Change Tracker for Network Security Admins (and it’s free) - Security Boulevard
Self-teaching a little security thinking – Cryptosmith
Hey Remote Worker! You Better be Using Email Best Practices - Phoenix TS
Explain Like I’m 5: Remote Desktop Protocol (RDP) - Security Boulevard
3 Benefits of Going Domainless - JumpCloud
How to Become a World-Class CISO - Hysolate
Quotable Quotes - Security Boulevard
The Critical Role of SSL Inspection to Avoid Secure Malware Delivery - Security Boulevard
7 Cyberattacks Against Pandemic-Stressed Healthcare Orgs - Security Boulevard
Happy Developers Produce More Secure Software, Better Business Outcomes - Security Boulevard
Healthcare devices at higher cybersecurity risk now due to coronavirus - TechRepublic
How to Manage Windows Services with PowerShell? | Windows OS Hub
Sysadmin Stories: vSphere 7 Local Disk Fresh Install and VMFS-L
COBOL programmers -- your time may have come
J-B Wood Restore Premium Epoxy Putty | Cool Tools
The Lost Art Of Component Scavanging | Hackaday
Using Valgrind To Track Down Known And Unknown Bugs In Your Code | Hackaday
Greatest Keycaps And Where To Find Them | Hackaday
60% keyboard with MX blue
Easy and Delicious Chicken Sosaties Recipe- Afrikaans Skewered Meat Dish, South African and Namibian Shish Kebabs, Without Apricots | Penniless Parenting
Sosaties
ESP8266 Adds Web Control To Old Home Theater | Hackaday
Now You Can Be Big Brother Too, With A Raspberry Pi License Plate Reader | Hackaday
Coronavirus FAQs: What Is A Pulse Oximeter? Why Are So Many People Buying One? : Goats and Soda : NPR
What is Microsoft Azure Sphere? Everything you need to know - TechRepublic
Flashing Sonoff Devices With Tasmota Gets Easier | Hackaday
The Best Google Search Cheat Sheet: Tips, Operators, and Commands to Know
VMware vSphere 7 Review - Evolution or Revolution?
22 VMware Certification Questions Answered
The Lazy Admin's Guide to Site Recovery Manager and PowerCLI
Hackers breach LineageOS servers via unpatched vulnerability | ZDNet
88% of IT pros say world is in permanent state of cyberwar - TechRepublic
How to Configure WinRM over HTTPS for Ansible [Tutorial]
Chris's Wiki :: blog/python/Python2Afterlife
90 Days With The Pinebook Pro
Day 3 - Backup-DbaDatabase Filenames and paths - 31 days of dbatools backup and restores - Stuart Moore
Day 2 - Backup-DbaDatabase Basics - 31 days of dbatools backup and restores - Stuart Moore
An introduction to dbatools backup and restores - Day 1 of 31 days of dbatools Backup and Restores - Stuart Moore
31 Days of Backup and Restore with dbatools - Stuart Moore
How to check for weak passwords on your Linux systems with John the Ripper - TechRepublic
How hospitals can be proactive to prevent ransomware attacks - TechRepublic
The 13 best security certifications for newcomers and experienced professionals - TechRepublic
Ransomware: Why SMBs are especially vulnerable to attacks - TechRepublic
Sick of high WAF costs? So are we. - Signal Sciences
 
COVID and Cooperation: The Latest Canary in the Coal Mine - Lawfare
Limitations of the Active Directory Domain - JumpCloud
For Cybersecurity Pros Tired of Adulting - Security Boulevard
Using Median Time to Resolve Efficiently  - Security Boulevard
Tools for expanding NERC CIP across the Enterprise - Security Boulevard
Book Review - Andrew Jackson and the Miracle of New Orleans by Brian Kilmeade and Don Yaege, - Security Boulevard
Hospitals Forced to Fight Another Pandemic - Security Boulevard
Coronavirus-themed attacks April 26 – May 02, 2020Security Affairs
Unpatched Oracle WebLogic Servers Vulnerable to CVE-2020-2883 | CISA
Bypassing Windows Defender Runtime Scanning
How to Configure NestedESXi on a Single Host - Part 2 - VIRTUALIZATION IS LIFE!
How to Configure NestedESXi on a Single Host - Part 1 - VIRTUALIZATION IS LIFE!
VMware ESXi 3.5 – 7.0 Hypervisor Size Comparison | Virten.net
Homelab considerations for vSphere 7
Understanding LDAP Channel Binding and LDAP Signing in 2020
Contrast Labs: Mapping Risk Profiles for Select OWASP Top 10 Vulnerabilities to Understand Their AppSec Risk - Security Boulevard
Using Components with Known Vulnerabilities – Professionally Evil Insights
Cybersecurity in Education (K12) - CIS Critical Controls
DDoS in the Time of COVID-19: Attacks and Raids | Radware Blog
Another Story of Bad 1970s Encryption - Security Boulevard
Shifting Cybersecurity Mindsets – how MSSPs can become the enablers of their customers’ digital transformations - Blueliv
Network Forensics Overview - Security Boulevard
COBOL, Emergent - Security Boulevard
From the Horse's Mouth: Cybersecurity Pros' Favorite InfoSec Quotes - Security Boulevard
How to Build a Case for Effective Cybersecurity Budgets
We Want You! Win the War on Ransomware Today
AntiVirus/Malware Status Verify That Anti-Virus Software Is Installed Verify That Anti-virus Software Is Running Correctly AppLocker Enforcement AppLocker EXE Enforcement Mode: Enforcing Rules Validate That the ‘AppIDSvcStatus’ Is Running Validate That vssadmin.exe Is Denied by AppLocker Validate That wscript.exe Is Denied by AppLocker Backup Software Status Verify That Backup Agent Software Is Installed Verify That Backup Agent Software Is Running Credential Hardening Credential Protection Admin Approval Mode for the Built-in Administrator Account: Enabled Apply UAC Restrictions to Local Accounts on Network Logons: Enabled Run All Administrators in Admin Approval Mode: Enabled WDigest Authentication: Disabled Password Complexity Maximum Password Age Is Greater than 0 and Less than or Equal to 60 Minimum Password Age Is Greater than or Equal to 1 Day Minimum Password Length Is Greater than or Equal to 14 Characters Password Complexity: Enabled Password History Memory Is Equal to 24 Password Reversible Encryption: Disabled File Server Resource Manager (FSRM) FSRM Configuration FSRM File Group – Ransomware Extensions Configured FSRM File Screen – Exists FSRM File Screen Templates – Ransomware Blocking Exists FSRM File Screen Templates – Screening Type Active Windows Feature Installation FS-FileServer Installed FS-Resource-Manager Installed Hidden File Extensions User File Extensions Hidden is Disabled Operating System Updates Missing Patches: None Missing Powershell Settings PowerShell Script Execution Disabled Remote Desktop Protocol RemoteInteractiveLogonRight: Doesn’t Contain Administrators Require User Authentication for Remote Connections by Using Network Level Authentication: Enabled Set Time Limit For Active Remote Desktop Services Sessions: Enabled Set Time Limit For Active but Idle Remote Desktop Services Sessions: Enabled Set Time Limit For Disconnected Sessions: Enabled Terminate Session When Time Limits Are Reached: Enabled SMBv1 Configuration Verify That the SMBv1 Protocol Is Disabled on SMB Client Verify That the SMBv1 Protocol Is Disabled on the SMB Server Windows Admin Shares Default share: Not Shared Remote Admin: Not Shared Remote IPC: Not Shared Server Service: Disabled Windows Defender Windows Firewall – Blacklisted Ports Blocked Windows Firewall – Enable Firewall Windows Firewall – Inbound: Blocked (Default) Windows Firewall – Log Dropped Packets: Enabled Windows Firewall – Log File Is Configured Windows Firewall – Log Size Is Equals Or Greater Than 16M Windows Firewall – Log Successful Connections: Enabled Controlled Folder Access: Enabled Windows Remote Management WinRM Service: Disabled
Active Directory Integration (ADI) Playbook - JumpCloud
BSidesSF 2020 - Jay Jacobs's 'Visualizing Security' - Security Boulevard
Report: Increased Spending on Compliance Not Helping Security - Security Boulevard
How to Use Nancy to Improve Your Go Application Security - Security Boulevard
Incident Response Requires a New AppSec Model - Security Boulevard
Semperis introduces tools to improve security resiliency of Windows Active Directory - Semperis
Veracode Blog | Application Security? But I have a WAF!
Lateral Movement: WMI
OSSEM - A Tool To Assess Data Quality
NBlog - the NoticeBored blog: NBlog May 3 - COVID-19 is like infosec because ...
Office Work: Will we ever go back? - Security Boulevard
Through the Decades: Security Innovation in Response to Threats - Security Boulevard
RangeForce Intros Hands-on YARA Training Modules with Free Promotion - Security Boulevard
3 Governance, Risk and Compliance Trends to Watch | Hyperproof
3 Governance, Risk and Compliance Trends to Watch Compliance and risk management needs technology to navigate across state lines The demand for IT security, privacy and compliance talent is rising Continuous compliance is the new norm
Understanding Windows Services - Security Boulevard
Windows 10 Auditing Features - Security Boulevard
The State of Ransomware in the US: Report and Statistics for Q1 2020 | Emsisoft | Security Blog
Understanding Windows Registry - Security Boulevard
Is COVID-19 Going to Accelerate the Future of Work? - Security Boulevard
Replace Your Door Peephole With a DIY Thermal Camera | flyingpenguin
$50 Open-Source Colorimeter is Remarkable in Comparison to Commercial Models - 3DPrint.com | The Voice of 3D Printing / Additive Manufacturing
With data as central actor, Red Hat aims to unite enterprise needs in common platform - SiliconANGLE
This theme of data being a central actor is at the core of Red Hat’s strategy. For the firm’s 37,000 Red Hat Enterprise Linux customers, data is about being able to pull meaningful insights out of information for business-critical decision making.
Automate Security Testing with ZAP and GitHub Actions
Migrating From Oracle Non-CDB 19c to Oracle 20c - Blog dbi services
3 Solutions to Secure Your Call Center from Ever Changing Threats
Remote management for OpenWRT devices without opening inbound connections | die-welt.net
Hetzner Dedicated Server Reverse DNS + Ansible · Iain R. Learmonth
The Critical Importance of Credential Screening | Enzoic
BSidesSF 2020 - Amol Sarwate's 'Real Time Vulnerability Alerting' - Security Boulevard
How I recovered a lost email from my email client’s memory | Ctrl blog
BSidesSF 2020 - So You’re the First Security Hire (Bryan Zimmer) - YouTube
Fake Microsoft Teams notifications aim at stealing Office365 loginsSecurity Affairs
Bill Sempf | The rule of threes
You can survive: 3 minutes without air 3 hours in severe weather 3 days without water 3 weeks without food 3 months without hope
Re-Imagine Endpoint Protection (Even if You Don’t Have EDR) - Security Boulevard
The average cost per breach resulting from an attack on endpoints is $8.94 million (Ponemon Institute), which is 2.3 times higher than the $3.92 million average cost of a general data breach (IBM).
Cybersecurity Maturity Model Certification Domains Explained - Security Boulevard
Embracing cybersecurity for better vendor access risk management - SecureLink
NCSC Launches New UK Cyber Aware Campaign | Avast - Security Boulevard
BSidesSF 2020 - Adventures in Vendor Security and Continuous Review (Lokesh Pidawekar) - YouTube
Qualys CEO Outlines Plan to Converge Cybersecurity and IT Management - Security Boulevard
GDPR Fine Print: 720,000 Euro Penalty for Collecting Biometrics | flyingpenguin
Cybersecurity Maturity Model Certification Starts with DFARS 800-171 - Security Boulevard
My Favorite Career Development Book - PyBites
"Be So Good They Can't Ignore You." - Steve Martin Skill trumps passion! "You will get all you want in life, if you help enough other people get what they want."
Threat Horizon 2022: Cyber Attacks Businesses Need to Prepare for Now
BSidesSF 2020 - If You’re Not Using SSH Certificates You’re Doing SSH Wrong (Mike Malone) - YouTube
Microsoft Threat Protection leads in real-world detection in MITRE ATT&CK evaluation - Microsoft Security
Sometimes Real Life Is the Best Case Study Around
Hackers are targeting recently patched WebLogic security vulnerabilitySecurity Affairs
Be It Gas Or Electric Cars, This Device Will Save Your Maintenance Cost
Cyber Operations Against Medical Facilities During Peacetime - Lawfare
Ex-Green Beret led failed attempt to oust Venezuela's Maduro - Japan Today
Golden BB is military slang for a one-in-a-million shot that if it hits in the right place can bring down an aircraft.
Failure Is Fine, Learning Is Mandatory | The Networking Nerd
“Failure is a harsh teacher because it gives the test first and the lesson afterward.” — Vernon Law
NTT Data Intellilink - Powering Mission Critical Workloads with Oracle Linux | Oracle Linux Blog
Within NTT Data Intellilink, there is a business unit which focuses on providing customers with Oracle solutions, support, and implementation services using a wide range of Oracle products such as Oracle Database, Oracle Fusion Middleware, Oracle Linux, and Oracle Engineered Systems. These solutions are deployed on premise or in Oracle Cloud. Previously, NTT Data Intellilink had been using Red Hat Enterprise Linux before switching to Oracle Linux with the Unbreakable Enterprise Kernel (UEK). This change resulted in multiple benefits which they speak about in this video. These include optimized workload performance, improved support across the entire stack, increased security, and lowering costs by 50% overall. NTT Data Intellilink also found that Oracle's flexible support contracts were easier to manage.
DNS troubleshooting with record inspection | Enable Sysadmin
Thanks Oracle! New Patches Pending Can Reduce Linux Boot Times Up To ~49% - Phoronix
CISA Urges Federal Agencies to Use Approved DNS Service
Erman Arslan's Oracle Blog: EBS -- Oracle Database 19C - "Curious and Frequently Asked Questions" - Supported Features & Products
Book Review: Active Measures — Adam Caudill
Fake Microsoft Teams Emails Phish for Credentials
EPIC - Senators to Introduce COVID-19 Data Protection Bill
EINSTEIN 3 Accelerated | CISA
Wicker introduces 'COVID-19 Consumer Data Protection Act'
Powerful Photo of Japan’s Religious Leaders Praying Together to End the Pandemic | Spoon & Tamago
'Corona poverty' spreading and getting worse - Japan Today
What is Security Posture? | Balbix
Improving Security Posture the Easy Way - Security Boulevard
China Wants to Control All the Internet With 'New IP' Plan - Security Boulevard
OSINT – Using Threat Intelligence to Secure Your Organisation
Leadership Lessons: Adapting to an All Remote Workforce
BSidesSF 2020 - Leveraging Osquery for DFIR at Scale (Sohini Mukherjee)
IT Guide to Handling a Recession - JumpCloud
GRC Software and the Impact of Integrated Risk Management
Why the Postal Service Is Critical to National Security - Lawfare
Digital Audio Extraction
Building a Linux based headless automated ripping machine using abcde – v2 - Covid-19 update edition : DataHoarder
Jukebox
Advanced Encryption Standard (AES): What It Is and How It Works - Hashed Out by The SSL Store™
Businesses Are Increasingly Considering Paying Ransomware Attackers
Teddy's Citizenship In A Republic Speech, The 110th Anniversary - Security Boulevard
21 Signs That You're an INTP, One of the Rarest Personality Types
Michael Burry Recommended Investing Books List — My Money Blog
ODA 19.6 is available - Blog dbi services
Fault Lines: The Cyber Solarium with Dr. Samantha Ravich - Lawfare
Automated API Testing for the KIE Server - Red Hat Developer
Red Hat Enterprise Linux 8.2 Released with Enhanced Security and Performance - 9to5Linux
Episode 8: Healthcare security in a time of crisis | CSO Online
Ethics and the Criminal Mind ~ Cyber Thoughts
Healthcare Targeted By More Attacks But Less ...
Analysis: Ransomware's Costly Impact - HealthcareInfoSecurity
LabCorp Shareholder Sues Company Over Data Breaches
List of data breaches and cyber attacks in April 2020: 216 million records breached - IT Governance UK Blog
COVID-19 prompts DHS warning to review Office 365 security – Naked Security
Experts warn of mass scans for Apache Tomcat Ghostcat flawSecurity Affairs
Top 5 First Strategic Steps for a New CISO - Security Boulevard
Understand the Business Know Your Stakeholders Know the History of Your Role and Associated Roles Know Your Working and Total Budget Know Your Commitments and Requirements
Decipher Security Podcast with ForAllSecure CEO David Brumley - Security Boulevard
What Are Healthcare's Biggest Cybersecurity Weak Spots?
National Poetry Month – The Cybersecurity Edition
Best WordPress Security Checklist [Ultimate Guide] - MalCare
There are 3 vulnerabilities that are commonly found on WordPress websites. Those are: Outdated plugins & themes Weak credentials Untrustworthy Admin users
8 Scary Statistics about the Password Reuse Problem
A Google survey found that at least 65% of people reuse passwords across multiple, if not all, sites. Another recent survey found that 91% of respondents claim to understand the risks of reusing passwords across multiple accounts, but 59% admitted to doing it anyway. Microsoft recently announced that a staggering 44 million accounts were vulnerable to account takeover due to compromised or stolen passwords. The average person reuses each password as many as 14 times. 72% of individuals reuse passwords in their personal life while nearly half (49%) of employees simply change or add a digit or character to their password when updating their company password every 90 days. These forced resets are an ineffective tactic. And it is not just personal accounts. 73% of users duplicate their passwords in both their personal and work accounts. Security.org found that 76% of millennials recycle their passwords. This is why compromised passwords are responsible for 81% of hacking-related breaches, according to the Verizon Data Breach Investigations Report.
3 Tips for Security in the Remote Work Era - Security Boulevard
Dashboards are the Future of Cybersecurity Reporting
Where to Start With IT Consolidation?
Web server security: Active defense
How To Audit Windows 10 Application Logs
6 ways to address the OWASP top 10 vulnerabilities
1. Injection 2. Broken authentication 3. Sensitive data exposure 4. XML external entities (XXE) 5. Broken access control 6. Security misconfiguration
How Can Cyber Essentials Certification Help Your Business?
Compliance in Canada Today | PCI Pal
How to choose the right strategy for ISO 27001 risk management - Vigilant Software - Compliance Software Blog
Introducing a Technical Guide to Remote Security Operations - Siemplify
The Science of Compliance: Early Code to Secure Your Node
Top Cyber Security Risks in Healthcare
CutiePi designs an open source, Raspberry Pi-powered Linux tablet (crowdfunding coming soon)
Raspberry Pi HQ Camera Features a 12MP Sensor, Supports Interchangeable Lenses
C- and CS-mount form
Should I Roll Over My 401k into an IRA? How to Decide — My Money Blog
USB 4 will support full-throttle DisplayPort 2.0 speeds | Engadget
Open source live streaming with Open Broadcaster Software | Opensource.com
SysmonSearch v2.0 Released - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Elemental - An MITRE ATTACK Threat Library
Security of Health Information - Schneier on Security
Employees Lose 2 Weeks Per Year to IT Downtime | APMdigest - Application Performance Management
Lack of SMR disclosures in the HDD business | TinkerTry IT @ Home
How to Pick an Antenna for Wi-Fi Hacking « Null Byte :: WonderHowTo
How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack « Null Byte :: WonderHowTo
Exostar and Their Role in Your CMMC Certification | Pivot Point Security
Dr. Joel Kahn’s Top 3 Strategies to Help InfoSec Pros De-Stress | Pivot Point Security
SOC 2 vs. ISO 27001 - Dollars and Sense | Pivot Point Security
The DoD’s New CMMC: Think of It as Your Cyber Driver’s License | Pivot Point Security
SANS Cyber Security Certifications & Research
CIS CSC #11 – Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches – The Personal Blog of Sean Goodwin
5 Ways to Improve Business Cyber-Resilience | Webroot
Attack matrix for Kubernetes
Cybersecurity During COVID-19 - Schneier on Security
LA Covers Up Bad Cybersecurity - Schneier on Security
SANS Security Awareness Work-from-Home Deployment Kit | SANS Security Awareness
Shade Ransomware Operation Apparently Shuts Down
Data Breach Settlement Calls for Enhanced Security Measures
RetroPie 4.6 Officially Launched with Support for Raspberry Pi 4
How secure is Java compared to other languages? | JavaWorld
Virginia Tech's "Popcorn Linux" For Distributed Thread Execution Seeking Feedback, Possible Upstreaming - Phoronix
"New" Raspberry Pi 3B v1.2/v1.3 May be Incompatible with Cases with Embedded Heatsink
People Are Switching Homes Less Often, Housing Inventory At Historic Lows — My Money Blog
Using Ansible to verify configurations | Enable Sysadmin
Petter Reinholdtsen: GnuCOBOL, a free platform to learn and use COBOL - nice free software
SQL Server Performance Tuning Benefits | ESX Virtualization
VMware Snapshots: Upgrading to ESXi 7.0
VMware Snapshots: vSphere 7.0 - New Features (VM NVMe Defaults and Shared VMDK disks)
IT Teams Resolving Incidents 63% Faster Than Before Pandemic | APMdigest - Application Performance Management
Over a Decade as a Remote IT Professional: Here's My Advice | APMdigest - Application Performance Management
Ransomware groups continue to target healthcare, critical services; here’s how to reduce risk - Microsoft Security
ROADtools - The Azure AD Exploration Framework
ROADtools
A Global Disaster Brings IT to the Forefront | APMdigest - Application Performance Management
Monitoring a SunPower Solar System – Scott Gruby's Blog
Terraform: Infrastructure as code. » Cyberfella
Chris's Wiki :: blog/python/DjangoBasicAuthWorry
SOSS X | Veracode
Spafford Elected to American Academy of Arts and Science - CERIAS - Purdue University
How to minimize the risks of split tunnel VPNs | CSO Online
Multifactor Authentication is Imperative | Pindrop
Patching ODA from 18.3 to 18.8 - Blog dbi services
Top STIG – Part 3 (Software Support) | Late Night Oracle Blog
Outside the Cubicle | DeWALT 20v Max Cordless Tool Platform – CubicleNate's Techpad
Being in on the world’s biggest secret: My life as a COBOL programmer – IBM Developer
World War COVID-19: Who Bleeds, Who Pays? - Lawfare
The World Responds to the Economic Aftermath of the Pandemic – News
Microsoft Patches Dangerous Teams Vulnerability
Ammo Can Battery; 50 Ah LiFePO4 Clad In Army Green | Hackaday
Reverse Engineering A Ceiling Fan Remote | Hackaday
Ransomware Payments Up 33% As Maze and Sodinokibi Proliferate in Q1 2020
Linked: 5 Lessons from Fairfax County Public Schools’ Cybersecurity Failures
“The Washington Post further reported that FCPS’s issues, in part, resulted from FCPS’s failure to apply software updates for nearly two years and refusal to migrate to more advanced and privacy-friendly software.”
Linked: Seven 'Public Speaking' Tips for Videoconferencing During the COVID-19 Crisis
“Gesture as you normally do. Your hands help you think and speak more clearly. Make sure your screen/camera is far enough away that your gestures can be seen. It is OK to be passionate and emphatic!”
Colorado Hospital Hit by Ransomware as COVID-19 Continues
Perhaps August Dvorak Is More Your Type | Hackaday
Responding to crisis: IBM's Jim Whitehurst draws from open-source lessons to address a rapidly changing world - SiliconANGLE
Stockholm Expected To Reach Herd Immunity In May, Swedish Ambassador Says : NPR
The Fremen principle | Seth's Blog
Find someone who has already optimized for the reality you’re about to enter and learn from them.
Shared objective reality | Seth's Blog
VMware Snapshots: Upgrading to vCenter 7.0
Multiple antivirus apps are vulnerable to common security flaws | Engadget
The Oracle database museum: running old versions of the Oracle database | Frits Hoogland Weblog
Real-time file monitoring on Windows with osquery | Trail of Bits Blog
CIS CSC #10 – Data Recovery Capabilities – The Personal Blog of Sean Goodwin
CIS CSC #9 – Limitation and Control of Network Ports, Protocols and Services – The Personal Blog of Sean Goodwin
CIS CSC #8 – Malware Defenses – The Personal Blog of Sean Goodwin
CIS CSC #7 – Email and Web Browser Protections – The Personal Blog of Sean Goodwin
CIS CSC #6 – Maintenance, Monitoring and Analysis of Audit Logs – The Personal Blog of Sean Goodwin
STS Episode #8: CIS Controls – Basic – The Personal Blog of Sean Goodwin
CIS CSC #5 – Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers – The Personal Blog of Sean Goodwin
CIS CSC #4 – Controlled Use of Administrative Privileges – The Personal Blog of Sean Goodwin
CIS CSC #3 – Continuous Vulnerability Management – The Personal Blog of Sean Goodwin
CIS CSC #2 – Inventory and Control of Software Assets – The Personal Blog of Sean Goodwin
CIS CSC #1 – Inventory and Control of Hardware Assets – The Personal Blog of Sean Goodwin
The unlikely plan to save COVID-19 patients with planes | Engadget
9 Security Tips for Working Remotely | CQURE Academy
Hardware Debugging for Reverse Engineers Part 2: JTAG, SSDs and Firmware Extraction
Android: Secret network of 27 app developers | Born's Tech and Windows World
Lost or Stolen Device? Here’s What to do Next | Webroot
Microsoft patches Teams vulnerability that allowed for account takeover just by viewing a GIF
How to Build A Nintendo Switch to Starve Online Price Gougers  - diy post - Imgur
Trump Suggests We Choose Profits Over Saving Lives From Coronavirus - VICE
NYC Mesh
DIY Internet Provider Sees Demand Spike Amid Coronavirus Pandemic - VICE
COBOL Isn’t The Issue: A Misinterpreted Crisis | Hackaday
A Brief History of a Rootable Docker Image - Akamai Security Intelligence and Threat Research Blog
Resources that aren't properly secured are subject to a myriad of attacks from adversaries with different intentions. In this case, a simple system with SSHd enabled was used for four different criminal campaigns in the span of 24-hours.  When connecting systems to the Internet, you must follow basic security practices to ensure your system isn't hacked or used to attack other Internet hosts.
GitHub - vernetto/sbwebsecurity: Demonstrate Spring Boot Web Security
Getting Started | Securing a Web Application
Spring Security Basics - YouTube
Debugging For Sed — No Kidding | Hackaday
World is at permanent cyber war say security professionals
How to legally download any version of Windows 10, Windows 7, Windows 8.1 and Microsoft Office
How to activate all of Windows 10's secret God Modes
To activate God Mode, right-click the desktop and select New > Folder. Highlight this folder, press F2 and name it: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} Hit enter. Open that folder and you’ll have instant access to a wide range of system settings. If one God Mode isn’t enough for you, there are multiple other options available. Follow the same process as above, but use one of the following alternative strings: Default Programs.{17cd9488-1228-4b2f-88ce-4298e93e0966} My Computer.{20D04FE0-3AEA-1069-A2D8-08002B30309D} Network.{208D2C60-3AEA-1069-A2D7-08002B30309D} All Networks For Current Connection.{1FA9085F-25A2-489B-85D4-86326EEDCD87} Programs and Features.{15eae92e-f17a-4431-9f28-805e482dafd4} Power Settings.{025A5937-A6BE-4686-A844-36FE4BEC8B6D} Printers.{2227A280-3AEA-1069-A2DE-08002B30309D} Icons And Notifications.{05d7b0f4-2121-4eff-bf6b-ed3f69b894d9} Firewall and Security.{4026492F-2F69-46B8-B9BF-5654FC07E423} All NET Frameworks and COM Libraries.{1D2680C9-0E2A-469d-B787-065558BC7D43} Application Connections.{241D7C96-F8BF-4F85-B01F-E2B043341A4B} Administrative Tools.{D20EA4E1-3957-11d2-A40B-0C5020524153} Credentials and Logins.{1206F5F1-0569-412C-8FEC-3204630DFB70} Speech Recognition.{58E3C745-D971-4081-9034-86E34B30836A} That's all there is to it!
Building a pulse oximeter – Dangerous Prototypes
Kerry D. Wong » Blog Archive » Making an OBD-II Solar Trickle Charger
DSHR's Blog: Enterprise SSD Reliability
DSHR's Blog: Archival Cloud Storage Pricing
U.S. GAO - Cybersecurity: DOD Needs to Take Decisive Actions to Improve Cyber Hygiene
500% if_bridge Performance Improvement | FreeBSD Foundation
Not just the end of IT, the end of IT contractors
2020 brings the death of IT
The Dark Web turns 20 this month
Ubuntu Core: a cybersecurity analysis | Ubuntu
Microsoft Patch Tuesday April 2020: my classification script, confusing RCE in Adobe Type Manager and updates for older vulnerabilities | Alexander V. Leonov
Health Prognosis on the Security of IoMT Devices? ...
Domain Controller Backdoor: Skeleton Key
Kerberos Brute Force Attack
The Viral ‘Study’ About Runners Spreading Coronavirus Is Not Actually a Study - VICE
For CISOs Trying to Reduce Risk, New Research Reveals the Value of Focusing on Assets | Kenna Security
Superguide: CyberPower PFCLCD UPS Mini Towers protect your home's computers and entertainment | TinkerTry IT @ Home
How to configure Ubiquiti mPower PRO outlet names without an mFi controller | TinkerTry IT @ Home
AWS Certification and Training – Thin Light
Proxmox vs ESXi | b3n.org
RemoveandReplace.com | DIY Projects / Tips / Tricks / Ideas / Repair
Budgetable - Make Every Dollar Matter
10 Windows Task Manager Tricks You Probably Didn't Know
Troy Hunt: Handling Huge Traffic Spikes with Azure Functions and Cloudflare
HOWTO: Encrypt traffic between AD FS Servers, servers running Azure AD Connect and SQL Servers hosting their databases - The things that are better left unspoken
TechMinds: Demonstrating the QT-DAB Digital Audio Broadcast Decoder
PiSDR Ready to use SDR Raspbian Image Updated to V4.0
SignalsEverywhere: How to set up an RTL-SDR SpyServer on Windows
Bill Gates says ‘worst nightmare has come true’ with pandemic - BelfastTelegraph.co.uk
“In the movies it’s quite different. There’s a group of handsome epidemiologists ready to go, they move in, they save the day, but that’s just pure Hollywood.”
Intel CEO: Bad Companies Are Destroyed by Crises; Great Companies Are Improved by Them - Slashdot
"Bad companies are destroyed by crises; good companies survive them; great companies are improved by them." - AndyGrove
COVID-19 The War Waged by Information Technology Professionals
Guru: A Simple, Effective Way To Compare Data Using SQL - IT Jungle
Machine Learning 101: Supervised, Unsupervised, Reinforcement – Marksei
Machine Learning: Logistic Regression in Python – Marksei
How to set up a Data Science environment on Windows using Anaconda – Marksei
Developing on Kubernetes: my workflow for taming K8S on Windows – Marksei
How the Raspberry Pi Foundation is responding to the novel coronavirus (part 2) - Raspberry Pi
How the Raspberry Pi Foundation is responding to the novel coronavirus - Raspberry Pi
FluSense takes on COVID-19 with Raspberry Pi - Raspberry Pi
University of Toronto supports COVID-19 patient monitoring with Raspberry Pi - Raspberry Pi
Five years of Raspberry Pi clusters - Raspberry Pi
State Unemployment Claims Stalled By Eisenhower-Era Computer Code COBOL : NPR
A COVID–19 False Dilemma – Michael O. Church
Capitalism–19 Vs. Humanity–20 – Michael O. Church
Yes, Under Corporate Capitalism, 8 Million Working Americans Are Likely To Become Unemployably* Disabled–– Possibly, for Life. Check the Math; Check the Assumptions. – Michael O. Church
Techxit (Part 2 of 2) – Michael O. Church
Techxit (Part 1 of 2) – Michael O. Church
Techxit
U.S. Hospitals Hit By Financial 'Triple Whammy' During Coronavirus Pandemic : Coronavirus Live Updates : NPR
We're being faced with what I would call a triple whammy. We have the increased expenses that have been incurred in terms of preparing for the surge and caring for the COVID patients. And then we have the decreased revenues associated with having shut down regular operations in terms of scheduled procedures. You combine that with the increased number of uninsured as a result of the economic situation, and you've got a triple whammy there.
What You Need to Know About the Cyberspace Solarium Commission Report Recommendations - Blog | Tenable®
The need to harmonize standards for vulnerability disclosure and patch management Driving accountability and transparency A carrot or a stick? Better data, better outcomes
Stop The Zoom Trolls and Prevent Zoombombing
Microsoft works with healthcare organizations to protect from popular ransomware during COVID-19 crisis: Here’s what to do - Microsoft Security
Welcoming and retaining diversity in cybersecurity
Forrester names Microsoft a Leader in 2020 Enterprise Detection and Response Wave
Corporate Reconnaissance – We are OSINTCurio.us
site:linkedin.com “system admin”
How to Manage Your Nessus Software Updates
Oracle April 2020 Critical Patch Update Includes Record-Breaking 397 Security Updates
Type Manager Library Zero-Day Flaws (CVE-2020-0938, CVE-2020-1020)
Backdoor: NSA and ASD warn of vulnerabilities | Born's Tech and Windows World
Use Visual Cues To Enhance Learning
Azure Governance – Part 1 Management Groups | Tallan Blog
Some thoughts on Mechanical Keyboards · The Odd Bit
You Need Code Coverage
Four Basic Types of Warehouses | People Centre
Booting an anycast DNS network | Gandi News
Booting Linux Over HTTP
Dell FX160
Building My Own 50Ah LiFePO4 Lithium Battery Pack
Building a Raspberry Pi Stratum 1 NTP Server
PROFINET Technical Overview (P53) | The Automation Blog
Book Freak #39: How To Make a Checklist that Works | Cool Tools
Ultimate Guide to Baltic Birch Plywood: Why It’s Better, When to Use It – Woodworkers Source Blog
The Maker’s Muse | Cool Tools
Working with Metal-Infused Filaments | Cool Tools
Guarding against supply chain attacks—Part 2: Hardware risks
Business Technology is Critical to Driving Business Transformation in Organizations | APMdigest - Application Performance Management
How IT Should Prepare for COVID-19 … or Any Disaster | APMdigest - Application Performance Management
Protect Your People Protect Your Business
6 Indicators of a Successful Digital Transformation | APMdigest - Application Performance Management
1. DEDICATED LEADERSHIP 2. ALL-IN APPROACH 3. DEFINED DIGITAL ROADMAP 4. ALIGNMENT BETWEEN INFRASTRUCTURE AND APPS 5. PLATFORM MINDSET 6. COMMITMENT TO INTELLIGENT OPERATIONS
Zero Day Initiative — CVE-2020-2555: RCE Through a Deserialization Bug in Oracle’s WebLogic Server
Windows Incident Response: Registry Analysis, pt II
Windows Incident Response: Registry Analysis
Shameless Coronavirus Special Promotion – Risk Edition! | Thom Langford
Vulnerability Chains: Learning from Pedro Riberio’s IBM Data Risk Manager Zero-Day Disclosure
Cloud Jewels: Estimating kWh in the Cloud - Code as Craft
Guarding against supply chain attacks—Part 3: How software becomes compromised
Threat hunting: Part 1—Why your SOC needs a proactive hunting team
Cyber Attacks and Disruptive Events On the Rise | APMdigest - Application Performance Management
Lazydocker - The Lazier Way To Manage Everything Docker
BadBlood - Fills A Microsoft Active Directory Domain With A Structure And Thousands Of Objects
Business Continuity Plan: before and after COVID-19 - Security Art Work
dbaSecurityScan - A new PS module for SQL Server security - Stuart Moore
Wireguard on a Raspberry Pi – Stuff I'm Up To
iptables – Part 1 – Stuff I'm Up To
PXE Booting from a Container – Stuff I'm Up To
Wireguard Config Builder – Stuff I'm Up To
Veeam now provides a stand-alone VBK Extract Utility - The things that are better left unspoken
SaveTheQueen Ransomware leverages Active Directory’s SYSVOL to propagate - The things that are better left unspoken
AZ-304 Study Guide: Microsoft Azure Architect Design - Thomas Maurer
AZ-900 Study Guide: Microsoft Azure Fundamentals 2020 - Thomas Maurer
AZ-303 Study Guide: Azure Architect Technologies - Thomas Maurer
Keep control of your Azure environment with Azure Policy - Thomas Maurer
AZ-204 Study Guide: Developing Solutions for Microsoft Azure - Thomas Maurer
AZ-104 Study Guide: Azure Administrator - Thomas Maurer
Rotor Lock Fan Hack - Ground the Yellow Wire
Free HPE iLO Advanced License - The Tech Journal
Troubleshooting VMware ESXi host unresponsive to vCenter - The Tech Journal
How to: Raspberry Pi 4 as an iSCSI SAN (iSCSI Target) - The Tech Journal
Cybersecurity Awareness Slide Deck v.1.1 & Video - Linux Included
Cybersecurity Awareness - Open Source Presentation & Slides - Linux Included
Onion-Zeek-RITA - Linux Included
pfSense VLANs on Proxmox - Linux Included
GDPR and COVID-19: Privacy Regulator Promises 'Flexibility'
Zero Trust framework to enable remote work
Awspx - A Graph-Based Tool For Visualizing Effective Access And Resource Relationships In AWS Environments
Awspx
Pulsar - Network Footprint Scanner Platform - Discover Domains And Run Your Custom Checks Periodically
One-Lin3r v2.1 - Gives You One-Liners That Aids In Penetration Testing Operations, Privilege Escalation And More
One-Lin3r
Project iKy v2.4.0 - Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface
Envizon v3.0 - Network Visualization And Vulnerability Management/Reporting
FinalRecon v1.0.2 - OSINT Tool For All-In-One Web Reconnaissance
ScoringEngine - Scoring Engine For Red/White/Blue Team Competitions
General Electric suffers data breach after service provider hack | TechRadar
Study: Data Security Is the New Table Stakes for a Positive Brand Experience
List of data breaches and cyber attacks in February 2020 – 623 million records breached - IT Governance UK Blog
Sherloq - An Open-Source Digital Image Forensic Toolset
Jackdaw - Tool To Collect All Information In Your Domain And Show You Nice Graphs
How Healthcare Providers Can Prevent Security Vulnerabilities
Intel starts using facial recognition technology to ID workers, visitors - oregonlive.com
Domain Persistence: Golden Ticket Attack
Senate Majority Protects New Yorkers’ Private Data | NY State Senate
Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)
Checklist: Expedited Vendor Privacy and Security Assessment
A Deep Drive on Proactive Threat Hunting
Joel Reidenberg, 1961–2020
Joel Reidenberg
Patch Tuesday: Microsoft Releases 115 Security Updates, The Biggest Batch Ever Launched
Comprehensive Guide to tcpdump (Part 3)
Comprehensive Guide to tcpdump (Part 2)
Comprehensive Guide to tcpdump (Part 1)
Thermal Imaging Cameras are Still Dangerous Dragnet Surveillance Cameras | Electronic Frontier Foundation
Maze Ransomware – What You Need to Know
RDP Session Hijacking with tscon
Credential Dumping: Local Security Authority (LSA|LSASS.EXE)
Credential Dumping: NTDS.dit
Credential Dumping: Wireless
Medical Devices on the IoT Put Lives at Risk
Introducing the VMware vExpert Security Program | Security & Compliance Blog | VMware
VMware Snapshots: vSphere 7 ESXi Upgrade
VMware Snapshots: vCenter 7 Lab Upgrade
Quick look at 5 VMware vSphere 7.0 features & tips to organize and personalize your vSphere Client | TinkerTry IT @ Home
My vSphere 7.0 Upgrade story – step by step! – Notes from MWhite
How to upgrade from VMware vSphere 6.7 to vSphere 7.0, vCenter/VCSA first, then ESXi host(s) next | TinkerTry IT @ Home
The Coronavirus & Cybersecurity: 3 Areas of ...
What is Splunk? - JB Computerization
Storage vMotion of an Oracle RAC Cluster with minimal downtime - JB Computerization
5 Ways to check how much RAM is installed and used on CentOS 8
Using /proc/meminfo Using free command Using top command Using vmstat command Using dmidecode command
5 Ways to Prove Security's Worth in the Age of COVID-19
2020 Cybersecurity Outlook Report: Key Findings (Part 2 of 2) | Security Blog | VMware
Prosecutors: Insider ‘Sabotaged’ Medical Equipment Shipments
InfoSec Conferences Canceled? We've Hours Of Recordings! | /dev/random
How to fix or change the VCSA root password that has expired 6.5 or above - JB Computerization
Missing SYSVOL & NETLOGON after domain controller promotion | Mohammed Wasay
27 Tips for Working From Home - krypted
Sales Strategy Presentation Template -OliverMarshall.net
Expose your private Grafana dashboards with TLS
vSphere 6 End of Support – Elastic Sky
Using VMmark to performance test systems | Electric Monk
Splunk 101 - JB Computerization
How to clear or delete old vSAN partitions on decommissioned hosts — ThinkCharles.net
Running Systems » Blog Archive » Hot-resize disks on Linux
Build and Capture Windows 10 2004 (20H1) Reference Image – Stick To The Script
Deploy Windows 10 2004 (20H1) Reference Image – Stick To The Script
Log Manager Utility – A necessary update – Stick To The Script
WSUS Maintenance Utility – Late March Update – Stick To The Script
PowerShell 7 - What’s new ? - LazyWinAdmin
How and why you should lint your Ansible playbooks | Logan Marchione
Linting Ansible playbooks using Drone | Logan Marchione
Recession is nigh - SysAdmin1138 Expounds
Software Liability Is Just a Starting Point - Lawfare
The speediest patch in the world matters not a whit if it is not applied.
31 Best Free Linux Backup Software (Updated 2020) - LinuxLinks
How to Create Backups with Fsarchiver on Linux - LinuxConfig.org
Conceptual Designs | vLore Blog
VMware Snapshots: vSphere 7 Coredump
How to migrate VMware vCenter Server 6.5 Windows to vCSA 7.0 | ESX Virtualization
VMware Snapshots: vSphere 7 Ate my HBA
Terence Luk: Deploying Azure AD Password Protection for on-premise Active Directory
Tips For a Lifelong Relationship | Penniless Parenting
Security 101: X-Forwarded-For vs. Forwarded vs PROXY · System Overlord
Security 101: Virtual Private Networks (VPNs) · System Overlord
The Home Lab Gets a Home - Wahl Network
PowerShell (Tab) Titles - tommymaynard.com
Under The Stairs: PowerShell 7 Chain and Ternary Operators
Under The Stairs: Deploying and Managing Active Directory with PowerShell 7
Under The Stairs: Remoting With PowerShell 7
How do I find out what version of Linux I am running? | ServerNinjas
lsb_release -d
Amazon Plumbing Nitro Enclaves Support For Linux To Isolate Highly Sensitive Data - Phoronix
Linux housekeeping: Virtual machine storage sprawl | Enable Sysadmin
Debian Dropping A Number Of Old Linux Drivers Is Angering Vintage Hardware Users - Phoronix
Security Not a Priority for SAP Projects, Users Report
Nearly 70% of SAP users surveyed believe organizations lacked focus on IT security during previous SAP implementations.
Security Ratings Are a Dangerous Fantasy
What the Battle of Britain Can Teach Us About ...
Gotta Patch 'Em All? Not Necessarily, Experts Say
Two in three organizations successfully remediate high-risk vulnerabilities, with 51% reducing the number of high-risk flaws in their environments and 17% maintaining the same level. Those paying down vulnerability debt are doing so with improved focus and execution, Baker said, pointing to four metrics firms can use to measure better or worse remediation performance: Coverage: How comprehensive the remediation is; the percentage of exploited or high-risk flaws addressed. Efficiency: How precise the remediation is; how many patched flaws are high-risk? Velocity: The speed and progress of the remediation. Capacity: Number of flaws that can be patched in a given timeframe and net gain/loss.
Information Security Governance: 5 Tips for New CISOs [Cheat Sheet] - Delta Risk
1. Choose a Framework 2. Determine the State of Your Security Implementation 3. Establish Information Security Program Governance 4. Develop Training Content for Specific Audiences 5. Gain Immediate Buy-in from the C-Suite
'Zero Trust' Turns 10 - HealthcareInfoSecurity
John Kindervag
Health Data Breach Tally Spikes in Recent Weeks
Tom Walsh
Watchdog Finds Security Weaknesses in NIH's Records System
The report focused on three areas that need improvement: -NIH located its alternate IT processing site for the EHR system in the same geographic location as the primary site. -NIH failed to upgrade all servers supporting the EHR information system in a timely manner, delaying software upgrades until system upgrades had been completed. -NIH did not effectively implemented account management processes to ensure that terminated employees users and inactive accounts were promptly deactivated.
Benchmarking the State of the CISO in 2020
RDP Honeypots - Koen Van Impe - vanimpe.eu
4 Simple Tips on How to Sell Your House Faster
Security 101: Learning From Home · System Overlord
Securing What's Now and What's Next
ICS Security Conference 2020 Report -Part2- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
ICS Security Conference 2020 Report -Part1- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Why Doesn't Software Get Sold With a List of Ingredients?
Siemens Shares Incident Response Playbook for ...
EternalBlue Longevity Underscores Patching Problem
Security Lessons We've Learned (So Far) from COVID-19
Remote Workforce Jumps 15% in Two Weeks
Using this method, they learned 27% of users worked remotely on an average weekday prior to COVID-19. The numbers have gradually increased for the first eight weeks of 2020 and spiked over the past two weeks as more companies enforced work-from-home policies. For the week ending on March 6, the average percentage of remote workers reached 30% and peaked at 32% on Friday. For the week ending March 13, the average grew to 35% and with a Friday peak of 42%. For comparison, 42% is only slightly less than the average number of people who work remotely on weekends (43%), and it's higher than any holiday in the past six months. Netskope reports the total number of remote employees is the highest it has ever observed.
Many Ransomware Attacks Can be Stopped Before They ...
What Cybersecurity Pros Really Think About ...
What Should I Do About Vulnerabilities Without Fixes?
Now you face a few difficult options when presented with a vulnerability for which no fix exists or when a fix cannot be used: Stop the pipeline and potentially delay rollout of the application until a fix is available (or even bring down a deployed application). Task your own development team with creating a fix (assuming you have the code and the expertise) or finding a workaround. Move ahead accepting the risk, clearing it with appropriate compliance people, which certainly is not ideal. Another option is to run the application in a cloud-native environment and closely control its runtime behavior. Since containers and functions are deterministic, it is possible to identify and stop execution of code that is not aligned with the workload’s intended purpose. By blocking access to specific users, commands, files, ports, or system calls, security can defang a vulnerability so that any attempt to exploit it is stopped or at least clearly identified. This ability bridges the gap, allowing application rollout to proceed, until a permanent code fix to become available.
7 Cloud Attack Techniques You Should Worry About
Credential Exposure Leading to Account Hijack Misconfiguration Mishaps Major Cloud Services Are Hot Targets Cryptomining Server-Side Request Forgery Gaps in the Cloud Supply Chain
vysolator: vyos virtual network isolation – DiabloHorn
https://media.defense.gov/2020/Apr/22/2002285959/-1/-1/0/DETECT%20AND%20PREVENT%20WEB%20SHELL%20MALWARE.PDF
Keys to Hiring Cybersecurity Pros When ...
3 Tips to Stay Secure When You Lose an Employee
How Container Technologies Are Transforming the IT Landscape - Container Journal
Cognizant Hit by 'Maze' Ransomware Attack | Technology News | US News
Cognizant ransomware attack: Cognizant hit by 'Maze' ransomware attack - The Economic Times
Cognizant hit by 'Maze' ransomware attack - The Financial Express
Setting Less Financial Goals for a Greater Chance of Success – BeingFrugal.net
How To Backup and Restore Data in PostgreSQL Database | Django Central
6 open source teaching tools for virtual classrooms | Opensource.com
Debian GNU/Linux Removing Old Drivers: End Of Vintage Hardware?
AnnualCreditReport.com: Free Weekly Credit Reports Through April 2021 — My Money Blog
The barista-approved gear you need to recreate the coffee shop at home | Engadget
The Cyberlaw Podcast: Russia’s Online Disinformation Has a 100-year History - Lawfare
What’s new for NFS in Unbreakable Enterprise Kernel Release 6? | Oracle Linux Blog
How COBOL brings value to the modern enterprise pipeline – IBM Developer
Five best practices for administering remote systems | Enable Sysadmin
Tip 1: Lockdown remote access protocols Tip 2: Limit ingress points for remote management traffic Tip 3: Know your network fundamentals Tip 4: Have access to a remote console Tip 5: Use SSH agent forwarding to your advantage
How to Install and Use Osquery in Ubuntu – Linux Hint
Turn Your Linux PC Into Bluetooth Speakers For Your Phone - OSTechNix
Senators Urge Cyber Leaders to Prevent Attacks on the Healthcare Sector - Lawfare
Untangling Third-Party Risk (and Fourth, and Fifth...)
New York's SHIELD Act could change companies’ security practices nationwide | CSO Online
SANS Cyber Security Certifications & Research
HHS in Targeted Cyber Attack ~ Cyber Thoughts
Business Continuity and Securing a Remote Workforce during a Pandemic Crisis ~ Cyber Thoughts
COVID-19/Coronavirus and Computer Attacks
A Vaccine Won't Return Us to Normal | Daniel Miessler
COVID Will Accelerate Trends That Were Already Coming | Daniel Miessler
The Adoption of Automation and AI: Companies use more non-human options to handle the routine parts of their business (see above) Basic Income: More people are out of work and they need income for basic survival, or some freedom to invest in growing themselves into a better career Pervasive Surveillance, in the Name of Health Safety: Goverments and corporations have been trying for decades to use terrorism as the reason we have to monitor the public as much as possible, but the arguments have become thin with the public due to few actual wins. That all changes now because people will happily support surveillance if they believe it will stop the next pandemic The Rise of Audience-supported Influencers: More people develop followings doing their particular thing, and each of those people pays them a small amount per month or year to get their content The Rise of Esports: Esports gets even more popular—and faster—because of the downtime for traditional sports. And more people can participate and observe in more types of competitions outside the constraints of reality Millions of People Choosing Game Reality Instead of Legacy Reality: Given the natural tendency for income and wealth disparity in the real world (Piketty), combined with the massive jumps in gaming and human-computer interfaces in coming years, a lot of people are going to decide that they’d rather live in a fantasy world than the real one. Their Universal Income will be used to pay rent, food, and their gaming subscriptions, and pretty much everything that matters to them will happen in-game.
It's Time for Global Health SOCs Powered by Wearables | Daniel Miessler
The Difference Between Epidemic, Endemic, Pandemic, and Exponential Growth | Daniel Miessler
5 Things Ransomware Taught Me About Responding in a ...
1. To Pay, or Not to Pay? 2. Incident Response is Key 3. Getting Back to Basics 4. It's Not Just About Technology 5. Look Forward, Not Back
Cybercrime May Be the World's Third-Largest Economy ...
Coronavirus: What companies are ready for our new reality? | InsiderPro
What kinds of companies may not survive coronavirus crisis The companies most negatively affected are ones with a fixed business model of workers only in corporate facilities. Examples of this include the following: Fixed call centers with banks of workers in front of terminals and on the phone Retail companies that rely on customers walking in the door to buy goods Service organizations that require on-site interactions Logistics/transportation companies that have not yet gone mobile Highly regulated (e.g., finance, healthcare) that chose to keep all data and access in a centralized location with no access from outside the corporate location. Best-equipped to survive COVID-19 There is also a class of companies that are already equipped to work in a fully distributed employee model and in fact have been doing so already. Examples of this include the following: Distributed call centers (e.g., insurance, finance, travel) that essentially have remote workers tied into corporate call center management systems over network connections, some of which may be from a home office Companies already heavily cloud-based, and therefore can allow connectivity almost anywhere there is a terminal and high speed connection Collaboration tool adopters (e.g., Microsoft Teams, Cisco Webex, Google, Zoom, Slack), that allow employees and groups to communicate easily and from virtually any location while sharing files and other information Heavy mobile uses that are already remote most of the time, that use enterprise apps from a smartphone or tablet, as these are already geared to be used in a remote fashion
Cybercrime is becoming bolder with data at the centre of the crime scene | Europol
Dell Technologies Bolsters PC Security for Today's Remote Workers | Direct2DellEMC
Arctic Security | Number of Potentially Compromised Organizations More than Doubles Since January
Dragon News Blog: Research Shows Number of Potentially Compromised Organizations More than Doubles Since January
4 Cybersecurity Lessons from the Pandemic
Lesson 1: Understanding Lateral Movement Lesson 2: Know Where Infections Are Lesson 3: Slow It Down Lesson 4: Hygiene Is Critically Important
IAPP-EY Annual Governance Report 2019
https://legislation.nysenate.gov/pdf/bills/2019/S5575B
Hospitals brace for increase in cyberattacks  | TheHill
What's new in Red Hat Enterprise Linux 8.2?
10 markers of a great cybersecurity program | CSO Online
How to lock down RDP servers | CSO Online
The basics: Patching, VPNs and strong passwords
Zero Trust Part 2: Implementation Considerations | CSO Online
5 steps to building an effective disaster preparedness plan | CSO Online
Microsoft Has a Service Continuity Plan in Place to Address the COVID-19 Outbreak | Alexander's Blog
GitHub - ddneves/awesome-azure-learning: This repo includes plenty of references for Azure learning, especially for the Azure certs and Azure architecture, and any other learning materials e.g. security and automation topics.
Episode 7: Security in a time of crisis | CSO Online
CMMC explained: What defense contractors need to know | CSO Online
Podcast: Why new remote work policies attract hackers | CSO Online
7 PSD2 questions every CISO should be prepared to answer | CSO Online
Payment Services Directive (PSD2)
List of Best Jupyter Notebook Alternatives – Linux Hint
How Oracle Database knows it's running on the Cloud? - DBA - Rodrigo Jorge - Oracle Tips and Guides
OJVM datapatch fails with ORA-29532 - root cause is noncdb_to_pdb.sql
SANS Cyber Security Certifications & Research
The homemade structural IT crisis | Born's Tech and Windows World
Frankly spoken: these support periods are already too short for industrial systems. Until a new Windows version arrives in new SCADA products or devices, 3 – 4 years may pass – there are still 6 – 7 years left in which products get support. If the project planning and construction of a plant still takes 1-2 years, the Windows systems are still supported for 4-5 years at the point it’s getting installed.
Facebook COVID-19 Symptom Map
How one healthcare CISO is navigating the COVID-19 crisis | CSO Online
Eliminating the Question of Age-related Friction in MFA Technology | CSO Online
77% of people have heard of two-factor authentication (2FA), up from 44% in 2017 53% have used 2FA, up from 28% in 2017
Home Network Design - Part 2 - Black Hills Information Security
Home Network Design - Part 1 - Black Hills Information Security
Messing With Portscans With Honeyports (Cyber Deception) - Black Hills Information Security
Detecting Long Connections With Zeek/Bro and RITA - Black Hills Information Security
Checklist: Starting a Security Consulting Firm — Adam Caudill
Free Ransomware Help for Coronavirus Healthcare Organizations
The 15 biggest data breaches of the 21st century | CSO Online
LIVE WEBINAR – Expand Your Cybersecurity Skillset and Become Windows Forensics Master 2.0 | CQURE Academy
Work from home, phase 2: What comes next for security? | CSO Online
Threat modeling explained: A process for anticipating cyber attacks | CSO Online
A Geek's Trip Down Memory Lane - The BBS (Bulletin Board System)
Lowering Grocery Bills Even with Corona Precautions and Restrictions | Penniless Parenting
April 2020 Patchday: Review and issues | Born's Tech and Windows World
Maintenance Windows: The Never Never Land of Patching – Dam Good Admin
Python » Cyberfella
What is DevOps? » Cyberfella
git Cheat Sheet » Cyberfella
Load Testing Your IIS Web Server
Intro to Application Pools in IIS
Setting up the Adafruit Huzzah ESP8266 Breakout
End Microsoft Teams Meeting for all Attendees-Sharing Knowledge | Erwin Bierens Blog
Koken – How to Export Albums and Images to a new Gallery system | g.fisk
Powershell – Disable Active Directory/Office365 user | geekdudes
Terraform – Azure Modules for creating VNET, VM and Application gateway | geekdudes
Best Office 365 backup solutions - ITSMDaily.com
How to Enable/Disable Volume Shadow Copy for Windows 10/8/7?
10 Places to Learn Golang
The Top 10 Books on DevOps You Need to Read
Transforming Your Organization with the Andon Cord
Power BI Security | James Serra's Blog
I Took a COBOL Course and I Liked It
25,757 companies use COBOL in 2020 emphasis on the idea that “this program will grow large and be maintained for decades”
Create Your Own Blog for 5 Dollars a Month
Become a React Developer in a Weekend
Ransomware infection in Czech University Hospital of Brno | Born's Tech and Windows World
Windows 7: Securing with the 0patch solution – Part 2 | Born's Tech and Windows World
Windows 7: Forcing February 2020 Security Updates – Part 1 | Born's Tech and Windows World
Windows Server 2012/R2/Terminal server: Temporay user profiles after February 2020 Updates | Born's Tech and Windows World
Sunday Reading: Tools for Administrators (March 2020) | Born's Tech and Windows World
Swisswindows AG goes bankrupt after Ryuk attack | Born's Tech and Windows World
Chris's Wiki :: blog/sysadmin/WhyWeUse1UServers
Chris's Wiki :: blog/tech/TLSThreeWorlds
Chris's Wiki :: blog/sysadmin/IowaitIsNarrow
Kubernetes » Cyberfella
How I Studied for, and Passed, Microsoft Exam: AZ-900 Azure Fundamentals - Mohammad Darab
The Week that Was, 4.18.20
Tor Project lays off a third of its staff | ZDNet
How To Restore an Oracle Autonomous Database? – Talip Hakan Ozturk's ORACLE BLOG
Backing Up an Oracle Autonomous Database Manually – Talip Hakan Ozturk's ORACLE BLOG
Oracle Database Upgrade - Quick Start Guide available
Video : Online Table Move Operations in Oracle 12.2 Onward | The ORACLE-BASE Blog
Locating Oracle Enterprise Linux Images for Azure
SQL Server: Quickly clean backup history with dbatools - Blog dbi services
My journey from DBA to DevOps – data-nerd.blog
The Phoenix Project – Book Review – data-nerd.blog
Running Jupyter Notebooks as Agent Jobs | SQL DBA with A Beard
Response: Cisco Licensing Made Easier - EtherealMind
How to Create a Beautiful HTML Report with PowerShell
Rotating Windows Admin Passwords with Microsoft LAPS [Tutorial]
23 Must-Have Work Tips from a Working from Home Veteran
PowerShell Strings: Everything You Wanted to Know
Using PowerShell to Delete Files [All the Ways]
The PowerShell Switch Statement: Much More than If/Then
How to Up your Game with PowerShell Try Catch Blocks
Managing Massive Media - Architecting IT
Backblaze Pushes Past 1 Exabyte of Data Stored - Architecting IT
The ultimate remote video conferencing and online meeting software cheat sheet 3.0
Security, compliance, and privacy for remote collaboration software
Working from home: my advice – Blog FiascoBlog Fiasco
Microsoft Edge Privacy Whitepaper - Microsoft Edge Development | Microsoft Docs
Zero-day ADV200006 – How to use GPOs to mitigate your Windows risks
Solution for slow start of Windows Server 2016? | Born's Tech and Windows World
Data breach at General Electric (GE) | Born's Tech and Windows World
Hackers infects thousands of MS SQL servers with backdoors | Born's Tech and Windows World
So You Want a Red Team Exercise? · System Overlord
Building a very minimal initramfs
EuroPython Society — Farewell to Oier Echaniz Beneitez
Radio Garden
Oracle 12c Database STIG Breakdown | Late Night Oracle Blog
OJVM and the Mitigation Patch - Things to know in 2020
OJVM and the Mitigation Patch - Things to know in 2020
Oracle recovery concepts - Blog dbi services
PostgreSQL 13: Backup validation and backup manifests - Blog dbi services
Be Careful of What You Include In SQL*Net Security Banners
Oracles Free TNS Firewall - VALIDNODE_CHECKING
World Backup Day- Backing up an Oracle Database using RMAN to Azure Blob Storage
Paying Off Your Mortgage Early Will Destroy Your Finances
Mainframes Are Having a Moment - IEEE Spectrum
Erman Arslan's Oracle Blog: ZDLRA - as a Simple and Reliable Migration Solution
ZDLRA
Oracle Critical Patch Update Advisory - April 2020
Top STIG – Part 1 | Late Night Oracle Blog
Hospitals turning away sick people as coronavirus cases surge - Japan Today
Japan enters 1st weekend under nationwide state of emergency - Japan Today
New York governor attacks Trump for 'passing buck' on pandemic response - Japan Today
"That is passing the buck without passing the bucks." - Andrew Cuomo
The Guide to Na-Adjectives and "So-Called" No-Adjectives
How to use Jitsi Meet, an open source Zoom alternative - Tech Magazine
OPatch Alert: Be aware of cleanup issues - and the JDK version
Patching all my environments with the April 2020 Patch Bundles
Learn ps command in Linux to display processes tutorial with examples
Real sysadmins don't sudo | Enable Sysadmin
What is an Ubuntu LTS release? | Ubuntu
Creating Conspicuously Compelling Content | The Networking Nerd
Oracle April 2020 Critical Patch Advisory - PL/SQL detailed changes - DBA - Rodrigo Jorge - Oracle Tips and Guides
What’s new with Oracle database 11.2.0.4.200114 versus 11.2.0.4.200414 | Frits Hoogland Weblog
3 antimalware solutions for Linux systems | Enable Sysadmin
ClamAV rkhunter chkrootkit
Clean and reliable setup for dependency installation
How to Install PostGIS PostgreSQL Geographic Information Systems on Debian 10
The 12 Habits of Highly Effective Software Developers
How I've adjusted my work-from-home habits | Opensource.com
The 30 Best Free and Open Source Cybersecurity Tools
The Linux Setup – Jared Domínguez, Red Hat – Linux Rig
DBLD: a syslog-ng developer tool not just for developers - Blog - syslog-ng Community - syslog-ng Community
DBLD
5 IDEs for sysadmins | Enable Sysadmin
Spyder Atom Eclipse PyDev Geany Brackets
Linux housekeeping: Handling archives and backups | Enable Sysadmin
Can You Get a Virus on Your Smart TV? - Make Tech Easier
My seventh year working at Mozilla – Alex Gibson
Welcome to remote working – Bit Stampede
Simple way to install ADB & FastBoot on Ubuntu - The Linux GURUS
What’s your cloud safety plan? -- GCN
Data Is A Strategic Weapon : Pete Brey of Red Hat | TFiR
Linux at Home: Cooking with Linux - LinuxLinks
Create A LiveCD Media | Linux.org
A hole in one: Firewall exception testing and troubleshooting | Enable Sysadmin
The Sandboxie Windows sandbox isolation tool is now open-source!
How I containerize a build system | Opensource.com
Here's how to guard against 'indestructible' xHelper Android malware
Remote work tips and strategies from Red Hatters
Do Your Project Management Remotely With Leantime
Between Software and Service
Download Microsoft Garage Mouse without Borders from Official Microsoft Download Center
Easy DIY Canned Food Storage Anyone Can Build
LEI Numbers Are Creating a Transparent Financial Industry – Economy
14 Ways to Make Your Yard Look Awesome for Under $100
curl is not removing FTP | daniel.haxx.se
The Pentagon Hasn't Fixed Basic Cybersecurity Blind Spots | WIRED
5 Renovations That Don't Increase Your Resale Value
Aoi Ike Pond: Hokkaido's "Unintentionally" Humanmade Blue Pond
How to Write an Outstanding Business Essay – Business for Beginners
Automatically ripping CDs on linux – Image Tracking
Random Thoughts and Geekery by Ant Zucaro
Contents | Enovision Notes
5 Excellent Free Books to Learn Tcl - LinuxLinks
Clementine – A Modern Music Player and Library Organizer
Quickly Get Ansible up and Running – Unadulterated Nerdery
7 techniques for assessing frequency when quantifying (cybersecurity) risks
Upgrade vCenter 6.5 to vCenter 7.0 with GUI – The Wifi-Cable
Tips to prevent Zoom Bombing, Security and Conference Hygience - EtherealMind
Nearly Half of Employees Don't Know What to Do When Ransomware Hits
The Bane of Backwards Compatibility | The Networking Nerd
Attaching LTO Tape drives via USB or Thunderbolt | Matt's Tech Pages
Why you need Build Automation Tools for Selenium Automation Testing? | Codementor
40 Useful git Commands for Linux Admins and Developers
Windows command line management tool for HP LTFS | Matt's Tech Pages
Rip CD's with abcde | Enovision Notes
What I Think I Know About COVID-19 and Its Personal Impact - EtherealMind
9 open source CSS frameworks for frontend web development | Opensource.com
Simple Speech to Text Converter Using Speech Recognization in Python | Codementor
How To Use Ansible with SSH Jumphost | Unix Tutorial
Chris's Wiki :: blog/solaris/ZFSOurContainerFilesystems
PC shipments see their largest drop in four years due to COVID-19 | Engadget
Stuck at Home with Slow Internet, Rural Communities Turn to Mesh Networks - TidBITS
The Greatest Asset to Open Source is Community - SDxCentral
Sandboxie is now an open source tool! – Sophos News
Exaile is an open source and cross platform music player for Windows, macOS and Linux - gHacks Tech News
15 Useful Examples of touch Command in Linux System
CS Blog: Encrypting Distributed Databases With Provable Security
CIOs to shift from 'buy' to 'build' using Open Source, IT News, ET CIO
Relocations: fantastic symbols, but where to find them?
Easy containers on Fedora with toolbox | Just another Linux geek
Bored during Quarantine? Get some Soldering Kits to keep you Busy (Crowdfunding & Alternatives)
Hackers Can Compromise VMware vCenter Server Via Newly Patched Flaw | SecurityWeek.Com
How to record your webcam on Linux
Red Hat’s new CEO says it will remain independent under IBM | Raleigh News & Observer
Open Source Cookbook
5 open source activities while you work from home | Opensource.com
The best free and open-source alternatives to Hangouts and Duo on Android
An open source model for greenhouses with supplemental lighting
Traditional Japanese seal system hampers telework for some - Japan Today
25 Practical mv Command in Linux for Everyday Users
How to secure wipe USB drive, SD card on Ubuntu | FOSS Linux
How to Check Open Ports on Linux System | 2daygeek.com
How to use LXD to deploy containers - TechRepublic
15 Open Source Rescue Solutions For Companies Working Remotely under a Lockdown or Quarantine
OpenJDK 8/11 vs. GraalVM 20 vs. Amazon Corretto JVM Benchmarks - Phoronix
Announcing the Unbreakable Enterprise Kernel Release 6 for Oracle Linux | Oracle Linux Blog
Ansible 101 videos with Jeff Geerling, and more Ansible news | Opensource.com
PCLinuxOS Magazine - Page 11
Safer SSH agent forwarding ⁕ Vincent Bernat
How to avoid man-in-the-middle cyber attacks | Opensource.com
Bitwarden: A Free & Open Source Password Manager - It's FOSS
Remote support options for sysadmins | Enable Sysadmin
Why Linux containers are a CIO's best friend | CIO Dive
CIS hardened Ubuntu: cyber attack and malware prevention for mission-critical systems | Ubuntu
Information Gathering Techniques and Process, Hacker must Know | CYBERPRATIBHA
Episode 191 - Security scanners are all terrible
sshd attack traffic - blog.asleson.org
Robotic Process Automation (RPA): 6 open source tools | The Enterprisers Project
5 tips for working from home from a veteran remotee | Opensource.com
How to clean your computer screen
It's all in the dot file - YADM and Homeshick
Linux system housekeeping 101: Managing file storage | Enable Sysadmin
7 echo command uses in Linux with examples | FOSS Linux
Reviewing Docker Logs | Unix Tutorial
Watch Synchronized Videos With Your Remote Friends Using Syncplay (Linux, macOS, Windows) - Linux Uprising Blog
5 Things I Wish I Knew Before Starting a Tech Career - YouTube
NASA CIO Agencywide Memo: Alert: Cyber Threats Significantly Increasing During Coronavirus Pandemic
LibreOffice Information: Presentation templates for Impress
Wi-Fi Not Working on Ubuntu? Here's How to Fix it - Make Tech Easier
Downloading Oracle Linux ISO Images | Oracle Linux Blog
How To Run Docker As Non-root User In Linux - OSTechNix
How to Get IP Address of A Docker Container – TecAdmin
Setting up logrotate in Linux | Enable Sysadmin
How to Use Ansible Vault to Secure Sensitive Data
2 Ways to Upgrade Ubuntu 18.04 To Ubuntu 20.04 (Graphical & Terminal)
Creating Virtual WLAN Interfaces - SUSE Communities
List SAN domains for a certificate Using awk, echo
Ubuntu Core: an independent security analysis | Ubuntu
[Stay at Home] Step By Step to Use Jitsi Video Conference
2020-04: LaTeX at the Law Library, ClusterSSH | KWLUG - Kitchener-Waterloo Linux User Group
Book club: Latacora -- Stop using encrypted email
Getting Started with Ansible Security Automation: Investigation Enrichment – /home/liquidat
Childcare and COVID-19: What Is Legal? - FindLaw
6 Things That Are Now Illegal After COVID-19 - FindLaw
MIT is working on a way to track COVID-19 while protecting privacy | Engadget
WSJ: Travelex paid ransomware ring $2.3 million | Engadget
German Military Cyber Operations are in a Legal Gray Zone - Lawfare
Manage And Monitor Linux Kernel Modules With Kmon - OSTechNix
How to Create a DIY Chromecast Using Raspberry Pi and Raspicast - Make Tech Easier
Use Encrypted Email in Thunderbird with ProtonMail Bridge
Zoom: You should hire an appropriate package maintainer
Learn Python Identity Operator and Difference Between "==" and "IS" Operator
Your occasional enterprise storage digest, featuring Commvault, Nutanix, HYCU, MariaDB and more – Blocks and Files
Powering SAP NetWeaver on RHEL 8
Build a thermal camera with Raspberry Pi and Go - Level Up Coding
Concretedog: Trying to be useful! An Introduction to Inkscape
Pulse+IT - Open source approach for patients arriving at the clinic with Clinic Arrivals
When to use the Clean Architecture? - Breadcrumbs Collector
The 7 most popular ways to plot data in Python | Opensource.com
Better than Zoom: Try these free software tools for staying in touch — Free Software Foundation — working together for free software
Building a sensing prosthetic with the Raspberry Pi | Opensource.com
Conficker a Twelve Years Old Malware Attack Connected Objects | NeosLab
More good news: Medical equipment is still prone to hacker attacks | VentureBeat
Canadian premier infuriated by Trump, says Canada helped U.S. after 9/11 - Japan Today
Newfoundland Premier Dwight Ball said one of the great lessons in humanity is that in times of crisis you don’t stop being human.
Running an event-driven health management business process through a few scenarios: Part 1 - Red Hat Developer
World Backup Day: A plan of action | Enable Sysadmin
Get started with Bash scripting for sysadmins | Opensource.com
The 20 Best Python Tips and Tricks You Must Know in 2020
21 Important Penetration Tools in Kali Linux - Make Tech Easier
Google Squashes High-Severity Flaws in Chrome Browser | Threatpost
How to SSH Properly
Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab
‘War Dialing’ Tool Exposes Zoom’s Password Problems — Krebs on Security
Zoom Calls Are Not End-to-End Encrypted Contrary to Claims
Zoom isn’t actually end-to-end encrypted - The Verge
Why isn't the government publishing more data about coronavirus deaths? | Jeni Tennison | Opinion | The Guardian
How Coronavirus can make open-source movements flourish and fix our healthcare systems - Dataconomy
Embedded Linux joins the Covid-19 battle
NIH Approved 3D-Printed Face Shield Design For Hospitals Running Out Of PPE | Hackaday
Refactoring in Ansible: extract Variable | Adam Young’s Web Log
The cataloging of free software — Free Software Foundation — working together for free software
‘Zoombombing’ is a federal offense that could result in imprisonment, prosecutors warn - The Verge
Data Security and U.S.-China Tech Entanglement - Lawfare
The Cyberspace Solarium Commission: From Competing to Complementary Strategies - Lawfare
Jacquelyn Schneider
9 ingenious ways to give your old Android phone new life - CNET
From the Canyon Edge: How We've Adapted Ubuntu's Time-based Release Cycles to Fintech and Software-as-a-Service
The Key Principles of Coordinated Cycles As a product development team, you have: Time Work to complete Resources to perform work
How to Create TXT Template Scripts in BASH - Make Tech Easier
Emotet Malware Shut Down Microsoft's Entire Network By Overheating PCs
Every Zoom Security and Privacy Flaw So Far, and What You Can Do to Protect Yourself - TidBITS
3-Year-Old RCE Bug Puts Millions Of OpenWRT Devices At Risk
Federal Executive Emergency Authorities to Address COVID-19 - Lawfare
Unpacking TikTok, Mobile Apps and National Security Risks - Lawfare
Zoom Meeting Settings and Other Helpful Info for Teachers and Instructors – Bruce Elgort
Zoom Meeting Code of Conduct Suggestions – Bruce Elgort
Zoom will enable waiting rooms by default to keep trolls out | Engadget
40 Practical and Useful awk Command in Linux and BSD
IEEE Launches its Open Source Collaboration Platform
CNCF tools: 5 hot open-source cloud solutions for your application stack
Smart cards login on Ubuntu | Ubuntu
Surviving the Frequency of Open Source Vulnerabilities
An Open Source Shipboard Computer System | Hackaday
Doc Searls Weblog · Zoom’s new privacy policy
Unemployment Benefits: A Visual Guide to Unemployment Claims
Navi - An Interactive Commandline Cheatsheet Tool - OSTechNix
Zeek and Jitsi: 2 open source projects we need now | InfoWorld
Build a private chat server with a Raspberry Pi and Rocket.Chat | Opensource.com
How to play Sega Master System games on Linux
I had to build a web scraper to buy groceries | Utku's Blog
AI tool predicts which coronavirus patients get deadly 'wet lung' - Japan Today
The Intelligence Contest in Cyberspace - Lawfare
How to Run Penetration Test on Android Phone Camera Using Kali Linux - Make Tech Easier
7 remote work discipline tips for the sysadmin | Enable Sysadmin
Azul Systems brews up fresh blend for open source Java - Open Source Insider
A case study: Improving patient outcomes with Open Source
Field hospital set up in New York's Central Park - Japan Today
6 Tips for Excelling in an MBA Program – Business for Beginners
Insurance For Small Business: Policies Protect Your Assets – Business
Hubble captures the immense 'tsunami' power of quasars | Engadget
IT Automation Tools Are No Longer Enough - DevOps.com
Automation as a Trait, Not a State "There is no such thing as a perfect tool, and don’t let anyone try to tell you otherwise. The good news is it’s not about having a perfect solution, it’s about the experience that can be gained from a solution. Every organization is unique and there is no one-size-fits-all option."
Is O'Reilly’s Exit from In-Person Conferences a Portent of Changes to Come? - TidBITS
"It will be fascinating to see which of our assumptions about how things should be turn out to be merely the way we’ve always done them, rather than the way they could be done better for individuals, for society, and for the planet."
The psychological impact of COVID-19 isolation, as explained by scientists | Engadget
Tsurugi Linux Review: A Linux Distro For Digital Forensics, OSINT, And More
Tsurugi Linux
The Cyberspace Solarium Commission Report and Persistent Engagement - Lawfare
Security, Privacy and the Coronavirus: Lessons From 9/11 - Lawfare
How Recovered COVID-19 Patients Might Help Fight the Pandemic - Lawfare
Using LibreOffice for your open source budgeting tool | Opensource.com
5 Linux backup and restore tips from the trenches | Enable Sysadmin
Top 7 Configuration Management Tools
https://cyberdefense.orange.com/wp-content/uploads/sites/9/2020/03/whitepaper-threat-of-cyberattacks-on-healthcare-and-covid-19.pdf
Operators behind Nefilim Ransomware threaten to release stolen dataSecurity Affairs
Most ransomware attacks take place outside the working hoursSecurity Affairs
The Morning After: Siri has a COVID-19 questionnaire | Engadget
Oprah debuts free Apple TV+ series discussing COVID-19 | Engadget
400,000 new people have joined Folding@Home's fight against COVID-19 | Engadget
Microsoft Patch Tuesday March 2020: a new record was set, SMBv3 “Wormable” RCE and updates for February goldies | Alexander V. Leonov
Resolve-DnsName: The PowerShell Way to DNS Lookup
ER docs don smart rings to better predict COVID-19 infections | Engadget
7 open hardware projects working to solve COVID-19 | Opensource.com
Tools Used in My Automation Projects
Managing the Complexity of Jinja2 Templates in Ansible « ipSpace.net blog
Ransomware Groups Promise Not to Hit Hospitals Amid Pandemic | WIRED
Open Data Sources for AI in Industry
Demystifying Containers – Part IV: Container Security - SUSE Communities
Set Up SMTP and IMAP Proxy with HAProxy (Debian, Ubuntu, CentOS)
Why Automation Holds the Key to Security Governance and a Culture of Collaboration - Infosecurity Magazine
How technical debt is risking your security | Opensource.com
Open-source security tools for cloud and container applications
GNS3 – Network simulator to configure virtual networks on Linux | FOSS Linux
Java 14 Improves Developer Productivity with New Performance Features | IT Pro
Who-T: It's templates all the way down
How Do You Spy When the World Is Shut Down? - Lawfare
What’s in Trump’s Executive Order on the Defense Production Act? - Lawfare
From the Canyon Edge: Time to Cook!
How to set up PXE boot for UEFI hardware | Enable Sysadmin
A short list of useful coronavirus resources
How Complex Systems Fail – Perspectives
Anti-Coronavirus Procedures: Educate Your Staff – Workplace Safety
Uber open-sources Piranha, a tool that automatically deletes stale code | VentureBeat
Introducing b4 and patch attestation — Konstantin Ryabitsev
Building a split mechanical keyboard with a Raspberry Pi Zero controller - Raspberry Pi
AirView Wireless Touchscreen Display Works with Phones, Laptops, Raspberry Pi, Etc. (Crowdfunding)
My top 6 open source frameworks for web development | Opensource.com
The Linux Setup (Again) – Charles Profitt, System Administrator – Linux Rig
Public interest group tells medical equipment makers to release their repair manuals | Engadget
How to use a button with a Raspberry Pi - Raspberry Pi
Raspberry Pi Chromecast? Open-Source Project Makes it Possible | Tom's Hardware
Article series from the open organization community | Opensource.com
X4: Split Vendetta expansion and a huge free 3.0 update announced for release on March 31 | GamingOnLinux
Health groups vulnerable to cyberattacks as coronavirus crisis ramps up | TheHill
Java 14 Reaches General Availability With Garbage Collection Improvements - Phoronix
From sysadmin to DevOps | Enable Sysadmin
DevOps values Culture represented by human communication, technical processes, and tools Automation of processes Measurement of KPIs Sharing feedback, best practices, and knowledge DevOps principles Develop and test against a production-like environment Deploying with repeatable, reliable processes Monitor and validate operational quality Amplify feedback loops DevOps Practices Self-service configuration Automated provisioning Continuous build Continuous integration Continuous delivery Automated release management Incremental testing
Updating the BIOS (System Firmware) from the Device Manager in Windows 10
Message to my IT/hacking friends (Mar17) | metaprogramming and politics
Turning your Raspberry Pi 4 into an edge gateway – Part 2 | Ubuntu
Oracle Database on YouTube – ThatJeffSmith
Oracle Database on YouTube – ThatJeffSmith
Why remote working can be good for people, business and environment
On boxing, tabletop exercises and threat models | Ubuntu
Speeding up container image builds with Buildah | Enable Sysadmin
What is Elasticsearch? - JB Computerization
The Case for vVols and Ransomware – Cody Hosterman
IT Infrastructure Business Continuity & Disaster Recovery (BC/DR) – Corona Virus edition | CloudXC
Getting Started using SSH with PowerShell [Tutorial]
How Red Hat tackles security | ZDNet
Netflix Open Sources Crisis Management Orchestration Tool
Fake Coronavirus Tracker Promises Safety, Installs "Covidlock" Ransomware Instead
Covidlock
Web performance testing: 18 free open-source tools to consider | TechBeacon
The Challenge of Software Liability - Lawfare
[Howto] Using toolbox in Fedora / RHEL 8 for easy management of CLI tools – /home/liquidat
Better to Be Realistic About the Security Opportunities of Cloud Computing - Lawfare
Time for Regulators to Take Cyber Insurance Seriously - Lawfare
The Cyberspace Solarium Commission’s Mandate to Fix Congressional Oversight - Lawfare
7 Linux Distros for Security Testing - Security Boulevard
Backbox BlackArch DEFT Kali Linux Parrot Security Pentoo Linux Samurai Web Testing Framework
Developments in the field of information and telecommunications in the context of international security – UNODA
Enterprise Linux Red Hat Fixed 85% of Critical Flaws Within 7 Days: Report
System76 Blog — A Look Back at Manufacturing
COVID-19: We will come through this together - Japan Today
This is a time for prudence, not panic. Science, not stigma. Facts, not fear.
Samsung Galaxy pad E SM-T560 – enable TWRP recovery, rooting and flashing Android 7.1 using Ubuntu Linux workstation and Heimdall flashing suite. – Sloppy Linux Notes
Alphabet's Verily launches coronavirus screening service in California | Engadget
After Math: How COVID-19 is already clobbering 2020 | Engadget
Raspberry Pi vs antibiotic resistance: microbiology imaging with open source hardware - Raspberry Pi
Essential things to know about container networking | Network World
Elephant is an open source, cross platform note taking application - gHacks Tech News
Bullet journaling for sysadmins | Enable Sysadmin
Digital Transformation in Italy, Powered by OpenShift – Red Hat OpenShift Blog
GitHub - glytchtech/ESPCam: STL and Configuration Files for Glytch's ESPCam Project
9 Hand exercises for computer users
OpenStreetMap: A Community-Driven Google Maps Alternative - It's FOSS
Jaffar's (Mr RAC) Oracle blog: RAC DB upgrade from 11.2.0.4 to 12.1.0.2 ASM prerequisites fail with DUBA
Sysadmin Stories: Distributed vRealize Automation 7.x Orchestrated Shutdown, Snapshot and Startup using PowerCLI
What’s New in vSphere 7.0 Storage Part II: GuestInfo VirtualDiskMapping – Cody Hosterman
C Programming Language Reported Highest 47% Vulnerabilities In 2019
The next generation of hackers may target your medical implants | Salon.com
Jenkins security: Latest advisory highlights more than 20 vulnerable plugins | The Daily Swig
The Ultimate PCAP | Weberblog.net
Amabie: the Japanese Yokai That Can Stave Off Epidemics | Spoon & Tamago
What’s In Trump’s National Emergency Announcement on COVID-19? - Lawfare
Backblaze’s 2019 Hard Drive Reliability Statistics - TidBITS
Responding to COVID-19, Apple Closes All Stores Outside China - TidBITS
Fiscal Measures during the Coronavirus (COVID-19) Outbreak
Netflix pauses production on 'Stranger Things,' other shows due to coronavirus | Engadget
Thoughts and Recommendations Surrounding COVID-19 - TidBITS
How to enable the zRAM module for faster swapping on Linux - TechRepublic
How do you flush DNS cache on Linux? Read to find out!
How to access a Plex Server on Raspberry Pi – AddictiveTips
How to whiteboard collaboratively with Drawpile | Opensource.com
Hackers are spreading fake Android coronavirus trackers to steal your Bitcoin
Mitigating new LVI Intel security vulnerability will have big impact on CPU performance
New Relic – the State of Java Report
Data Sharing and Open Source Software Help Combat Covid-19 | WIRED
The Last Hurrah Before The Server Recession
with 1.05 million machines being sold by the ODMs who supply iron to these companies, up a stunning 53 percent and driving revenues up 37.9 percent to $6.47 billion. Clearly, with the hyperscalers and cloud builders buying mostly X86 servers and with increasing competition between Intel and AMD, the hyperscalers are getting great deals on processors with AMD leading the price
Hackers are making malware-infected coronavirus maps to harvest personal information | Salon.com
Live Coronavirus Map Used to Spread Malware — Krebs on Security
Layered Cyber Deterrence: A Strategy for Securing Connectivity in the 21st Century - Lawfare
The Cyberspace Solarium Commission Report: A Lawfare Series - Lawfare
Why Is Congress Conducting Business as Usual in the Face of Coronavirus? - Lawfare
Different Ways To Repeat Your Last Command In Linux - OSTechNix
How to Turn Your Raspberry Pi 4 into an Edge Gateway - Make Tech Easier
Add timestamp + change history size in your linux history | Linux.org
Microsoft Fixes 115 'Security Holes' In Latest Patch Tuesday Update
Adding a display to a travel-ready Raspberry Pi Zero | Opensource.com
COVID-19 Trade Show Impact - SDxCentral
Sysadmin tools: exa, a modern alternative to ls in Linux | Enable Sysadmin
Brute Force Attacks - Pen Testing Using Hydra and RSMangler - Putorius
RSMangler
7 tips to speed up your Linux command line navigation | Enable Sysadmin
How to Enable Nested Virtualization in VirtualBox on Linux
New governance model for the Django project | Weblog | Django
An end to high memory? [LWN.net]
How to Download YouTube videos on Android
Introducing the guide to getting started with the Raspberry Pi | Opensource.com
5 tips to ace a sysadmin interview | Enable Sysadmin
One year of Mergify
Make SSL certs easy with k3s | Opensource.com
FreeBSD To Sponsor Work For 802.11ac Support - Phoronix
How to set up the Raspberry Pi Zero for travel | Opensource.com
You-Get - downloader that scrapes the web - LinuxLinks
Communicating with other users on the Linux command line | Network World
83% of medical imaging devices running on outdated operating systems, report finds
vSphere 7 with Kubernetes - YouTube
Guess who else likes your backups in the Cloud? | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
Cloud security is your responsibility and backups are the keys to your kingdom.
Troubleshooting CIM on ESXi | Adventures in a Virtual World
VMware vCenter upgrade from 6.7 to 7.0 | KISSTIBOR.info
vSphere 7.0 Link-O-Rama » Welcome to vSphere-land!
vSphere 7: What’s new | JohannStander
VMware vSphere 7 Announced | TinkerTry IT @ Home
vSphere 7 - What's New? - VirtuallyInclined.com
Cyber Strategy and Talent - Lawfare
2020 Cybersecurity Outlook Report: Key Findings (Part 1 of 2) | Security Blog | VMware
How will the coronavirus affect your personal finances?
Boost Employee Morale in 5 Easy Steps – Running Your Business
Specialty Electrical Tapes | Matt's Tech Pages
CCNA Training » Layer 2 Threats and Security Features
SMB over QUIC: Files Without the VPN
10 Optimizations on Linear Search - ACM Queue
"Lesson learned: always figure out the real problem and what the most effective way of solving it as opposed to pushing the problem down the stack or into the cloud." - Ivan Pepelnjak
Trump Suggests Suspending Payroll Tax for the Rest of the Year
How Barcodes Have Revolutionized Society – Running Your Business
6 security metrics that matter – and 4 that don’t | CSO Online
Results of simulated phishing attacks. Mean time to recover. Mean time to detect. Penetration testing. Vulnerability management. Enterprise security audits.
How Reliable Are S&P 500 Stock Dividends? Historical Drawdowns — My Money Blog
ITIL Service Strategy: What You Should Know – Running Your Business
Some Other Examples of Improper IT Management 1. End users do not know who to contact when they have a problem with their computers and other IT devices. 2. Technicians attend end user calls in a disorganized manner. 3. Business managers are frustrated and limited in their ability to manage their teams because of frequent network disruptions. 4. Companies cannot fulfill orders for products and services for their customers. 5. End users can’t count on IT services being available on a daily basis. Therefore, they are unable to fulfill their obligations to the company and to customers. 6. Frequent virus infections hamper activities. Long shutdowns are common. 7. End users face a shortage of computers and disk space. Data corruption and data loss are rampant throughout the organization.
Deloitte: 8 things municipal governments can do about ransomware | CSO Online
Keep critical data compartmentalized so it’s harder for ransomware to encrypt. Disable extraneous services on connected devices. Put policies in place that prohibit checking personal email or playing games on critical hardware. Develop air-gapped backups. Train all employees to be more cybersecurity aware. Use war-gaming exercises to simulate ransomware attacks. Patch and update systems and software in a timely manner. Communicate and collaborate with peer organizations to share information and learn from each other’s successes and failures.
Top cybersecurity facts, figures and statistics for 2020 | CSO Online
9 key cybersecurity statistics at-a-glance 94% of malware is delivered via email Phishing attacks account for more than 80% of reported security incidents $17,700 is lost every minute due to phishing attacks 60 percent of breaches involved vulnerabilities for which a patch was available but not applied 63 percent of companies said their data was potentially compromised within the last twelve months due to a hardware- or silicon-level security breach Attacks on IoT devices tripled in the first half of 2019. fileless attacks grew by 256 percent over the first half of 2019 Data breaches cost enterprises an average of $3.92 million 40 percent of IT leaders say cybersecurity jobs are the most difficult to fill
IT Salary Survey: Do tech certifications pay off? | InsiderPro
8 PCI DSS questions every CISO should be able to answer | CSO Online
Secrets of industry-hopping CSOs | CSO Online
EU plans to introduce sweeping 'right to repair' legislation for electronics | Engadget
The Layman’s Term Guide to AWR for Microsoft- Part I
Resilience is the Needed Middle Ground Between Denial and Panic | Daniel Miessler
Detecting Malware Beacons With Zeek and RITA - Black Hills Information Security
The Wisdom of the (Storage) Crowd - Architecting IT
What to do during a stock market crash
ADHD - Active Countermeasures
Active Domain Active Defense
What Kind Of Health Benefits Can I Get From Tropical Foods? | Penniless Parenting
Data Guard and RAC on Docker : Perhaps I was wrong? | The ORACLE-BASE Blog
What’s New in vSphere 7 with Kubernetes, VCF 4 and vSAN 7? The Important Bits – Ather Beg's Useful Thoughts
What’s New in vSphere 7? The Important Bits – Ather Beg's Useful Thoughts
Auditing by the Numbers | Late Night Oracle Blog
Parsing Nessus v2 XML reports with python | Alexander V. Leonov
From the Canyon Edge: Working from Home -- Lessons Learned Over 20 Years and Shopping List
Build great distance learning and collaborative experiences with open source technology | Moodle
Set Up OpenDMARC with Postfix on CentOS/RHEL to Block Email Spoofing
All-in-One Toolkit for Criminal Investigations | Purdue OTC
Cumulus Rolls Out Open Source Network Automation Toolkit - SDxCentral
LISA2019 Linux Systems Performance
Erman Arslan's Oracle Blog: Exadata -- About Extended (XT) Storage Servers
Creating Dynamic Network Diagrams with Graphviz
There Are No More Green Fields | The Networking Nerd
AMD CPUs for the past 9 years are vulnerable to data leak attacks | Engadget
Banner Grabbing - Penetration Testing Basics - Putorius
Project Rubicon: The NSA Secretly Sold Flawed Encryption For Decades | Hackaday
RUBICON
Coronavirus (COVID-19) | Delta News Hub
Using LibreOffice for your open source budgeting tool | Opensource.com
WireGuard Gives Linux a Faster, More Secure VPN | WIRED
Windows 10 Alert: This Is The Default Setting You Must Change To Stay Safe
PSA: jQuery is bad for the security of your project
Optimise Your Apache Server for it's Best Performance!
Using Ansible to define and manage KVM guests and networks with YAML inventories | Just another Linux geek
API? It's not that scary! - DaPythonista
Designing Ebooks with Free Software » Linux Magazine
GitHub - automatic-ripping-machine/automatic-ripping-machine: Automatic Ripping Machine (ARM) Scripts
Android had the most vulnerabilities of any OS in 2019 - Gizchina.com
How to run and manage a Docker container on Linux Ubuntu/Debian
Asia-Pacific economies face $211 bil hit from virus, says S&P - Japan Today
$211 bil
10 Linux/Open Source Vulnerabilities of All Time
How is Virtual Memory Translated to Physical Memory? - VMware vSphere Blog
Sysadmin tools: 11 ways to use the ls command in Linux | Enable Sysadmin
Useful Ubuntu Keyboard Shortcuts For Beginners – Itsubuntu.com
Backup And Restore Linux Desktop System Settings With Dconf
SD Card Speed Test - Raspberry Pi
FDA warns patients about Bluetooth flaws affecting pacemakers, glucose monitors
Top 5 VirtualBox Alternatives for Linux - NoobsLab | Tips for Linux, Ubuntu, Reviews, Tutorials, and Linux Server
Shell Script to run a SQL script – DBA Tutorials
Jaffar's (Mr RAC) Oracle blog: Oracle 11.2.0.1 upgrade with restore point scenario fails
Newsletter: March 7, 2020 – Notes from MWhite
Several Linux Systems Can Be Hacked Via This 17-Yr-Old RCE Flaw
Nmap command line info gathering magic | Enable Sysadmin
Android Hidden Codes: These are the secret codes of your device
Cockpit - Highway to the admin zone
Top 10 disk space analyzer tools to use on Linux systems in 2020
Upgrade Testing - Online Clone a PDB to Oracle 19c
Unreal Load Testing in the Cloud
RAC on Azure- Link to Microsoft Tech Blog
Learn Python Set/Frozenset Data Structure – Part 4
2020-03: Audacity, Saltstack | KWLUG - Kitchener-Waterloo Linux User Group
Persistent Engagement Neglects Secrecy at Its Peril - Lawfare
IT Projects vs. Non-IT Projects: A Managerial Perspective – Technology
Right Tool For The Job - Cloud for the win!
VCDX181.com - Project Pacific Technical Overview for New Users
History of Destructive Cyberattacks | Security Blog | VMware
What Is a Journaling File System? - Make Tech Easier
Watching activity on Linux with watch and tail commands | Network World
Bash Script to Check How Long the High CPU/Memory Consumption Processes Runs on Linux | 2daygeek.com
How to determine Linux guest VM virtualization technology - nixCraft
Four-slot Raspberry Pi cluster board starts at $80
CloverPI: Take your Raspberry Pi to the next Level!!! by Michael Alsdorf — Kickstarter
Putting The Fastest Correction In History Into Context – The Felder Report
DON'T PANIC | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
How To Complete a STIG Review | Late Night Oracle Blog
It took Google months to patch a serious Android security flaw | Engadget
Google cancels I/O developer conference amid coronavirus fears | Engadget
NASA maps show the effect of a quarantine on air pollution | Engadget
Amazon confirms first coronavirus diagnosis among US employees | Engadget
16 best practices for improving cybersecurity - TechRepublic
Collaboration helps cybersecurity Implement Zero Trust to tighten cybersecurity 1. Establish a clear identity and access management strategy that includes multi-factor authentication (MFA) 2. Create an up-to-date asset inventory that distinguishes between managed and unmanaged devices 3. Create a trusted device policy that prompts users to update their devices against measured vulnerabilities 4. Control user access through a centrally managed policy that identifies and acts upon exceptions 5. Build an architecture and set of processes that enables users to access on-premise and cloud applications Test your response plan to prepare for cyberattack 1. Review and improve security practices regularly, formally, and strategically over time 2. Regularly review connection activity on the network to ensure that security measures are working as intended 3. Integrate security into the organization's goals and business capabilities 4. Routinely and systematically investigate security incidents 5. Put tools in place to provide feedback about security practices 6. Increase security controls on high-value assets as necessary 7. Integrate security technologies 8. Keep threat detection and blocking capabilities up to date 9. Make it easy to determine the scope of a compromise, contain it, and remediate
Three things CISOs need to do differently in 2020 - TechRepublic
Build a modern culture Collaborate with other company leaders Expand your communication strategy
COVID-19: What business pros need to know - TechRepublic
Domain spoofing declines as protective measures grow - Valimail
7 security tips for IoT systems - TechRepublic
1: Assess an IoT device's security before implementation 2: Conduct regular security audits and risk assessments 3: Keep third-party access lists up to date 4: Keep software up to date 5: Establish a procedure for keeping up on vulnerability news 6: Analyze network traffic 7: Only use IoT devices that are built with security in mind
Cloud Computing More Energy Efficient Than Initially Thought - TidBITS
Secure your APIs — don’t give hackers a chance!
A Guide on How to Get Started in Digital Forensics
HIPAA Compliance: Why IT Matters and How to Obtain It | Hyperproof
Understanding Azure AD’s Free Tier - JumpCloud
100 Keyboard Shortcuts to Use Linux Like a Pro – Linux Hint
NBlog - the NoticeBored blog: NBlog March - InfoSec 101 module released
DevOpsDays 2020 at HEG in Geneva - Blog dbi services
Kr00k Wi-Fi Encryption flaw affects more than a Billion devicesSecurity Affairs
Reading Municipal Light Department, Massachusetts, hit by ransomwareSecurity Affairs
BYOD and Mobile Device Management - JumpCloud
Coronavirus: The Unexpected Human Element at RSA Conference 2020
NIST CSF: Cybersecurity basics — Foundation of CSF
S3 Bucket Ransomware Attack: What Is It and How Can It Happen?
Climbing the Vulnerability Management Mountain: Reaching ML:4
Securing the real perimeter – part 2 – Al Berg's Paranoid Prose
Securing the real perimeter – part 1 – Al Berg's Paranoid Prose
Security Priorities & Automation Ascend to Business Relevancy per New KPMG Cybersecurity Report - Security Boulevard
Understanding Azure AD's Basic/O365 Apps Tier - JumpCloud
South Korean Data Protection Laws - The Akamai Blog
How can Third-Party Risk Affect your Healthcare Compliance? - The Compliance and Ethics Blog
Mastering the Journey—Building Network Manageability and Security for your Path
CMMC Compliance Soon Required for Government Contractors & Subcontractors
New Cyber Attack Campaign Leverages the COVID-19 InfodemicSecurity Affairs
Cybersecurity Roundup: February 25, 2020 | Violet Blue on Patreon
White Paper on Cloud Security Risks - And How To Mitigate Them - (ISC)² Blog
Practical Crypto Review for Developers - David Dillard (BSides Tampa 2020) (Hacking Illustrated Series InfoSec Tutorial Videos)
Hunting the coronavirus in the dark web ... ... .... ... ... ...Security Affairs
All versions of Apache Tomcat are affected by the Ghostcat flawSecurity Affairs
The Importance of Server Hardening - Part 1. Introduction and Types of Infrastructure - Security Art Work
Patch your Tomcat and JBoss instances to protect from GhostCat vulnerability (CVE-2020–1938 and CNVD-2020–10487)
Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firmSecurity Affairs
Crooks are attempting to take over tens of thousands of WordPress sitesSecurity Affairs
US Railroad firm RailWorks discloses data breach after ransomware attack
Xencrypt - A PowerShell Script Anti-Virus Evasion Tool
InfoSec Handlers Diary Blog
Amass
Healthcare Design Studio, GoInvo Releases Open Source Information Visualization "Understanding Coronavirus"
Understanding the Novel Coronavirus (2019-nCoV) - GoInvo
Software Defined Everything With Mike Ossmann And Kate Temkin | Hackaday
[Guide] Anniversary 2.0 "SNAFU" - Server Needs a Friggin' Upgrade - Builds / [LGA2011] Anniversary 1.0, 2.0, & More - serverbuilds.net Forums
Yisroel Mirsky - Automated Injection and Removal of Medical Evidence in CT - DEF CON 27 AI Village - YouTube
Subfinder - A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites
IoTGoat - A Deliberately Insecure Firmware Based On OpenWrt
Polyshell - A Bash/Batch/PowerShell Polyglot!
Progress-Burp - Burp Suite Extension To Track Vulnerability Assessment Progress
Some Maniac Drew 'The Simpsons' in Pure Code - VICE
Reddit Can’t Quarantine Coronavirus Misinformation - VICE
Data privacy in healthcare needs more education, protection, UM researchers say - mlive.com
Phishing in Healthcare: Yet Another Major Incident
Brave beats other browsers in privacy study – Naked Security
Apache Tomcat Affected by Serious 'Ghostcat' Vulnerability | SecurityWeek.Com
Healthcare Exchange Standards: Have MHD Clients? What Infrastructure should you deploy>
NRC Health cyberattack sparks privacy concerns about patient records in US
Big health care analytics firm infected with ransomware - CyberScoop
RSAC 2020: Ransomware a 'National Crisis,' CISA Says, Ramps ICS Focus | Threatpost
Australia reports 1st coronavirus death, a Diamond Princess cruise ship passenger - Japan Today
Abe says gov't will create ¥270 bil fund to fight virus spread; asks for public support - Japan Today
Many cherry blossom festivals canceled as virus fears grow - Japan Today
LG Display halts work at phone screen factory after coronavirus infection | Engadget
FDA allows new coronavirus testing tech before it gets emergency approval | Engadget
Security as an “Allowable Cost” in DoD Contracts—Is It Really that Simple? | Pivot Point Security
Best Practices for Ensuring Data Security in the Cloud | EdTech Magazine
How to Install Tomcat 8.5 on Ubuntu 18.04 | Linuxize
Beginners Guide to TShark (Part 3)
Healthcare Exchange Standards: Mobile Health Document Sharing (MHDS) Profile
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher « Null Byte :: WonderHowTo
Complying with CCPA: Answers to common questions | CSO Online
Debian discusses how to handle 2038 [LWN.net]
How to solve the DevOps vs. ITSM culture clash | Opensource.com
Openstack RDO && KVM Hypervisor: Nested KVM performance evaluation on Linux Manjaro 19.0 Guest on Virthost CentOS 8.1
Using Raspberry Pi as a Wired Router – Linux Hint
Automatic Plant Watering with a Raspberry Pi (Shallow Thoughts)
Painless Java with BlueJ | Opensource.com
CERN uses Mattermost | Joinup
Which container platforms are right for your cloud-native strategy? | IDG Connect
10 Best Free Linux Speech Recognition Tools - Open Source Software - LinuxLinks
BSides SF 2020 CTF: Infrastructure Engineering and Lessons Learned · System Overlord
Wi-Fi vulnerability affecting WPA2 encryption makes older Android phones insecure
PyIDM - An Open Source Alternative to IDM (Internet Download Manager)
WireGuard - A Fast, Modern and Secure VPN Tunnel for Linux
Security isolation in CI engines
What happens behind the scenes of a rootless Podman container? | Enable Sysadmin
How the Supply Chain Affects Business Success – Business
The rise of cloud computing has had a smaller climate impact than feared | Engadget
Cloud Snooper: Hackers Using Linux Kernel Driver To Attack Cloud Server
Why Is Windows Patch Tuesday Update Released On A Tuesday?
NMap - A Basic Security Audit of Exposed Ports and Services - Putorius
VokoscreenNG: Free and Open Source Screencasting Tool
vokoscreenNG
Cyber Norms Processes at a Crossroads - Lawfare
Learn Python Dictionary Data Structure – Part 3
Learn Python Tuples Data Structure - Part 2
Open Cybersecurity Alliance announces new language for connecting cybersecurity tools - SD Times
OpenDXL
Build your career in Computer Forensics: List of Digital Forensic Tools - Part I
My Certified Kubernetes Administrator (CKA) Exam Experience · davidstamen.com
Patching the vCenter Server Appliance (VCSA) using the REST API - Part 2 (PowerCLI Module) · davidstamen.com
Automating the Upgrade of the Virtual Distributed Switch · davidstamen.com
How to Home Lab: Part 7 - Log Management | dlford.io
How to Home Lab: Part 6 - Hosting on the Web | dlford.io
How to Home Lab: Part 5 - Secure SSH Remote Access | dlford.io
5 Powershell Commands to Fix Most Windows 10 Problems Easily | dlford.io
How to Home Lab: Part 4 - NGINX Reverse Proxy | dlford.io
How to Home Lab: Part 3 - Host an Intranet Site with pfSense and NAT | dlford.io
7 Steps to Safely Replace a Drive in a Linux MD RAID Array | dlford.io
How to Home Lab: Part 3 - Host an Intranet Site with pfSense and NAT | dlford.io
Introduction to Computer Networking, Binary, and Hexadecimal | dlford.io
How to Home Lab: Part 2 - Managing Proxmox VE | dlford.io
5 Steps to Set Up a Fast, Secure NGINX Reverse Proxy Server | dlford.io
How to Start a Home Lab: Part 1 - Proxmox VE | dlford.io
CISO -- Role and Capabilities - Evolution Map – Rajeev Shukla
Downloads - Open Hardware Monitor
Working from Home: How to Stay Focused – Home Based Business
FIPS is a Four Letter Word | Late Night Oracle Blog
WebLogic Server process takes 100% CPU - Blog dbi services
Erman Arslan's Oracle Blog: Oracle Database - 19C New Features - a Compact and Complete Presentation
The Goal and The DevOps Handbook (again) : My Reviews | The ORACLE-BASE Blog
A brief guide to cybersecurity basics
I Just Graduated with an MBA. Now What? – Business for Beginners
Control Engineering | Wireless security: Extensible authentication protocols
New Department of Defense “Up or Out” Cybersecurity Standards Coming Fast | RSA Conference
The creator of the Konami Code has died | Engadget
How to Home Lab: Part 8 - Introduction to Docker: Installation and Usage. | dlford.io
Python 101 2nd Edition Sample Chapters - The Mouse Vs. The Python
Import private key and certificate into java keystore (Example)
Import Key Pair to Java Keystore
GitHub - perfsonar/maddash: The Monitoring and Debugging Dashboard (MaDDash) is a tool for collecting large amounts of inherently two-dimensional data and presenting it in visually useful ways.
MaDDash HOWTO | perfSONAR
A Graduate Course in Applied Cryptography
What I Learned Watching All 44 AppSec Cali 2019 Talks - tl;dr sec
Floating Flooring | Steller Hardwood Floors | United States
CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF
Mapping Moving Clouds: How to stay on top of your ephemeral environments with Cartography – Marco Lancini
Microsoft Office 365 Security Observations | CISA
Java “keytool import”: How to import a certificate into a keystore file | alvinalexander.com
Szilárd Pfeiffer / cryptolyzer · GitLab
NBlog - the NoticeBored blog: NBlog Feb 24 - InfoSec 101 for pro's
How to access Bitwarden passwords from the Linux command-line
How to set up the ProtonMail Bridge on Linux
3 Best Tips for ZFS Memory Tuning on Proxmox VE 6 and Higher | dlford.io
Studying For and Taking the CISSP Exam | neckercube.com: Jedadiah Casey
Tenable Nessus tips and tricks — Astrix
9 Things to Consider When Estimating Time :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
AWS ABCs -- EC2 Instance Type Cheat Sheet :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
Five Functional Facts About OSPF :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
Five Functional Facts about EIGRP :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
What the *, traceroute? :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
Why I Use MediaWiki for Taking Notes :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
My Tools for Studying :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
RANCID and the Octothorpe :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
An Introduction to Layer 3 Traffic Isolation :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
Book Review: Design For How People Learn :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
Can IT Certifications Become a Liability? :: packetmischief.ca — Networking. Unix. Cloud. Cyber Security. Code. Protocols. System Architecture.
Cyber Weekly
How to set up secure LDAP for Active Directory — Astrix
GitHub - Tirthikas/cwe_checker: cwe_checker is a BAP plugin to find vulnerable patterns in binary executables
How to Calculate and Communicate Your Desired Total Compensation | Daniel Miessler
GitHub - RustyShackleford221/OSCP-Prep: A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam
Forrester report for Rapid7: number juggling and an excellent overview of Vulnerability Management problems | Alexander V. Leonov
Cyber compliance: How to safely share files - VinciWorks Blog
Zero Day Initiative — The February 2020 Security Update Review
The 10 Tenets for Cyber Resilience in a Digital World
Think Like a Business Leader Foster Internal and External Partnerships. Build and Practice Strong Cyber Hygiene, Protect Access to Mission Critical Assets Protect Your Email Domain Against Phishing Apply a Zero-Trust Approach to Securing Your Supply Chain Prevent, Monitor and Respond to Cyber Threats Develop and Practice Comprehensive Crisis Management Plan. Build a Robust Disaster-Recovery Plan for Cyberattacks Create a Culture of Cybersecurity
CVE-2020-1938: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (CNVD-2020-10487) - Blog | Tenable®
Microsoft’s February 2020 Patch Tuesday Addresses 99 CVEs Including Internet Explorer Zero-Day (CVE-2020-0674) - Blog | Tenable®
Cybersecurity Frameworks in Healthcare (And How to Adopt Them)
2020 Update - Security Boulevard
LDAP vs. LDAPS: Securing Auth to Legacy Apps - JumpCloud
What Does the New CVSS 3.1 Scoring Model Mean for Enterprise Security?
MOSE: Using Configuration Management for Evil - Security Boulevard
Active Directory and LDAP Reimagined - JumpCloud
U.S. Healthcare System Attacked at Least 172 Times with Ransomware Since 2016 - Security Boulevard
Asking the Right Questions About Cyber Insurance
SOC It 2 Me: CyberArk Achieves SOC 2 Type 2 Compliance - Security Boulevard
Cybersecurity for K12 Essentials for District IT Teams | ManagedMethods
February 2020 Patch Tuesday – 99 Vulns, 12 Critical, Patch for IE 0-Day, Exchange Vuln, Adobe Vulns - Security Boulevard
Mozilla issues final warning to websites using TLS 1.0 – Naked Security
Security maturity assessments focus on people, process, and technology
A cyberattack on major banks could trigger a liquidity crisis, ECB President warnsSecurity Affairs
How to comply with privacy laws: Start with software security | Synopsys
Azure AD for Small Businesses - JumpCloud
SweynTooth Bluetooth flaws affect devices from major SoC vendorsSecurity Affairs
Turning Out the Lights on Ransomware
March Patch Tuesday is Coming - the LDAP Changes will Change Your Life!
InfoSec Handlers Diary Blog
37.3% of Vulnerabilities in 2019 Had Available Exploit Code or a Proof of Concept – RBS
37.3% of Vulnerabilities in 2019 Had Available Exploit Code or a Proof of Concept
How to Build a Hacking Station with Raspberry Pi and Kali Linux - IoT Tech Trends
Top 10 web hacking techniques of 2019 | PortSwigger Research
The rise and rise of ransomware - Axios
What CMMC Level Should Your Organization Pursue? | Pivot Point Security
How Much Will CMMC Certification Cost My Business? | Pivot Point Security
Does Your Organization Need to Get CMMC Certified with the Limited Rollout? – Let’s Read the Tea Leaves | Pivot Point Security
IE zero day and heap of RDP flaws fixed in February Patch Tuesday – Naked Security
Tunnelling RDP over SSH – Stuff I'm Up To
An Introduction to Test-Driven Development
Increasing Visibility into Network and Application Performance Will Drive Business Innovation | APMdigest - Application Performance Management
DOJ Charges China With Hacking Equifax. That's No Reason to Forgive Equifax - VICE
Bluetooth bugs – researchers find 10 “Sweyntooth” security holes – Naked Security
Corp.com is up for sale – check your Active Directory settings! – Naked Security
Getting Started with WSL - Linux Blog
Get a /56 from Spectrum using wide-dhcpv6 :: Major Hayden 🤠 — Words of wisdom from a social nerd
Get Inactive Users Report for the past 60 days in a multi domain environment | Mohammed Wasay
Step by Step Azure Active Directory (Azure AD) Connect Cloud Provisioning | Robert Smit MVP Blog
Compiling a DLL using MingGW :: malicious.link — welcome
How To Easily Create An AWS EC2 Linux Instance
2020 Home Lab - The IT Hollow
Kubernetes Logs for Troubleshooting - The IT Hollow
Happy 20th Birthday, Active Directory! - The things that are better left unspoken
Clinical Connectivity Just the Facts.pdf
TODO: Test your exposure to Microsoft’s 2020 LDAP Channel Binding and Signing changes - The things that are better left unspoken
Now with added CISSP - Stuart Moore
Stop Fearing the Whiteboard. Conquer It. - Programming Blog
Truly Disable IPv6 |
PS: New-Item -Type DWord -Path HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\DisabledComponents -Value “0xff” -Force CMD: REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters /v DisabledComponents /t REG_DWORD /d 0xff /f To Verify: PS: Test-Path -Path HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\DisabledComponents CMD: REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters /v DisabledComponents
Analyzing Attacks on my Server - Linux Blog
Powershell – SCCM Software Center server update – Luka Gros
Make diacritics easy in Linux :: Major Hayden 🤠 — Words of wisdom from a social nerd
Numbers Every Programmer Should Know By Year
Windows updates history list – Dimitri's Wanderings
0patch Mitigation for CVE-2020-0674 in Windows 10 V190x | Born's Tech and Windows World
How to change compatibility level of a SQL Database-Sharing Knowledge | Erwin Bierens Blog
Linux – Connecting to Windows LDAP over SSL (LDAPS) using certificate | geekdudes
Request SSL certificate for Linux machine from Microsoft Certification Authority | geekdudes
How to enable third party SFP and SFP+ modules on Cisco, HP Aruba switches - ITSMDaily.com
Double-Check Your iPhone’s Medical ID Emergency Contacts - TidBITS
7 Contentious Thoughts about Data Protection | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
Cloud is only cheaper if you don’t think about data protection You’re not protecting enough data You’re protecting data too much Backup is Dead Backup is still Very Much Alive Ransomware Snuffed Out Multi-Purpose Backup Servers You’ve Probably Got The Wrong People Running Data Protection
WoeUSB - make Windows bootable Pendrive on Linux - LinuxH2O
How to install TT-RSS on a Raspberry Pi | Opensource.com
Automate (offline) backups with restic and systemd ·
Keeping Records of CRM Pipeline Sales Leads to Success – Business
Hitting the Books: A brief history of industrial espionage and corn | Engadget
CVE Api - Parse & filter the latest CVEs from cve.mitre.org
White Paper – The Skill Set Needed to Implement a Privacy Risk Management Framework
Breaches in the Cloud and Why Blame Matters
SANS Security Insights | Active Directory Password Policies & NIST Password Standards | SANS Institute
SANS Industrial Control Systems Security Blog | Four Keys to Effective ICS Incident Response | SANS Institute
SANS Security Insights | Finding a Cure for Ransomware | SANS Institute
SANS Security Trend Line | 20 Coolest Cyber Security Jobs | SANS Institute
Hacked Off: Patients Sue Ransom-Paying Hospital Group
0L4Bs - Cross-site Scripting Labs For Web Application Security Enthusiasts
How to use Metasploit in Kali Linux Step by Step Tutorial for Beginners
Beginners Guide to TShark (Part 2)
Census II Report on Open Source Software
Here are some key lessons learned from the report (Chapter 7): There’s a need for a standardized naming scheme for software components. There’s an increasing importance of individual developer account security. Legacy software persists in the open source space. Also, here’s an interesting nugget: “These statistics illustrate an interesting pattern: a high correlation between being employed and being a top contributor to one of the FOSS packages identified as most used.”
Why You Need a Software Restriction Policy (Right Now)
Defense Department Agency Reports Data Breach
Faster Onboarding with PowerShell - JumpCloud
Honeypots and Honeynets – Linux Hint
Defining the Journey—the Four Cloud Adoption Patterns - Security Boulevard
Princeton IoT Inspector
Cloud misconfigurations cost companies nearly $5 trillion - TechRepublic
Cloud misconfigurations cost companies nearly $5 trillion A DivvyCloud report finds 196 data breaches exposed more than 33 billion records due to environments without appropriate security. Of the 196 breaches examined by DivvyCloud researchers, 44% of all records exposed in 2018 and 2019 related back to problems with Elasticsearch misconfigurations. "The number of breaches caused by Elasticsearch misconfigurations nearly tripled from 2018 to 2019. S3 bucket misconfigurations accounted for 16% of all breaches. S3 bucket misconfigurations decreased 45% from 2018 to 2019. MongoDB misconfigurations accounted for 12% of all breaches. MongoDB misconfiguration instances nearly doubled from 2018 to 2019," the report said.
Chris's Wiki :: blog/unix/UsrSplitAndStandards
Windows 10 2004 (20H1): The Biggest Features Explained
.NET PowerShell Notebooks – Using Pester | SQL DBA with A Beard
Win 7/Server 2008 R2: Boot issues with Update KB4539602 | Born's Tech and Windows World
Windows 10 Version 1809 reaches End of Life soon | Born's Tech and Windows World
Windows Update KB4502496 pulled | Born's Tech and Windows World
Patch RCE vulnerability CVE-2020-0618 on your Microsoft SQL-Server! | Born's Tech and Windows World
Windows 10: Watch out for Update KB4023057 (Feb. 2020) | Born's Tech and Windows World
Microsoft pulls KB 4524244, the infamous UEFI patch, from the Catalog @ AskWoody
PowerShell in Azure DevOps Pipelines: The Ultimate Guide
PowerShell Scripting in Azure DevOps Pipelines (1 of 2)
The PowerShell Block Comment and Commenting Best Practices
Tools for SSH key management | Opensource.com
census_ii_vulnerabilities_in_the_core.pdf
Chris's Wiki :: blog/unix/DisklessUnixAndUsr
Ransomware Attack on EHR Vendor Impacts Home Health Chain
Understanding the Impact of the Cybersecurity Skills Shortage on Business | CSO Online
Speed up datapump export for migrating big databases - Blog dbi services
What Is Closed-Loop Automation? | The Networking Nerd
Managing swap in the modern Linux system | Enable Sysadmin
Becoming a Data Company: Back to the Future - Security Boulevard
Addressing the Security Demands of Today’s Dynamic Cloud Environments | CSO Online
SUDO_KILLER - A Tool To Identify And Exploit Sudo Rules' Misconfigurations And Vulnerabilities Within Sudo
Microsoft launches open-source privacy mapping tool
Larry Tesler, of copy-and-paste fame, dies at 74 – Naked Security
How do I download a high resolution copy of an image I found in Flickr? – About BHL
Writing unit test after writing code considered harmful in test-driven development | Opensource.com
Exadata Workloads to Azure, Part II
How to play sound and make noise with your Raspberry Pi - Raspberry Pi
Raspberry Pi 4 UEFI+ACPI Firmware Aims to Make the Board SBBR-Compliant
Autostart Tmux Session On Remote System When Logging In Via SSH
What is backporting, and how does it apply to RHEL and other Red Hat products?
Give your Linux system's firewall a security boost | Enable Sysadmin
Ubuntu multipass | panticz.de
How to Install Mautic Marketing Automation Tool in Linux
Why You Still Don’t Need Antivirus Software on Linux in 2020 – Linux Hint
Oracle Ships Solaris 11.4 SRU18 - Finally Mitigates The SWAPGS Vulnerability - Phoronix
Environmentally-friendly Raspberry Pi projects | Computerworld
Build a Raspberry Pi Zero W Amazon price tracker - Raspberry Pi
Solene's percent % : Daily life with the offline laptop
DHS’s cyber wing responds to ransomware attack on pipeline operator
How 1500 bytes became the MTU of the internet
Hard disk reliability study - 2005-2020
Python Programming
» Free Software is protecting your data – 2014 TEDx Richard Stallman Free Software Windows and the NSA | dwaves.org
Certificate validity and a y2k20 bug | Enable Sysadmin
According to RFC5280 the following must be true for the use of a PKI certificate validity. Dates up to 2049 should be specified in UTCTime Dates beginning in the year 2050 should be specified as GeneralizedTime All client consumers of the certificate should be able to evaluate both UTCTime and GeneralizedTime.
How To Zoom Tmux Panes For Better Text Visibility - OSTechNix
Census Program II - Download Preliminary Report - Core Infrastructure Initiative
Father Of Cut-Copy-Paste And Ex-Apple Employee Larry Tesler, Dies At 74
Larry Tesler
Surviving a security audit with enterprise Linux | Enable Sysadmin
What Are eSIMs? Easy Mobile Internet For Travel - foXnoMad
Japan issues coronavirus medical guidance as infections rise - Japan Today
Judo master, 97, puts 'spirit' above medals at Olympics - Japan Today
"Whether you win or lose, it's just another form of training,"
The CSO's playbook for forging board relationships | CSO Online
Charlie Munger Daily Journal Annual Meeting 2020 Full Video, Full Transcript, and Notes — My Money Blog
How to Analyze Wi-Fi Data Captures with Jupyter Notebook « Null Byte :: WonderHowTo
How to Catch USB Rubber Duckies on Your Computer with USBRip « Null Byte :: WonderHowTo
Oracle Database 20c - The first CDB-only release
Next Step: Network Inventory Database
Open-source URL shortener ‘YOURLS’ gets updated with Bitly-like random keyword plugin
ZF joins Open Manufacturing Platform - Green Car Congress
Webinar on Preparing for Public Sector Ransomware Attacks in 2020
Changing the Monolith—Part 4: Quick tech wins for a cloud-first world
Mattress Firm deployed Azure Active Directory to securely connect Firstline Workers to their SaaS apps and to each other
NERC CIP compliance in Azure
SANS Penetration Testing | SANS Poster - White Board of Awesome Command Line Kung Fu (PDF Download) | SANS Institute
SANS Digital Forensics and Incident Response Blog | USB Key Analysis vs. USB Drive Enclosure Analysis | SANS Institute
WMI 101 for Pentesters - The Ethical Hacker Network
Healthcare Ransomware Damage Passes $157M Since 2016
Software Testing and Spies in The Art of War - EvilTester.com
Beginners Guide to TShark (Part 1)
Privacy law covering most medical care may not apply in schools - Reuters
XSS-Freak - An XSS Scanner Fully Written In Python3 From Scratch
Pytm - A Pythonic Framework For Threat Modeling
Netdata - Real-time Performance Monitoring
Parse stored Windows Event logs with Security Onion - Koen Van Impe - vanimpe.eu
Michael on Security: 2020 Update
Japan Security Analyst Conference 2020 -Part 2- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Japan Security Analyst Conference 2020 -Part 1- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
SANS Blog
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 4 - function call graphs | SANS Institute
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code | SANS Institute
SANS Digital Forensics and Incident Response Blog |A few Ghidra tips for IDA users, part 2 - strings and parameters | SANS Institute
SANS Penetration Testing | SANS Cheat Sheet: Python 3 | SANS Institute
Programming: Interviews, Snek, JavaScript, Perl and Python | Tux Machines
SANS Security Insights | How to Build a Successful Cloud Security Program | SANS Institute
SANS Security Insights | Three Cloud Security Best Practices for 2020 | SANS Institute
Command Line Heroes: Season 4: Mainframes: The GE 225 and the Birth of BASIC
SOL4CE Cyber/Cyber-Physical Laboratory Opens at Purdue University - CERIAS - Purdue University
SOL4CE
Wacom drawing tablets track the name of every application that you open | Robert Heaton
The 25 worst passwords of 2019, and 8 tips for improving password security | CSO Online
Release the monkey! How Infection Monkey tests network security | InsiderPro
Infection Monkey - Breach and Attack Simulation | Guardicore
8 steps to being (almost) completely anonymous online | CSO Online
Cybersecurity spending trends, 2020 | CSO Online
How to fight hidden malware on Windows networks | CSO Online
The CIA triad: Definition, components and examples | CSO Online
US administration requests $9.8B for cyber 2021 budget for the Department of DefenseSecurity Affairs
Is Vulnerability Management more about Vulnerabilities or Management? | Alexander V. Leonov
AntiVirus for my Database Server? | Late Night Oracle Blog
Oracle Database 20c - Documentation and Cloud availability
Oracle Database 20c : Cloud Preview, Docs and Desupport | The ORACLE-BASE Blog
Trump administration wants private sector to do more to counter foreign intelligence efforts
A Raspberry Pi Kiosk (Shallow Thoughts)
The Effect of Switch Port Count in Clos Topology
Persistent L2ARC might be coming to ZFS on Linux | Ars Technica
ESLint now turned on for all of the Firefox/Gecko codebase – Standard8's Blog
Call us immediately if your child uses Kali Linux, squawks West Mids Police • The Register
How to get started with automation: A Red Hat exec offers advice - TechRepublic
The Horrifically Dystopian World of Software Engineering Interviews - Blog by Jared Nelsen
Coding style checks in CI | drboblog
Linux Encryption Tool Cryptsetup Now Supports Windows Disk Encrypted Devices
Azure DevOps : Operational validation with Approval Gates & Azure Monitor Alerts – Karim Vaes
Ultrasonic bracelet jams the microphones around you | Engadget
AI can automatically rewrite outdated text in Wikipedia articles | Engadget
The Coronavirus and Your Rights as an Employee - FindLaw
New company, new role, & back to working with customers – Jase's Place
Dell EMC Isilon – Cloudy With A Chance Of Scale Out | PenguinPunk.net
VCP-DCV 2020: vSphere 6.7 Exam Prep | vLore Blog
odacli create-database extremely slow on ODA X8-2 with 19.5 - Blog dbi services
Get a TLS-enabled Docker registry in 5 minutes
Azure Front Door to Support Deployments - Cloud for the win!
Considerations for vSphere Component Backup and Restore: Part 2 · davidstamen.com
Considerations for vSphere Component Backup and Restore: Part 1 · davidstamen.com
Runecast Analyzer 4.1 and Center for Internet Security (CIS) analyzes your environment for any security risk according to CIS standards | ESX Virtualization
VMware's William Lam publishes "VMware Community Homelabs Project" at virtuallyGhetto | TinkerTry IT @ Home
Six keys to successful digital transformation
The report identifies six: Dedicated leadership -- the survey finds 83 percent of digital transformations that are on track or ahead of schedule are led by a CIO, CEO, CDO, or CTO. All-in approach -- transformations that are on track are 30 percent more likely to be structured as full-scale change initiatives. Because digital operations are often so interconnected, piecemeal and partial transformations can often be siloed and result in limited impact on the factors driving the transformation. Defined digital roadmap -- 92 percent of transformations that are on target or ahead of schedule have a defined strategy and roadmap that includes IT infrastructure and operations. Alignment between infrastructure and apps -- enterprises powered by an integrated DevOps approach are 43 percent more likely to see success in digital transformation efforts. Platform mindset -- businesses that include IT infrastructure as a big part of their digital transformation are 36 percent more likely to have a successful transformation. Commitment to intelligent operations -- companies that monitor IT performance in real time and remediate issues quickly are 24 percent more likely to undergo a successful digital transformation.
Automating APIs with Python and Go (Part I) - Architecting IT
New – Serverless Lens in AWS Well-Architected Tool | AWS News Blog
Docker Exec – What Does it Do?
BBC World Service - The World This Week - Downloads
Anonymous contributors answer: What's some underrated general life advice? - 80,000 Hours
China rolls out 'close contact detection app' for coronavirus | Engadget
My productivity app is a single .txt file
Bubble Sort in Python
City Reviewing Recommendations from Cyberattack Assessment
6 Reasons Your Open-Source Data Science Pipeline Needs Attention Now
Ransomware Hits North Miami Beach Police Department | SecurityWeek.Com
PyBites – The Pythonic Fast Lane, Digest of a 30 Min Mentoring Session
Python course inside of NSA via a FOIA request
The NSA Has a Beginner Python Course - The Mouse Vs. The Python
Salesforce Data Breach Suit Cites California Privacy Law
Blood-drawing robot is supposedly more accurate than humans | Engadget
How to create a symmetrical heart with GIMP | LibreByte
Software is about people, not code – Letters To A New Developer
The Y2038 problem in the Linux kernel, 25 years of Java, and other industry news | Opensource.com
RobbinHood – the ransomware that brings its own bug – Naked Security
NBlog - the NoticeBored blog: NBlog Feb 8 - InfoSec 101
Security in 2020: Revisited - Schneier on Security
Infosecurity.US - https://infosecurity.us - The Joy of Tech® 'A Sympathy Card From Canada'
Dump top 10 ports tcp/udp from nmap Using grep, sed
nmap -oA derp --top-ports 10 localhost>/dev/null;grep 'services\=' derp.xml | sed -r 's/.*services\=\"(.*)(\"\/>)/\1/g'
The three principles of successful cloud-native development
Choice Open source Infrastructure as code (IaC)
Oracle Multitenant: Be aware of the silent COMPATIBLE change
GitHub - siemens/jailhouse: Linux-based partitioning hypervisor
Cats and lasers and (Raspberry) Pi, OH MY! - Raspberry Pi
Celebrating Java's 25th anniversary- Episode 16
Running SQL Server on the Oracle Free tier - Blog dbi services
Setup LXD with Ubuntu's ZFS on root ·
Ragnarok Ransomware Targets Citrix ADC, Disables Windows Defender
Ragnarok
New .NET Notebooks are here – PowerShell 7 notebooks are here. | SQL DBA with A Beard
Stir Fried Broccoli with Hoisin Sauce Recipe- Gluten Free, Vegan, Easy | Penniless Parenting
hoisin sauce
Chrome will start protecting users from insecure downloads in April | Engadget
Make Oracle database simple again! - Blog dbi services
NVMe the afterburner for your database - Blog dbi services
What You Need to Know About BI Integration – Running Your Business
New strain of ransomware spreads via SYSVOL shares
LDAP Channel Binding: Change is coming 2nd half of 2020 | Born's Tech and Windows World
Google Online Security Blog: Protecting users from insecure downloads in Google Chrome
University of Maastricht Paid 30 Bitcoins to Ransomware Attackers - Security Boulevard
Chocolatey GUI as a front-end deployment and management option | ESX Virtualization
BurpSuite Tutorial for Beginners – Linux Hint
cdpwn - Millions of devices at risk due to flaws in implementations of Cisco Discovery Protocol (CDP)Security Affairs
M6 Group, largest France private multimedia group, hit by ransomwareSecurity Affairs
Winnti Group was planning a devastating supply-chain attack against Asian manufacturerSecurity Affairs
FBI warns of high-impact ransomware attacks on U.S. organizationsSecurity Affairs
Hospitals in Alabama and Australia have been hit with ransomware attacksSecurity Affairs
Wolcott school district suffered a second ransomware attack in 4 monthsSecurity Affairs
Everis and Spain's radio network Cadena SER hit by ransomwareSecurity Affairs
Ocala City in Florida lost $742,000 following BEC attackSecurity Affairs
Ransomware hit TrialWorks, law firms were not able to access court docsSecurity Affairs
Ransomware attack hit the City of Johannesburg municipalitySecurity Affairs
CERT Rating Maturity Evaluation Tool
CERTrating a new Tool to evaluate CERT/CSIRT maturity level.Security Affairs
0 = not available / undefined / unaware 1 = implicit (known/considered but not written down, “between the ears”) 2 = explicit, internal (written down but not formalised in any way) 3 = explicit, formalised on authority of CERT/CSIRT head (rubberstamped or published) 4 = explicit, audited on authority of governance levels above the CERT/CSIRT head (subject to control process/audit/enforcement)
Brooklyn Hospital lost patient records after a ransomware infectionSecurity Affairs
Ransomware attack impacted government services in territory of NunavutSecurity Affairs
National_Cyber_Security_Strategy.pdf
A Ransomware infected the network of the cybersecurity firm ProsegurSecurity Affairs
Livingston School District hit by a ransomware attackSecurity Affairs
French Rouen hospital hit by a ransomware attackSecurity Affairs
CTHoW v2.0 - Cyber Threat Hunting on Windows ...Security Affairs
CTHoW
Humans are Awesome/Terrible at Risk Management | Talks by csoandy
The NSA Warns of TLS Inspection - Schneier on Security
Technology and Policymakers - Schneier on Security
Expert found a hardcoded SSH Key in Fortinet SIEM appliancesSecurity Affairs
Mitsubishi Electric discloses data breach, media blame China-linked APTSecurity Affairs
Albany County Airport authority hit by a ransomware attack - Security AffairsSecurity Affairs
MITRE presents ATT&CK for ICS, a knowledge base for ICSSecurity Affairs
Medical info of 49,351 patients exposed in Alomere Health hospital breachSecurity Affairs
Japanese HappyHotel discloses a data breach .... ....Security Affairs
California IT service provider Synoptek pays ransom after Sodinokibi attackSecurity Affairs
Great Plains center hit by ransomware attack ... ... ...Security Affairs
Top cybersecurity predictions for 2020 ....................Security Affairs
1) Targeted ransomware attacks on the rise 2) Most nation-state attacks remain unattributed 3) IoT devices under attack 4) AI-based attacks, a nightmare for security experts 5) Compromised credentials and data breaches will continue to be a problem for organizations 6) ICS/SCADA systems are still too vulnerable 7) Supply chain attacks will grow slightly in frequency 8) Cybercrime-as-a-service — stronger than ever
Entercom Radio Network hit by a second cyber attack in a few monthsSecurity Affairs
Attackers Actively Targeting Flaw in Door-Access ...
How Enterprises Are Developing and Maintaining Secure Applications | Tech Library
Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light BulbsSecurity Affairs
Malware attack took down 600 computers at Volusia County Public LibrarySecurity Affairs
Foreign spies tantalize Japan's corporate warriors, trading tasty treats for technical tidbits - Japan Today
The 11 Best Cyber Security Books — Recommendations from the Experts - Hashed Out by The SSL Store™
1. Hacking: The Art of Exploitation (2nd Ed.) 2. The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data 3. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker 4. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography 5. Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World 6. Social Engineering: The Science of Human Hacking 7. Practical Malware Analysis 8. The CERT Guide to Insider Threats 9. The Cyber Effect 10. Hacking Exposed 7: Network Security Secrets and Solutions 11. Threat Modeling: Designing for Security
What Our Data Reveals About Security Debt - Security Boulevard
Tripwire Patch Priority Index for January 2020
MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up - Security Boulevard
Security admins checklist: 10 tasks to perform every year - TechRepublic
1. Update your company's policies 2. Update (or draft) an Incident Response Plan 3. Schedule maintenance calls with vendors 4. Review firewall rules 5. Assess internal security audits of systems 6. Perform directory server auditing and cleanup 7. Review security logs and alerts 8. Research new technologies and upgrade paths 9. Securing remote access technologies 10. Develop and conduct end-user training
ToolsWatch.org – The Hackers Arsenal Tools Portal » CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue)
CDPwn: Cisco Discovery Protocol Vulnerabilities Disclosed by Researchers
Setting up Active Directory via PowerShell - Microsoft Industry Blogs - United Kingdom
Malware Attack ‘Damages’ Patient Records - HealthcareInfoSecurity
Using the Shared Assessments SCA for Added Benefits—Even If You’re Already ISO 27001 Certified | Pivot Point Security
Think of Your vCISO as Your Security Blanket | Pivot Point Security
“In short your vCISO is all about peace of mind.”
Higher Education Faces a New Information Security Compliance Check | Pivot Point Security
Gramm-Leach-BlileyAct
The city of Racine was offline following a ransomware attack - Security AffairsSecurity Affairs
Toll Group shuts down some online systems after ransomware attackSecurity Affairs
Sudo CVE-2019-18634 flaw allows Non-Privileged Linux and macOS Users run commands as RootSecurity Affairs
Police are warning crooks are using cleaners to compromise businessesSecurity Affairs
Ransomware brought down services of popular TV search engine TVEyesSecurity Affairs
Rational Cybersecurity & CISO cybersecurity-business alignment guidance
How to check CPU microcode revision in ESXi | blog.erben.sk
VMware Snapshots: Powershell to clear allowed IP list and allow all IPs
powershell import csv foreach
Upping your PowerShell Scripting Game with Azure DevOps Pipelines
C-Level & Studying for the CISSP
Hackers Pose Increasing Risk to Medical Research Data
NIST Drafts Guidelines for Coping With Ransomware
TA505 APT Group Returns With New Techniques: Report
Growing Medical Device Sophistication Opens Security Issues
Data localization service receives HIPAA, SOC, PCI certifications
How to make your GDPR and CCPA data-management operational
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events | NCCoE
EKANS Ransomware Raises Industrial-Control Worries
8 of the 10 Most Exploited Bugs Last Year Involved ...
On the 2020 Congressional cybersecurity agenda: Critical infrastructure, copyright exemptions | CSO Online
20 most significant programming languages in history - anarcat
Python Logging with Datadog
Python for Beginners: Why Does Python Look the Way It Does?
Mid-Sized IT Innovation: Two Cities Chart Their Own Course
What freeware or open-source software packages are available to support GNSS performance evaluations? - Inside GNSS
Food Wishes Video Recipes: Chocolate Energy Bars – Looking Good…Maybe Too Good
Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge
Repology
Repology.org - A Package Search Engine for All GNU/Linux Users
Repology.org
The Meteoric Rise Of Fwupd+LVFS For Linux Firmware Updates - Phoronix
Tecmint's Guide to RedHat Ansible Automation Exam Preparation Guide
What is DNS and how does it work – Linux Hint
How to use nmap vulscan – Linux Hint
Cyber Security Mistakes You're Probably Making: Duncan McAlynn | Jupiter Extras 52 | Jupiter Broadcasting
The Powerful World of Debian Keyboard Shortcuts
Microsoft Outlook Keyboard Shortcuts | Alexander's Blog
2020-02: USBIP, Ask Us Anything | KWLUG - Kitchener-Waterloo Linux User Group
9 'diff' Command Examples in Linux
(A few) Ops Lessons We All Learn The Hard Way
New Sudo Vulnerability Could Allow Attackers to Obtain Full Root Privileges - 9to5Linux
Learn Python List Data Structure - Part 1
Shadow IoT: A Fine Kettle Of Fish | OPSWAT
9 CCPA questions every CISO should be prepared to answer | CSO Online
Erman Arslan's Oracle Blog: Oracle Linux / An Important Part of the Red Stack ! - Support Subscription Types - Clear and Simple
Security in the financial industry | TechRadar
Iowa Caucus results delayed, link to mobile app problems is unclear (updated) | Engadget
Integrating Pi-hole Logs in ELK with Logstash
Integrating Pi-hole Logs in ELK with Logstash
More on DNS Archeology (with PowerShell)
A Round-up of Data Breaches in January 2020 - Security Boulevard
Chris's Wiki :: blog/solaris/ZFSHowWeGrowPools
Assessment Frameworks for NIS Directive Compliance
Cyberattacks Are Changing: Here’s How - Security Boulevard
Connecting Your Legacy WAN to Cloud is Harder than You Think « ipSpace.net blog
Which Car Models Do Owners Keep Forever? — My Money Blog
Inside Lockheed Martin’s New Facility for Simulating Space Wars - VICE
Google launches open-source security key project, OpenSK – Naked Security
Other projects somu solo solo hacker
Regus spills data of 900 staff on Trello board set to ‘public’ – Naked Security
IT exec sets up fake biz to scam his employer out of $6m – Naked Security
Happy Birthday, CVE! – Naked Security
Linux maintainer: Patching side-channel flaws is killing performance – Naked Security
Report: Use of AI surveillance is growing around the world – Naked Security
7 types of virus – a short glossary of contemporary cyberbadness – Naked Security
KEYLOGGERS DATA STEALERS RAM SCRAPERS BOTS, aka ZOMBIES BANKING TROJANS RATS (Remote Access Trojans) RANSOMWARE
5 tips to avoid spear-phishing attacks – Naked Security
Tips for you 1. DON’T BE SWAYED JUST BECAUSE A CORRESPONDENT SEEMS TO KNOW A LOT ABOUT YOU 2. DON’T RUSH TO SEND OUT DATA JUST BECAUSE THE OTHER PERSON TELLS YOU IT’S URGENT 3. DON’T RELY ON DETAILS PROVIDED BY THE SENDER WHEN YOU CHECK UP ON THEM 4. DON’T FOLLOW INSTRUCTIONS ON HOW TO VIEW AN EMAIL THAT APPEAR INSIDE THE EMAIL ITSELF 5. DON’T BE AFRAID TO GET A SECOND OPINION Tips for IT 1. DO SET UP A SINGLE POINT OF CONTACT FOR STAFF TO REPORT CYBERSECURITY ISSUES 2. DO MAKE CYBERSECURITY A TWO-WAY STREET – LISTEN TO YOUR USERS! 3. DO CONSIDER PHISHING SIMULATIONS
Snake alert! This ransomware is not a game… – Naked Security
Looking for silver linings in the CVE-2020-0601 crypto vulnerability – Naked Security
Duo: Migrate from LDAP to LDAPS | PeteNetLive
The Top 5 Threats to Your IT Infrastructure - JumpCloud
Azure Governance | Tallan Blog
Stop Washing Your Car with Water - YouTube
The Death Of Surplus | Hackaday
Super Bowl Sunday is a big day for a Portland professor -- because he’s a palindrome expert - oregonlive.com
Palindrome Day: Why A Day Like Sunday Hasn't Been Seen In 900 Years : NPR
Climate Change Could Erase Human History. These Archivists Are Trying to Save It - VICE
This Company Built a Private Surveillance Network. We Tracked Someone With It - VICE
'Pwnagotchi' Is the Open Source Handheld That Eats Wi-Fi Handshakes - VICE
Pwnagotchi
U.S. Military Could Collapse Within 20 Years Due to Climate Change, Report Commissioned By Pentagon Says - VICE
Inside the U.S. Cyber Army - VICE
Simple guide to install JUPYTER NOTEBOOK on Linux - The Linux GURUS
Heartbleed Discovery and Exploit – ls /blog
I, Cringely My first two predictions for 2020 - IBM and Trump - I, Cringely
How to gather information from Instagram with Instaloader python tool - Hacker Milk
Restoring a thrashed Plextor PX-40TSi SCSI CD-ROM Drive | Matt's Tech Pages
Bad, Good, and Super-Cringey Infosec Lab Environments – tisiphone.net
Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D | FireEye Inc
DVNA - Damn Vulnerable NodeJS Application
Here's the Pentagon's Terrifying Plan for Cyborg Supersoldiers - VICE
Building a Linux Desktop for Cloud Native Development
The Internet’s First Hit File Format Wasn’t the MP3. It Was MIDI - VICE
This Website Has Solved Cybersecurity - VICE
T-Mobile's John Legere Was Never a 'Cool CEO' - VICE
UN hacked via unpatched SharePoint server – Naked Security
Open-Source Medical Devices Hack Chat | Hackaday
Is TLS Fast Yet?
Espanso is an open source text expander for Windows, Mac and Linux - gHacks Tech News
The best bag and cable organizers | Engadget
Two Vulnerabilities Found in Microsoft Azure ...
How To Keep Your Privacy and Data Secure While Working With a Remote Team | Network Computing
What's Actually on the Dark Web - VICE
Archivists Are Saving the History of Internet Piracy - VICE
Why Security and Legal Need to Work Together - Blog | Tenable®
What You Need to Know About The New Capabilities for Tenable.sc - Blog | Tenable®
Configuring AWS Linux Servers With LDAP - Security Boulevard
Adding Dynamic Updates to Windows 10 In-Place Upgrade Media During Offline Servicing - A Square Dozen
Add Dynamic Updates to Windows 10 Media | Born's Tech and Windows World
Explanations of a high-level concept in five different layers of complexity (Gurteen Knowledge)
How To STIG a Database System - Microsoft Tech Community - 383732
What's a STIG? - Microsoft Tech Community - 383566
Most antivirus companies will continue to support Windows 7
How to upgrade from Windows 7 to Ubuntu – Hardware and software considerations | Ubuntu
Book Freak #45: How to Not Spoil Your Kids | Cool Tools
"Leading to Learning," Part 5: Advice for Learners | Don Jones®
"Leading to Learning," Part 4: Advice for Leaders | Don Jones®
How to authenticate Python interactively to Microsoft Azure – MCP for life
Arlo Video Doorbell [Review]
New Perspectives On The Three Horizons Model - krypted
Why AWS and Azure Benchmarks Don't Matter to Me - Thomas LaRock
Useful links on EC2\FSX with new features | Techbrainblog
Happy 10th Birthday, Azure! - The things that are better left unspoken
Generating Strong Random Password with PowerShell | Windows OS Hub
The Dark Web Has Nothing on Data Brokers | Daniel Miessler
KVM Virtualization Adds Protections For Spectre-V1/L1TF Combination Attack - Phoronix
Vulnerability Management: A Fundamental First Step to Improve Cyber Hygiene and Reduce Cyber Risk - Blog | Tenable®
Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM)
RiskAssessmentFramework - Static Application Security Testing
RiskAssessmentFramework
MassDNS - A High-Performance DNS Stub Resolver For Bulk Lookups And Reconnaissance (Subdomain Enumeration)
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack « Null Byte :: WonderHowTo
Free Physical and Virtual Machine (VM) converter utilities you have to keep | ESX Virtualization
How to Choose the Right Vulnerability Management Solution - Blog | Tenable®
How to Audit Microsoft Azure with Tenable Solutions - Blog | Tenable®
Windows 7 End of Support: What Does It Mean for Your Organizations?
What is Transport Layer Security (TLS)? Strengths and Vulnerabilities Explained
DHS issues cybersecurity warning to businesses
The report found malware continues to be the most frequent — and, in many instances, the most costly — type of cyberattack facing organizations, and the total “number of organizations experiencing ransomware attacks increased by 15% over one year and have more than tripled in frequency over two years.” The report also noted 85% of organizations are subject to phishing and social engineering attacks from malicious actors For example, the alert identifies the following cyber activities attributed to Iran: A distributed-denial-of-service attack targeted the U.S. financial sector between 2011 and 2013, which resulted in the Department of Justice indicting seven Iranians. A cyber operation against the IT systems of the Bowman Dam in New York led to the unauthorized access to information regarding the status and operation of the dam. This resulted in the March 2016 indictment of an Iranian actor “performing work on behalf of the (Islamic Revolutionary Guard Corps).” A cyberattack at the Sands Las Vegas Corporation involved the theft of customer data and sensitive personal information (e.g., credit card data, Social Security numbers and driver’s license numbers). A cyber theft campaign between 2013 and 2017 that targeted certain academic and intellectual property data. In 2018, the DOJ indicted nine Iranian actors associated with these cyber operations.
The Cybersecurity Stories We Were Jealous of in 2019 - VICE
Why Are Résumés Still a Thing? - VICE
Disk Cleanup on Windows Server 2019, Server Core Edition - The Tech Journal
Risks, Issues, Benefits Of Tactically Automating Twitter Case Study - EvilTester.com
Embracing a Prevention Mindset to Protect Critical ...
Lightmeter will soon help you tune up your email server | ZDNet
10 Best Free Unified Modeling Language Tools - LinuxLinks
Erman Arslan's Oracle Blog: Oracle Linux / Linux for Oracle Database / Why?
Hackers were paid ransom after attack on Canadian insurance firm, court documents reveal | CBC News
NBlog - the NoticeBored blog: NBlog Nov 28 - risks, dynamics and strategies
NBlog - the NoticeBored blog: NBlog Nov 26 - 7 ways to improve security awareness & training
NBlog - the NoticeBored blog: NBlog Nov 22 - who owns compliance?
NBlog - the NoticeBored blog: NBlog November - privacy awareness update
NBlog - the NoticeBored blog: NBlog Oct 6 - a dozen infosec strategies (amended x2)
NBlog - the NoticeBored blog: NBlog Sept 26 - audit strategies
Changing the Monolith—Part 3: What’s your process?
NBlog - the NoticeBored blog: NBlog Dec 3 - infosec driving principles
Governance involves structuring, positioning, setting things up and guiding the organization in the right overall direction - determining then plotting the optimal route to the ship's ultimate destination, loading up with the right tools, people and provisions. Corporate governance necessarily involves putting things in place for both protecting and exploiting information, a vital and valuable yet vulnerable business asset; Information is subject to risks that can and probably should be managed proactively, just as a ship's captain doesn't merely accept the inclement weather and various other hazards but, where appropriate, actively mitigates or avoids them, dynamically reacting and adjusting course as things change; Flexibility and responsiveness, along with resilience and robustness, present more options, opportunities to make the best of whatever situations occur, including novel hazards that weren't anticipated. If the Titanic's captain hadn't been steaming quite so fast through icy seas at night, or had thought further ahead, or was at the helm of a more nimble vessel, maybe he could have turned hard enough to avoid the iceberg that ripped open the hull of his supposedly unsinkable and apparently difficult to steer ship; Making the best of available resources implies a blend of knowledge and skills, particularly in leadership and motivation of people: people remain central to information risk and security management. Even as technology grows in importance within information security, it's more tool than device. In the hands of a master mariner, a sextant becomes a valuable instrument rather than an ornament; Assurance is a valuable product of oversight, monitoring, testing, reviewing and auditing activities, allowing management as well as third parties to have faith in the information risk and security management arrangements. The extent and quality of assurance activities correlates strongly with an organization's capabilities and maturity, largely because assurance supports the need for improvements and demonstrates progress. That seaworthiness certificate isn't just a ticket to leave port: it gives confidence that things are in order down below.
Data privacy is about more than compliance—it’s about being a good world citizen
New privacy assessments now included in Microsoft Compliance Score
NBlog - the NoticeBored blog: NBlog February - just-in-time security awareness
NBlog - the NoticeBored blog: NBlog Dec 23 - how many ISO MSSs are there?
NBlog - the NoticeBored blog: NBlog Dec 20 - ISO27k maturity metric
NBlog - the NoticeBored blog: NBlog Dec 12 - a universal KPI
Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure
How companies can prepare for a heightened threat environment
Changing the monolith—Part 2: Whose support do you need? - Microsoft Security
GitHub - microsoft/ApplicationInspector: A source code analyzer built for surfacing features of interest and other characteristics to answer the question 'what's in it' using static analysis with a json based rules engine. Ideal for scanning components before use or detecting feature level changes.
Introducing Microsoft Application Inspector
Changing the monolith—Part 1: Building alliances for a secure culture - Microsoft Security
Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks - Microsoft Security
Improve cyber supply chain risk management with Microsoft Azure
Zero Trust strategy—what good looks like
Microsoft Cloud Security solutions provide comprehensive cross-cloud protection - Microsoft Security
Thinking about the balance between compliance and security
Improve security with a Zero Trust access model
Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise - Microsoft Security
Guarding against supply chain attacks—Part 1: The big picture
Cyber-risk assessments—the solution for companies in the Fourth Industrial Revolution
How to find a stud in the wall - The Silicon Underground
What is WD-40 used for? - The Silicon Underground
The Hidden Cost of Ransomware: Wholesale Password Theft — Krebs on Security
Grouper2 - Find Vulnerabilities In AD Group Policy
Microsoft’s 4 principles for an effective security operations center
1. It starts with assessment. 2. Invest in the right technology. 3. Hire a diverse group of people. 4. Foster an innovative culture.
Patching as a social responsibility
TLS version enforcement capabilities now available per certificate binding on Windows Server 2019
Are students prepared for real-world cyber curveballs?
Foundations of Flow—secure and compliant automation, part 2
Foundations of Microsoft Flow—secure and compliant automation, part 1
NBlog - the NoticeBored blog: NBlog January - ISO27k awareness & training materials
S3Enum - Fast Amazon S3 Bucket Enumeration Tool For Pentesters
CredNinja - A Multithreaded Tool Designed To Identify If Credentials Are Valid, Invalid, Or Local Admin Valid Credentials Within A Network At-Scale Via SMB, Plus Now With A User Hunter
CredNinja
Verifying your .gitignore is working correctly -- Prefetch Technologies
97% of airports showing signs of weak cybersecurity
The NHS has suffered only six ransomware attacks since WannaCry
SEC Shares Cybersecurity and Resiliency Observations
Backing up your route53 zone configuration with the aws CLI -- Prefetch Technologies
DeployHappiness | Setting Up A Scheduled Task Server and Automatic Tasks
DSHR's Blog: Library of Congress Storage Architecture Meeting
"Leading to Learning," Part 3: Characteristics of Success | Don Jones®
"Leading to Learning," Part 2: the Problems We Face | Don Jones®
Better Event Logs with PowerShell • The Lonely Administrator
Front-End Performance Checklist 2020 [PDF, Apple Pages, MS Word] — Smashing Magazine
Creating Linked HTML with PowerShell • The Lonely Administrator
How to power ANYTHING using USB-C Power Delivery
GitHub - google/OpenSK: OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
How emerging privacy laws are impacting the health care industry
PEPR '20 | USENIX
Avoid heavy AI regulation, White House tells EU – EURACTIV.com
Ryuk and Sodinokibi Surge as Ransom Payments Double
A billion medical images are exposed online, as doctors ignore warnings | TechCrunch
Dozens of companies have data dumped online by ransomware ring seeking leverage | Ars Technica
Anyone with a camera and $5 can now have a license plate reader | Engadget
Google Online Security Blog: Say hello to OpenSK: a fully open-source security key implementation
This month's Windows and Office security patches: Bugs and solutions | Computerworld
AVAST: Jumpshot will be closed after privacy scandal | Born's Tech and Windows World
Windows 10 V1909 and a possible GPO Issue – Part 2 | Born's Tech and Windows World
Windows 10 V1909 and a possible GPO Issue | Born's Tech and Windows World
Useful tools for AWS cloud security | Born's Tech and Windows World
The History Of Computing: Iran and Stuxnet - krypted
Celestron FirstScope | Cool Tools
Why Work From Home? There are Many Benefits, But Also Pitfalls
What is Big Data? – Marksei
What is Data Science? – Marksei
Zero Day Initiative — Looking Back at the Zero Day Initiative in 2019
The Potential Cyberwar Between Iran and the U.S. | Security Gladiators
The dark side of expertise [LWN.net]
A New Decade and New Cybersecurity Orders at the FTC - Lawfare
The Cyberlaw Podcast: Is CCPA short for 'Law of Unintended Consequences'? - Lawfare
Key Global Takeaways From India's Revised Personal Data Protection Bill - Lawfare
Avast's Free Antivirus Tracks Your Browsing Activity & Sells It For Millions
You're Responsible for Resiliency of Your Public Cloud Deployment « ipSpace.net blog
Using LVM cache for storage tiering - Luc de Louw's Blog
LibreRouter is an Open-Source Hardware Router for Community Networks
Ransomware Linked to Iran, Targets Industrial Controls - Bloomberg
Duo CEO Dug Song: We have to make security simple
Cloud is starting to smell a lot like legacy tech - Cloud - Services - Software - CRN Australia
The 2018 Linux AMI was given an end-of-support date of 30 June, 2020, together with an explanation that moving on was a good idea because the OS wouldn’t be able to support nice new things in EC2. But earlier this week AWS announced an extension of support until 31 December, 2020 and “a new maintenance support period that extends to June 30, 2023.” The reason? “Customer feedback”.
Master Infrastructure-as-Code and Immutable Infrastructure Principles « ipSpace.net blog
USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? - YouTube
[FoR&AI] Machine Learning Explained – Rodney Brooks
Migrating Oracle Exadata Workloads to Azure
ORACHKSUM v20.01 is out! - DBA - Rodrigo Jorge - Oracle Tips and Guides
Dissecting 200114 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
Video : Decoupling to Improve Performance | The ORACLE-BASE Blog
Structuring Content : Think Pyramid! | The ORACLE-BASE Blog
Patching all my environments with the January 2020 Patch Bundles
The Trends in IT Security, As You See It
Four GDPR fines every business can learn from - VinciWorks Blog
Why DPOs and CISOs Must Work Closely Together
China-Based Cyber Espionage Group Reportedly Behind ...
Forensics Investigation of Ping Command
HCL Domino V11 – Directory Synchronzation – Part 7 | eknori.de
What You Should Actually Learn From a Pentest Report - Black Hills Information Security
Dumping Firmware With the CH341a Programmer - Black Hills Information Security
Fugue open sources Regula, security and compliance tool for Terraform
Odoo in a root-less container | Soliloquies
Octarine Open Sources New Security Scanning Tools - TFiR: Open Source & Emerging Technologies
BlueTooth Security Risks – Linux Hint
Convenience over security: Mobile healthcare apps open up fresh risks to patients’ data | The Daily Swig
distri: 20x faster initramfs (initrd) from scratch
Deploying OpenSCAP on Satellite using Ansible
How much does ISO 27001 Certification Cost? | Pivot Point Security
Files on web servers Part I: History Files | Sebastian Neef - 0day.work
ToolsWatch.org – The Hackers Arsenal Tools Portal » Top 5 Critical CVEs Vulnerability from 2019 That Every CISO Must Patch Before He Gets Fired !
Building containers without Docker
Terraform 0.12 – Module for creating Azure virtual machine | geekdudes
Azure Storage tips | James Serra's Blog
Get HP Driver Pack Info with PowerShell – Web Scraping Method – smsagent
Under The Stairs: Planet PowerShell - A New PowerShell Resource
Azure Cloud Solution Architects Podcast 11 - Azure Hybrid using Stack & Arc - Thomas Maurer
How to Create Great Tech Demos and Presentations - Thomas Maurer
Use Azure Security Center with Windows Server on-premises - Thomas Maurer
Active Directory, AD FS and Azure AD in terms of Data Privacy - The things that are better left unspoken
OTA digital TV notes | Nelson's log
5 Critical Elements for a Successful Cloud Native Transformation | APMdigest - Application Performance Management
How AI Will Evolve for IT in 2020 - Part 2 | APMdigest - Application Performance Management
How AI Will Evolve for IT in 2020 - Part 1 | APMdigest - Application Performance Management
Docker Health Checks – Stuff I'm Up To
Chris's Wiki :: blog/solaris/ZFSDVAFormatAndGrowth
Chris's Wiki :: blog/solaris/ZFSWhyNoRealReshaping
Evolving Threat series — Insider Attacks case studies (Part 2)
Evolving Threat series — Mining patterns to assess Insider Attacks (Part 3)
Evolving Threat series— Understanding Insider Attacks (Part 1)
UN hacked in 2019, tried to keep it secret | Born's Tech and Windows World
Detect insecure LDAP bindings before March 2020 | Born's Tech and Windows World
Get Ready for LDAPS Channel Binding | PeteNetLive
MIDI 2.0 overhauls the music interface for the first time in 35 years | Engadget
.NET Freelancing: How To Get Started – Online Businesses
Exploiting the Windows CryptoAPI Vulnerability | Trail of Bits Blog
Whose Curve Is It Anyway
Modernizing Red Hat Enterprise Linux System management the easy way
Looking At The Linux Performance Two Years After Spectre / Meltdown Mitigations - Phoronix
the geometric mean of the E3-1280 v5 was at 77% performance out-of-the-box compared to no mitigations, the Xeon E3-1275 v6 at 79% compared to no mitigations, and then the Xeon Platinum 8280 Cascade Lake came in at 95% thanks to its hardware mitigations in the various server-focused benchmarks ran that are impacted by these kernel mitigations.
3 Privacy & Security Focused Linux Distributions to Try in 2020 - Putorius
Tails OS – Privacy for Anyone Anywhere Whonix – Stay Anonymous Qubes OS – A Reasonably Secure Operating System
GDPR has led to $126 million in fines over data privacy | Engadget
HCL Domino V11 – Directory Synchronzation – Part 6 | eknori.de
HCL Domino V11 – Directory Synchronzation – Part 5 | eknori.de
HCL Domino V11 – Directory Synchronzation – Part 4 | eknori.de
Avoid That Billion-Dollar Fine: Blurring the Lines ...
FTCode Ransomware Now Steals Saved Login Credentials
FTCODE Ransomware — New Version Includes Stealing Capabilities | Zscaler
FTCODE
Elaborate Honeypot 'Factory' Network Hit with ...
Supply Chain Cyber Security: What Are the Risks?
Misadventures in AWS
Build a 10 USD Raspberry Pi Tunnel Gateway
AWS Backup: EC2 Instances, EFS Single File Restore, and Cross-Region Backup | AWS News Blog
Update – datastore corruption issue with XCOPY – Dell EMC PowerMax with VMware
WhiteCanyon VP Nathan Jones walks me through a live demo of WipeDrive using a VMware ESXi 6.7 VM in TinkerTry's home lab! | TinkerTry IT @ Home
Changing date time zones using PowerShell – Virtually Sober
What to do after patching CVE-2020-0601 | >_
When / why / how to use paravirtualized adapters – Notes from MWhite
Hackers are closing the Shitrix security hole to keep everyone out of Citrix servers apart from themselves
Albany Airport Pays Off Sodinokibi Ransomware Gang: Report
Aaia - AWS Identity And Access Management Visualizer And Anomaly Finder
Bluewall - A Firewall Framework Designed For Offensive And Defensive Cyber Professionals
Lsassy - Extract Credentials From Lsass Remotely
Andriller - Software Utility With A Collection Of Forensic Tools For Smartphones
LAVA - Large-scale Automated Vulnerability Addition
CHAPS - Configuration Hardening Assessment PowerShell Script
Karonte - A Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware
Karonte
TuxResponse - Linux Incident Response
RFCpwn - An Enumeration And Exploitation Toolkit Using RFC Calls To SAP
Multiscanner - Modular File Scanning/Analysis Framework
Tishna - Complete Automated Pentest Framework For Servers, Application Layer To Web Security
Accomplishing SOC 2 Type II in the Cloud-Native Kubernetes Era
11 cyber security predictions for 2020 - IT Governance UK Blog
1. Cyber criminals will take advantage of incorrectly patched machines for known vulnerabilities. 2. Attacks involving the IoT will continue. 3. Critical infrastructure and home technology will be targeted. 4. Ransomware will continue to increase. 5. Open banking will be targeted. 6. Deep fake technology will be used in social engineering attacks. 7. Business email compromise attacks will increase. 8. Payment card thefts will rise. 9. Cyber criminals will continue to use blockchain technology for transactions. 10. Low-level attacks aren’t going anywhere. 11. Weak passwords will continue to be exploited as attackers monetise credentials.
The Importance of Setting Patching Priorities
Mark Johnson
Introduction to OSINT Video – We are OSINTCurio.us
New Standards Set to Reshape Future of Email Security
DMARC 2.0 BIMI AMP for Email Schema.org for Email STARTTLS and MTA-STS
What Tools Will Find Misconfigurations in My AWS S3 ...
S3-inspector S3Scanner Bucket Finder
BBP: My Path to the CISO Chair - The Ethical Hacker Network
How to Break into Router Gateways with Patator « Null Byte :: WonderHowTo
How to Automate Brute-Force Attacks for Nmap Scans « Null Byte :: WonderHowTo
How to Hack Apache Tomcat via Malicious WAR File Upload « Null Byte :: WonderHowTo
Xaxxon OpenLidar Install – JerryGamblin.com
Zero Day Initiative — Reliably Finding and Exploiting ICS/SCADA Bugs
What Does Being Data-Centric Actually Look Like?
1. Re-Think Your Organizational Structure 2. Empowering the Right People 3. Process Not Event 4. Security and Responsibility
Pentesting with a Raspberry Pi! - The Ethical Hacker Network
Tshark: 7 Tips on Wireshark’s Command-Line Packet Capture Tool - The Ethical Hacker Network
Ten Questions—And Answers—About the California Consumer Privacy Act | Electronic Frontier Foundation
Forensic Investigation of Social Networking Evidence using IEF
SECURITY ALERT: Microsoft releases critical security updates to fix major vulnerabilities
Pwning your (web)server and network the easy way - or why exposing ~/.ssh/ is a bad idea | Sebastian Neef - 0day.work
Even The Greatest Jeopardy Contestants of All Time Struggle with Cybersecurity | Pivot Point Security
200 Points = This type of hacker referred to by a colorful bit of headwear helpfully tests computer systems for vulnerability. What is, White Hat 400 Points = A website with a site certificate is one that uses encryption; this letter after http is one sign of it. What is, S 600 Points = Companies consider cybersecurity when instructing employees with a policy on BYOD, short for this. What is, Bring Your Own Device 800 Points = A ransomware attack that encrypted 3,800 city of Atlanta computers demanded 6 of these digital items to unfreeze them. What is, Bitcoins 1000 Points = Beware of these types of programs that track every stroke you make while typing in an effort to glean your password. What is, Keylogging
2020: The Vulnerability Fujiwhara Effect – Oracle and Microsoft Collide – RBS
January 14th, 2020 April 14th, 2020 July 14th, 2020 Confirmed Microsoft Oracle Adobe SAP Siemens Schneider Electric Potential Google Apple Mozilla Intel Cisco F5 Juniper
Accenture to Buy Symantec's Cyber Security Services
5 Tips on How to Build a Strong Security Metrics ...
Tip 1: Know your audience. Tip 2: Aggregate:Group,Area,Key risk. Tip 3: Map to controls. Tip 4: Designate acceptable values and objective ranges. Tip 5: Measure and report regularly.
7 Free Tools for Better Visibility Into Your Network
Zabbix Spiceworks Nagios Core Cacti Zenmap/Nmap Wireshark
These Open Source Habits Could Make Your Career
The 15 Things To Know Before Using Kali Linux in 2020
Active Directory Needs an Update: Here's Why
How to Keep Security on Life Support After Software ...
Buy Extended Support Isolate It From the Network Limit User Access Watch for 'Out-of-Band' Fixes
6 Unique InfoSec Metrics CISOs Should Track in 2020
Security Team Proficiency Security Team Satisfaction Support of the Business Mission Perceived Privileged Users Versus Actual Privileged Users Potential Cost of Security Incident Return on Investment Focus areas include data showing our Cyber Insurance levels, external internet risk scores, the executive summary of our annual third-party risk assessment, with agreed-upon mitigation/remediation activity, and our security program coverage map broken out by CSF categories of: Identify or (Visibility), Protection, Detection, Response and Recover.
7 Ways to Get the Most Out of a Penetration Test ...
Develop targeted goals for the engagement. Ask for a report that's geared for the business team. Have the pen tester tell you what you're doing right. Solicit input from the developers. Set up an annual pen test - at the least. Ask for detailed reports for the tech staff. Get the pen testers to go beyond the obvious.
ADP Users Hit with Phishing Scam Ahead of Tax Season
Containers, networks, security, and more Ansible news | Opensource.com
Dbvisit 9: Adding datafiles and or tempfiles - Blog dbi services
What’s new with Oracle database 18.8 versus 18.9 | Frits Hoogland Weblog
What’s new with Oracle database 19.6 versus 19.5 | Frits Hoogland Weblog
What is mitmproxy? A tool to inspect TLS-encrypted traffic | CSO Online
2020 outlook for cybersecurity legislation | CSO Online
3 ways to make your Windows network harder to attack | CSO Online
Vulnerability management requires good people and patching skills | CSO Online
8 Cybersecurity Risks in Android’s VoIP Components
Celebrating 20 years of enterprise Java
File carving tools – Linux Hint
Email Header Analysis – Linux Hint
What is Kanban and How to use Kanban in Linux - Real Linux User
https://my-personal-kanban.appspot.com/
The Difference Between Business Intelligence, Reporting, Metrics, and Analytics | Daniel Miessler
Microsoft Announces An Open-Source, Free Source Code Analyzer Tool
FSM - Hacker stole over 10,000 hospital files
OpenStack Security and Compliance for Telco - YouTube
Solaar | Application for Logitech Unifying Receivers and Devices on openSUSE – CubicleNate's Techpad
Solaar
Quick Dive into Selenium with python | Codementor
"Microservices require a high-level vision to shape the direction of the system in the long term," says Jaime Buelta | Packt Hub
Turns Out Oracle Copied Amazon's S3 APIs; When Confronted, Pretends That's Different (Spoiler Alert: It's Not) | Techdirt
What is Azure Active Directory? – Active Directory Security
HCL Domino V11 – Directory Synchronzation – Part 3 | eknori.de
HCL Domino V11 – Directory Synchronzation – Part 2 | eknori.de
HCL Domino V11 – Directory Synchronzation – Part 1 | eknori.de
Big Microsoft day: EOL for Win7, Win2008 and crypt32.dll | Alexander V. Leonov
Bill Sempf | Application Security This Week for January 19
Bill Sempf | Application Security This Week for January 12
Sodinokibi Ransomware Publishes Stolen Data For Unpaid Ransom Demands
My 5 favorite Linux sysadmin tools | Enable Sysadmin
20 years of FAI and a new release
Live Forensics Tools – Linux Hint
Announcing Oracle Linux 7 Update 8 Beta Release | Oracle Linux Blog
Thirteen Useful Tools for Working with Text on the Command Line - Make Tech Easier
Ghosn's Japan lawyer: Questioning averaged 7 hours a day - Japan Today
6 requirements of cloud-native software | Opensource.com
Runtimes: They are more likely to be written in the container-first or/and Kubernetes-native language, which means runtimes such as Java, Node.js, Go, Python, and Ruby. Security: When deploying and maintaining applications in a multi-cloud or hybrid cloud application environment, security is of utmost importance and should be part of the environment. Observability: Use tools such as Prometheus, Grafana, and Kiali that can enhance observability by providing realtime metrics and more information about how applications are being used and behave in the cloud. Efficiency: Focus on a tiny memory footprint, small artifact size, and fast boot time to make applications portable across hybrid/multi-cloud platforms. Interoperability: Integrate cloud-native apps with open source technologies that enable you to meet the requirements listed above, including Infinispan, MicroProfile, Hibernate, Kafka, Jaeger, Prometheus, and more, for building standard runtime architectures. DevOps/DevSecOps: These methodologies are designed for continuous deployment to production, in-line with the minimum viable product (MVP) and with security as part of the tooling.
11 top open-source API testing tools: What your team needs to know | TechBeacon
The year of encryption is upon us
Configuring HDD to spin down in Linux via SMART - Lukáš Zapletal
cat >/etc/udev/rules.d/69-hdparm.rules <<EOF ACTION=="add|change", KERNEL=="sd[a-z]", ATTR{queue/rotational}=="1", RUN+="/usr/sbin/smartctl --set apm,128 --set lookahead,on --set wcache,on --set standby,241 /dev/%k" EOF
How to setup multiple monitors in sway - Fedora Magazine
Encryption: An Essential Yet Highly Controversial Component of Digital Security Features
How to Get Total Inodes of Root Partition
sudo du --inode /
Make Debian a Wireless Access Point
How to Detect and Clean Up Hard Disk Storage with QDirStat in Linux - Make Tech Easier
QDirStat
How to Change/Spoof a MAC Address in Debian 10
Decyphering the OSI model of networking: 7 layers of bean dip | Enable Sysadmin
Physical Data Network Transport Session Presentation Application
Odoo Raises $90M To Advance Open Source ERP - Enterprise Apps Today
4 lessons for sysadmins from The Unicorn Project | Enable Sysadmin
Repeatability and consistency Creating a culture of learning Avoiding the lone wolf sysadmin Working harder not smarter with automation
2020-01: SSL Web Certificates | KWLUG - Kitchener-Waterloo Linux User Group
2020-01: SSL Web Certificates, Dhall | KWLUG - Kitchener-Waterloo Linux User Group
7 questions sysadmins should ask a potential employer before taking a job | Enable Sysadmin
How many sysadmins will work alongside me for day-to-day operations? What’s the ratio of devices, users, and customers to sysadmins? How are the systems managed currently for patching, enterprise mobility, SIEM, and ITAM? What is considered an average downtime? What are the data backup procedures and the formats, and how often are backups tested? What is the purchasing procedure for hardware and software? Is there an existing plan for recycling hardware and how often is it done?
FFmpeg: How To Crop Videos, With Examples - Linux Uprising Blog
How to monitor file integrity on Linux using Osquery - LinuxConfig.org
SSHFS: Mounting a remote file system over SSH | Enable Sysadmin
conrad - conferences and meetups on your terminal - LinuxLinks
Bash-it - Bash Framework to Control Your Scripts and Aliases
How to use the screen command on Linux to keep your remote task running when the connection drops
A Brief History of Open Source Software, Part 3: The FOSS Environment Today | ConsortiumInfo.org
Falco is the First Runtime Security Project to Join the CNCF Incubator
Red Hat DevSecOps Strategy Centers on Quay - Container Journal
Quay
IBM Research open-sources SysFlow to tackle cloud threats - SiliconANGLE
SysFlow
Beware of security debt in your software | ITWeb
Council Post: Three Ways To Bridge The Cybersecurity Talent Gap
1. Create A Compelling Environment An employee will stay as long as they can at a job they truly care about, even if the pay isn’t ideal. 2. Connect With Open Source There are so many profound benefits to utilizing open source software, but one of the most significant is connecting to a community that cares about their work, especially when employed talent is more difficult to come by. 3. Specialize Your Benefits If you can free them from that commute by offering remote work options, you’ve given them four hours a day that they can rest, be more productive, be with their family, and generally raise their quality of life. If you’re a startup with less to offer in the way of salaries, can you offer more stock options? This gives your team ownership in what they’re working on. That opportunity for growth can often be even more appealing than a higher income. What kind of PTO can you offer, while still keeping productivity competitive? Can you offer four-day workweeks?
Reachy open source robot - Geeky Gadgets
Home - Rhasspy
Remembering Brad Childs - Kubernetes
TikTok Riddled With Security Flaws | Threatpost
New SHA-1 Attack - Schneier on Security
Best Linux Distributions for DevOps - LinuxTechLab
scandir-rs
5 questions to ask before choosing a public cloud provider
As businesses iron out their cloud strategies—and consider when and where to use a public cloud – here are some of the key questions to ask. 1. What makes up the cloud infrastructure stack? Be sure to ask potential service providers what comprises the infrastructure software that they use. For example, do the provider’s operating systems have the proven reliability, security, and performance of the operating systems you run in your data centers? 2. Will my IT staff need any new training? Are there notable differences in the operating system (OS), middleware, or container orchestration technologies offered from the cloud provider that will require retraining of your IT staff? 3. Who is in your partner ecosystem? This may be one of the most important questions to ask, especially since the answer is intertwined with questions one and two above. If a potential cloud provider is already partnering with vendors you use in-house, there may be an opportunity for a fair amount of consistency between their infrastructure and yours. To that end, Red Hat has hundreds of certified cloud and service providers in its partner ecosystem, along with Red Hat OpenShift, a comprehensive container application platform built on Kubernetes that lets users run apps in any environment on any cloud, and Red Hat Enterprise Linux, the most deployed commercial Linux distribution for public clouds. 4. Does your provider offer the services you need? Cloud providers have a menu of services that may include Kubernetes, serverless computing, databases, artificial intelligence, machine learning, etc., but the choices only matter if they offer the services you need. Be sure to ask for details about all their services, and map those to your current and near-term plans. And don’t forget to ask about their roadmap to see if it dovetails with yours. 5. What security do you have in place? Ask the provider for a full review of all the security plans, systems, and certifications they have. For example, how do they secure the hardware, and how do they encrypt data, both in transit and at rest? Also, find out if they offer any monitoring functions, and what their policies are regarding security breaches.
AWS announces AutoGluon, an open-source library for writing AI models - SiliconANGLE
OpenWrt Project: Backup and restore
How to power a music server with Armbian | Opensource.com
How I upgraded my CuBox open source music server | Opensource.com
Infrastructure-as-Code mistakes and how to avoid them | Ubuntu
Are you being the right person for DevOps? | Opensource.com
5 ops hacks for sysadmins | Opensource.com
The Marriage of Data Exfiltration and Ransomware
Erman Arslan's Oracle Blog: Hyperion / EPM -- Enabling TLS 1.2 and LDAPS in Hyperion/EPM 11.1.2.4
Utilitarian Nightmare: Offensive Security Tools — Adam Caudill
AWS Solutions Architect Associate Exam - How I passed! - mwpreston.net
Automating SQL and PL/SQL Deployments using Liquibase | The ORACLE-BASE Blog
Open Security Courses — Open Reference Architecture for Security and Privacy 20202-Q1 documentation
Checks Performed | YAWAST …where a pentest starts
YAWAST: News & Mission — Adam Caudill
How to Set Goals and Resolutions You'll Actually Keep
Selling Your Business? Read This First – Running Your Business
How To Speak by Patrick Winston - YouTube
A Memorial to Patrick H. Winston
GreenPiThumb: A Raspberry Pi Gardening Bot · mtlynch.io
Threats and Solutions for Supply Chain Attacks in IT - DeepSec conference sheds light on the concatenated logistics of information technology. •
Protect your data with Encrypted Data Pump Jobs – ThatJeffSmith
How to Do Code Reviews Like a Human (Part One) · mtlynch.io
FOCA - Tool To Find Metadata And Hidden Information In The Documents
Eaphammer v1.9.0 - Targeted Evil Twin Attacks Against WPA2-Enterprise Networks
Traxss - Automated XSS Vulnerability Scanner
ScoutSuite - Multi-Cloud Security Auditing Tool
Kirjuri - Web Application For Managing Cases And Physical Forensic Evidence Items
Snare - Super Next Generation Advanced Reactive honEypot
ATTACKdatamap - A Datasource Assessment On An Event Level To Show Potential Coverage Or The MITRE ATT&CK Framework
AutoSploit v4.0 - Automated Mass Exploiter
ThreatIngestor - Extract And Aggregate Threat Intelligence
Trivy - A Simple And Comprehensive Vulnerability Scanner For Containers, Suitable For CI
Sparrow-Wifi - Next-Gen GUI-based WiFi And Bluetooth Analyzer For Linux
DFIRtriage - Digital Forensic Acquisition Tool For Windows Based Incident Response
Adaudit - Powershell Script To Do Domain Auditing Automation
DetectionLab - Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices
WinPwn - Automation For Internal Windows Penetrationtest / AD-Security
Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit
Flan - A Pretty Sweet Vulnerability Scanner By CloudFlare
Nessus Map - Parse .Nessus File(S) And Shows Output In Interactive UI
Genact - A Nonsense Activity Generator
Dsiem - Security Event Correlation Engine For ELK Stack
nodeCrypto v2.0 - Ransomware Written In NodeJs
ReconCobra - Complete Automated Pentest Framework For Information Gathering
huskyCI - Performing Security Tests Inside Your CI
XSpear v1.3 - Powerfull XSS Scanning And Parameter Analysis Tool
Open-Source Software in Federal Procurements: The Good, the Bad, and the Ugly, Part 1 – The Good | PilieroMazza PLLC - JDSupra
AWS Report - Tool For Analyzing Amazon Resources
USENIX Enigma 2019 - Stethoscope: Securely Configuring Devices without Systems Management - YouTube
USENIX Enigma 2019 - How to Predict Which Vulnerabilities Will Be Exploited - YouTube
How Do Cyber Insurers View The World? - YouTube
Healthcare Cyber Threats That Should Keep You up at Night | Webroot
GDPArrrrr: Using Privacy Laws to Steal Identities - YouTube
Are Computer Architects to Blame for the State of Security Today? | SIGARCH
2 19 Welcome to the Jumble Improving RDP Tooling for Malware Analysis and Pentesting milio Gonzalez - YouTube
Infosecurity.US - https://infosecurity.us - XKCD, Software Updates
Codebook - November 14, 2019 - Axios
The Death of Gary Kildall Remains a Mystery to This Date | Techrights
Java mon amour: Lasse Koskela, Effective Unit Testing
Windows Performance Monitoring Templates [Tutorial]
How to Build an Azure Pipeline (Build/Release) from Scratch
"Leading to Learning," Part 1: Here's Where We Are – Don Jones®
Manning | Effective Unit Testing
The Netflix Secret Codes Cheat Sheet
Wood for pantry shelves - The Silicon Underground
DIY cloud weather station with ESP32/ESP8266 (MySQL database and PHP) – Dangerous Prototypes
Multiple ways to Capture Memory for Analysis
Windows for Pentester: Certutil
Docker Installation & Configuration
Apache Tomcat Penetration Testing Lab Setup
Why the Healthcare Sector Is So Vulnerable to Cybercrime
DevSecOps: Overcoming Resistance - HealthcareInfoSecurity
HHS Updates Security Risk Assessment Tool - HealthcareInfoSecurity
Medical Device Cybersecurity: A Team Approach
List of data breaches and cyber attacks in December 2019 – 627 million records breached - IT Governance UK Blog
Police Procedural: How South Carolina Arrest Records Were Exposed
This Year in Ransomware Payouts (2019 Edition)
Software Patching Statistics for 2019: Common Practices and Vulnerabilities
What is the Zero Trust Model?
APT review: what the world’s threat actors got up to in 2019 | Securelist
Corporate security prediction 2020 | Securelist
IoT: a malware story | Securelist
Cybersecurity of connected healthcare 2020: Overview and predictions | Securelist
1&1 Telecom GmbH hit by almost €10 million GDPR fine over poor security at call centre – HOTforSecurity
S3Tk - A Security Toolkit For Amazon S3
WindowsFirewallRuleset - Windows Firewall Ruleset Powershell Scripts
Windows for Pentester: BITSAdmin
Iranian threat groups - Koen Van Impe - vanimpe.eu
How Regular Cyber Security Assessments and Audits Help Your Organization - Delta Risk
How to Design a Break Glass Process in Privileged Account Management (PAM) Systems | Security Architects Partners
State saves millions with open source EHR | Opensource.com
Portales hospital reports security breach | KVII
Security contributions to OpenWrt: dm-verity and SELinux - Bootlin's blog
A Brief History of Open Source Software, Part 2: OSS Licenses and Legalities | ConsortiumInfo.org
How the Ransomware Economy Has Grown
How to Read a File in Python, Write to, and Append, to a File
How I once saved half a million dollars with a single character code change | Pitest
UL Pushes Security Standards For The Internet Of Broken Things | Techdirt
Linux in the Kitchen | Life Enhancement Blathering – CubicleNate's Techpad
lnsnmp.exe -Sc fails on Domino V11 GA | eknori.de
Bringing Security Testing to Development - owasp-appseceu2015-brucker.pdf
Bringing Security into the Development Process
What is SecDevOps and why should you care? - Sqreen Blog
E-Learning Simulations: Are Yours Engaging Enough? – Business Ideas
My 2020 Higher Education Finance Reading List – Robert Kelchen
9 Ansible guides to help you ease into automation | Enable Sysadmin
Handle PowerShell Errors Like a Boss With These Tips
Writing Ansible Playbook · GeekSocket
Lawmakers close to finalizing federal strategy to defend against cyberattacks | TheHill
47 #LinkedIn Improvement Tips for 2020 | DennisKennedy.Blog
WebLogic Server - Automatic/Silent setup of a SAML2 SSO - Blog dbi services
WebLogic Server - Automatic/Silent creation of an LDAP Authentication Provider - Blog dbi services
Google's AI can detect breast cancer more accurately than experts | Engadget
2020: Trends and predictions for technology and IT – Marksei
A Brief History of Open Source Software | ConsortiumInfo.org
sysadvent: Day 9 - In Defense Of The Modern Day JVM (Java Virtual Machine)
Basically, when I said the word “JVM,” they heard, “Here's my JAR file. Good luck, chumps. Kbye.”
sysadvent: Day 5 - Break up your Terraform project before it breaks you
sysadvent: Day 4 - Successful projects without all the pain
Raspberry Pi 3 baby monitor | Hackspace magazine #26 - Raspberry Pi
GitHub - marin-m/vmlinux-to-elf: A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)
How to Use LinkedIn Skill Assessments to Stand Out
What's the Difference Between DDR2, DDR3, and DDR4 RAM?
5 Money-Saving Guides & Apps to be Financially Independent and Retire Early
Turn Your Raspberry Pi Into a Media Server With Emby
How to Back Up Your Android Device Properly
Released: SQL Assessment API (GA) - Microsoft Tech Community - 989677
New features in SQL Server 2019 Standard Edition
Optimize OLTP Performance with SQL Server on Azure VM - Microsoft Tech Community - 916794
Network Booting The Pi 4 | Hackaday
Pack Your Bags – Systemd Is Taking You To A New Home | Hackaday
Hacking Diabetes Hack Chat | Hackaday
Lego Rack Server | Total Geekdom
Ikea - Trammell Hudson's Projects
DSHR's Blog: Web Packaging for Web Archiving
34", $100, 20 lb Triple Weed Whacker Lawnmower | Hackaday.io
Home - PiSDR Project
VGA Signal In A Browser Window, Thanks To Reverse Engineering | Hackaday
GitHub - IoTGuruLive/dust_box: Dust sensor box
Advancing The State Of Cyberdeck Technology | Hackaday
The Cyberdeck Mark 2: the dream of the '80s is alive. - Album on Imgur
Announcing Performance Optimized Storage Configuration for SQL Server on Azure VMs with SQL VM RP - Microsoft Tech Community - 891583
TOP 5 Benefits of Azure Dedicated Hosts (Preview) for SQL Server Workloads on Azure VMs - Microsoft Tech Community - 817951
Using Query Store with least privileges instead of db_owner to achieve Separation of Duties - Microsoft Tech Community - 793117
Linux Find Out Maximum RAM Supported By Server / BIOS - nixCraft
# dmidecode |grep -i "Maximum Capacity:" | uniq
Zero Day Initiative — Patch Analysis: Examining a Missing Dot-Dot in Oracle WebLogic
U.S. GAO - Cloud Computing Security: Agencies Increased Their Use of the Federal Authorization Program, but Improved Oversight and Implementation Are Needed
Enumerating remote access policies through GPO
faasd - lightweight Serverless for your Raspberry Pi
sysadvent: Day 23 - Becoming a Database Administrator
sysadvent: Day 21 - Being kind to 3am you
sysadvent: Day 20 - Importing and manipulating your Terraform configuration
sysadvent: Day 19 - SRE Practice: Error Budgets
Building and Maintaining a Sustainable Team - The Automation Blog
How to use Microsoft Compliance Score to improve data protection | CSO Online
6 top OSINT tools: Find sensitive public info before hackers do | CSO Online
Three strategies to prove security's value | CSO Online
The Difference Between System V and SystemD | Daniel Miessler
My Collection of Statistics About Americans | Daniel Miessler
6 CISO New Year's Resolutions for 2020
Former White House CIO Shares Enduring Security ...
How Medical Device Vendors Hold Healthcare Security ...
4 Security Lessons Federal IT Pros Can Teach the ...
Lesson 1: Focus on the Fundamentals Lesson 2: Know Your Weaknesses Lesson 3: Create a Culture Around Security Lesson 4: Take Advantage of Security Resources
California's IoT Security Law Causing Confusion
5 Common Cloud Configuration Mistakes
Cybercriminal's Black Market Pricing Guide
Cyber Security Month Wrap-Up | /dev/random
Information Security Policy Documentation: Simple is Better | Pivot Point Security
Two-Factor Authentication and the New OWASP ASVS 4.0 | Pivot Point Security
6 Ways to Hack a Raspberry Pi via the Boot Partition
sysadvent: Day 25 - The “Just” Basics
The Windows Run Commands Cheat Sheet
Security assessment techniques for Go projects | Trail of Bits Blog
11 Useful Tools to Check, Clean, and Optimize CSS Files
How Do Forensic Analysts Get Deleted Data From Your Phone?
Breaking Down Healthcare’s “Wall of Shame” – RBS
Top Reasons to Stop Using Public Wi-Fi | Security Gladiators
Evolving Threat Series: Towards a concept of Security Specification for Software Supply Chain
Introduction to the CIS Critical Security Controls (AmherstSec Meetup December 2019) – The Personal Blog of Sean Goodwin
Google Dorks – We are OSINTCurio.us
Windows Incident Response: LNK Toolmarks
APEX Authentication with a Smart Card – Part 3 (Application) | Late Night Oracle Blog
Elasticsearch: How We’re Using it to Improve Security - Delta Risk
How to Determine if SOCaaS is Right for Your Organization
Secure Debian with ClamAV Antivirus
Using PowerShell to View and Change BIOS Settings | Windows OS Hub
Zero Day Initiative — The December 2019 Security Update Review
Windows Incident Response: Artifact Clusters
Windows Incident Response: ActivitesCache.db vs NTUSER.DAT
2019 end-of-year review part 2: July to December - IT Governance UK Blog
Product
Fine against hospital due to data protection deficits in patient management | European Data Protection Board
Ad Industry Unveils Wish List For Privacy Legislation 12/04/2019
White Paper – Negotiating with Service Providers and Third Parties under CCPA
October 2019 Healthcare Data Breach Report
Unpacking the FTC's comments on NIST's draft Privacy Framework
Privacy 2030: A New Vision for Europe
Survey: Data breaches to cost health care industry $4B
A Black Book Market Research LLC survey found health care providers are the most targeted organizations for data breaches, which will cost the industry $4 billion by the end of 2019
Does transfer have to be occasional if it is necessary for the performance of a contract?
IAPP infographic: Avoiding the pitfalls of CCPA noncompliance
CISO Tools to Build (or Tweak) a Cybersecurity Roadmap, Create Business Case and Request FundingRafeeq Rehman – Personal Blog
(17) Model Monday - BOLD | LinkedIn
Model Monday - 9 Stage Business Case | LinkedIn
Making Sense Out of NPM Audit
How SMEs can improve their data protection practices - IT Governance
1. Secure wireless networks 2. Keep software updated 3. Control access 4. Back up data 5. Train staff
ISO 27701 unlocks the path to GDPR compliance and better data privacy - IT Governance UK Blog
A 3-3-4-5 Model for CISO StrategyRafeeq Rehman – Personal Blog
A Threat Modeling Process to Improve Resiliency of Cybersecurity ProgramRafeeq Rehman – Personal Blog
Hacker Holiday Gift Guide (HHGG) 2019 · System Overlord
Wireless Pentesting Part 2 – Building a WiFi Hacking Rig - The Ethical Hacker Network
Wireless Pentesting Part 1 – An Overview - The Ethical Hacker Network
Shadow IT: Cultivating the Garden | Security Architects Partners
How to Randomize your Software Testing Thought Process - EvilTester.com
Six Reasons for Organizations to Take Control of Their Orphaned Encryption Keys
The Ten Security Stories That Shaped The Decade – JerryGamblin.com
The Books I loved in 2019 – JerryGamblin.com
Why GDPR compliance requires a software solution - IT Governance UK Blog
7 mistakes that ISO 27001 auditors make - IT Governance UK Blog
What is the ISO 27000 series of standards? - IT Governance UK Blog
5 things HR departments need to know about data protection - IT Governance UK Blog
The 5 biggest ransomware pay-outs of all time - IT Governance UK Blog
#CQLabs 4 – from Unquoted Service Path to Privilege Escalation | CQURE Academy
The most 7 inexcusable mistakes | CQURE Academy
Old Skool Red Team – DiabloHorn
Collecting and Crafting User Information from LinkedIn - Black Hills Information Security
Rainy Day Windows Command Research Results - Black Hills Information Security
#CQLabs – DSInternals PowerShell Module by Michael Grafnetter | CQURE Academy
ShellBags & Windows 10 Feature Updates - Digital Forensics Stream
Healthcare Exchange Standards: Nationwide Health Information Exchange on #FHIR
2019 end-of-year review part 1: January to June - IT Governance UK Blog
Presenting Cybersecurity to the Board ~ Cyber Thoughts
Cyber Risk Insurance Won't Save Your Reputation ~ Cyber Thoughts
The impact of AI & HIoT related threats and recommended approaches ~ Cyber Thoughts
A Healthcare Security Mismatch ~ Cyber Thoughts
Migrating from VMs to Docker | Calvin Bui
GitHub - trustedsec/physical-docs: This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.
Vulnerability Management Product Comparisons (October 2019) | Alexander V. Leonov
Azure Active Directory's Configurable Token Lifetimes | Alexander's Blog
Working with Office 365 Trial Subscriptions | Alexander's Blog
Comparison of Microsoft Identity Services: AD DS, Azure AD, & Azure AD DS | Alexander's Blog
Basic automation for WISPs and small to medium ISPs
Test coverage of Python packages in Cisco NSO
Run the Antidote network emulator on KVM for better performance | Open-Source Routing and Network Simulation
Stretched Layer-2 Subnets in Azure « ipSpace.net blog
Coders in the Hands of a Missing God: How Newly Minted Freelancers Badly Miss the Point - DaedTech
The Lesson to Unlearn
File systems unfit as distributed storage backends: lessons from ten years of Ceph evolution – the morning paper
Reduce The Risk Of Ransomware By 90%, For Free, In One Day<br/>
Ansible vs. Nornir: Speed Challenge
Can We Build Trustable Hardware? « bunnie's blog
Cloud-init - Part 5 - Running Containers - LucD notes
Cloud-init - Part 4 - Running Scripts - LucD notes
Cloud-init - Part 3 - Photon OS - LucD notes
Cloud-init - Part 2 - Advanced Ubuntu - LucD notes
Cloud-init - Part 1 - The Basics - LucD notes
At Your Fingertips - LucD notes
Why patching can make your Kenna score go up instead of down - The Silicon Underground
How does Nessus detect vulnerabilities? - The Silicon Underground
5 Pivotal Events in IoT and Embedded | EE Times
‘Thousands Of Tools Have Come & Gone, But Ansible & Bash Have Stood The Test Of Time’
Ransomware Attackers May Lurk for Months, FBI Warns
How The Four Laws of Ecology Help You Solve Problems
Three Filters Needed to Think Through Problems
How do I Get My Team Inspired to Learn? – Don Jones®
The 3 Final Pillars of the Cognitive Risk Framework Understanding the Elements of the CRF for Cybersecurity and ERM | TheGRCBlueBook
Be the Master – Don Jones®
Cognitive Governance: The First Pillar of a Cognitive Risk Framework | Corporate Compliance Insights
UPS battery lifetime | Nelson's log
A Cognitive Risk Framework for the 4th Industrial Revolution | TheGRCBlueBook
The Five Pillars of a Cognitive Risk Framework include: I. Cognitive Governance II. Intentional Design III. Risk Intelligence & Active Defense IV. Cognitive Security/Human Elements V. Decision Support (situational awareness)
vCloudNotes : Information Sharing: AmazonS3Exception: Access Denied errors and potential causes
CBIA Employment Law Conference: AI for HR Panel Recap | Tallan Blog
Ransomware infects Maastricht University | Born's Tech and Windows World
Questions4SteveB - my Home Page
Creating a PowerShell Backup System - Part 4 • The Lonely Administrator
Creating a PowerShell Backup System - Part 3 • The Lonely Administrator
Valid reasons for running unauthenticated vulnerability scans - The Silicon Underground
grocy - ERP beyond your fridge
Disclosing vulnerabilities improves security for everyone
GitHub - cameyo/rdpmon: Server-side RDP Monitoring Tool
RDP Port Shield - Cameyo
Healthcare industry needs treatment to improve data security
The Importance of Planning in Project Management – Productivity
The challenges of data analytics in healthcare
Internet Archive: Offline Archive
Chris's Wiki :: blog/linux/WorkMachinePartitioning2019
How to Learn Microsoft Azure in 2020 - Thomas Maurer
JBoss EAP 7 - Domain Architecture Understanding - Blog dbi services
JBoss EAP 7 - Modules, Extensions, Subsystems, and Profiles - Blog dbi services
JBoss EAP 7 – Domain creation - Blog dbi services
Erman Arslan's Oracle Blog: ZDLRA -- Zero Data Loss Recovery Appliance "Fast. Integrated. Zero Data Loss" Engineered for Data Protection !
ZDLRA
Privacy legislation and the impact of GDPR and CCPA [Q&A]
Only 12 percent of companies are ready for new privacy regulations
Cyber incident ripple effects lead to increased losses
Cybercriminals step up attacks on the healthcare sector
Microsoft will honor Californian privacy laws across the entire US
Ransomware sees a revival in 2019's worst cybersecurity threats
Using a high screen resolution on Raspberry Pi 4 can kill Wi-Fi
Wait for Java | Oracle Scratchpad
Extended Support for Oracle Database 12.1.0.2 extended
FinServ Data Privacy Maturity Study
Internet Security Report - Q3 2019 | WatchGuard Technologies
Installing Microsoft SQL Server 2019 on Linux, Part II
Tools and commands for running SQL Server 2019 on Linux - SQL Server Blog
Tools To Monitor and Work with Oracle on Azure
Get Started with Windows Update for Business (WUfB) – Stick To The Script
PowerShell Remote Alerts for Firewall | MSP360 Blog
Signing Docker images using Docker Content Trust | Marco Franssen
Sysadmin Stories: Check ESXi MTU settings with PowerCLI
How to install the daloRADIUS web-based interface for FreeRADIUS - TechRepublic
Implementing corporate laptop encryption using LUKS
Red Hat expands coverage of CVE fixes
Monitoring Bandwidth On Linux: Top 5 Tools in 2019
Configuring Ansible | Enable Sysadmin
Python CSV: Read and Write CSV files
Overview of ycrash – finding the source of your problem - JAXenter
iTWire - Windows ransomware is a nice little earner for Microsoft
How to configure a VLAN in Linux | Enable Sysadmin
How To Install Apache Tomcat 9 on Debian 10
Security-Oriented Container Linux Gets Patched Against Latest Intel CPU Flaws
4K Monitors – etbe – Russell Coker
r
SaltStack adds automatic vulnerability remediation tool to portfolio • DEVCLASS
Ransomware Bites 400 Veterinary Hospitals — Krebs on Security
Using a YubiKey as a second factor for LUKS · InfoSec Handbook – information security blog
Using a Raspberry Pi Zero to automate Fedora installation - blog'o'less
The 10 Hottest Kubernetes Tools And Technologies Of 2019
Composite USB Gadgets on the Raspberry Pi Zero | iSticktoit.net
Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions
110 Nursing Homes Cut Off from Health Records in Ransomware Attack — Krebs on Security
The Early History of Usenet, Part VII: Usenet Growth and B-News
The Early History of Usenet, Part VI: The Public Announcement
The Early History of Usenet, Part V: Authentication and Norms
The Early History of Usenet, Part IV: Implementation and User Experience
The Early History of Usenet, Part III: File Format
The Early History of Usenet, Part II: Hardware and Economics
The Early History of Usenet, Part I: The Technological Setting
StevenBellovin
Like Voldemort, Ransomware Is Too Scary to Be Named — ProPublica
Lumber Liquidators
How Kubernetes Has Changed The Face Of Hybrid Cloud
Salesforce's Rob Acker - open source NonProfit Success Pack for third sector organizations is "alive and well and staying"
5 tips for being the family holiday sysadmin | Enable Sysadmin
Tip 1: Be nice I know it seems obvious, but always try to assume good intentions when someone asks for technical help, even if you can’t (or don’t want to) help them. You spent all day in front of your screens. Your close friends and significant others might know to avoid asking you technical questions during your downtime. Your relatives who only see you a few times a year might not. Nobody wants to hear you yell at uncle Rick over slices of pumpkin pie because he asked you to help him set up his printer. Take a deep breath and approach the situation charitably. Tip 2: Be honest I spent almost all of my time in Linux, and I’ll often go months without touching another desktop OS. I recently spent more time than I care to admit trying to replace a hard drive in a Mac for someone, primarily because I didn’t know what I was doing. The Linux method of dd’ing the old drive to the new drive and then just resizing partitions wasn’t working so well, and I became pretty frustrated (it turns out that Migration Assistant was the right tool to use in the Mac world). Many IT professionals are heavily specialized, and setting up the newest gadgets that your cousin just got for Christmas might not be in your wheelhouse. Be honest about that. I often tell people that I’ll happily take a quick look at an issue, but it’s not my area of expertise so I won’t spend too much time on it and that they’re better off having an expert look at their problem. Similarly, you should be transparent if you don’t want to work at all over the holidays. Everyone deserves a break, and a polite (but firm) explanation that you’re not on the clock is appropriate. Tip 3: If you’d rather not work, provide actionable advice You might not have any time (or interest) in being the family sysadmin over the holidays, and that’s perfectly reasonable. However, you can still be helpful without ever touching a keyboard. Many of the common complaints, such as "my computer is slow," have known solutions: registry cleaners for Windows, RAM or disk upgrades, and others. Providing just this basic information can be helpful even if you don’t want to be the one making the repairs or improvements. Instead of "I’m sorry, but I’d prefer not to work on anything over the holidays," try, "It sounds like your computer might need a hardware upgrade. I would recommend contacting a local PC repair company and asking them to look for these particular parts." I also try to be a resource for when my friends and family bring their tech to others for repair. I’ve fielded several calls from relatives asking about whether they really needed a certain repair or software, or if someone was just trying to upsell them. This kind of help only takes a few minutes from my day, and I’m happy to help those who have inevitably helped me during my lifetime. Tip 4: Give the gift of knowledge I find that tech folks can be quick to just solve an issue without helping someone understand why the issue occurred in the first place. For some people, that’s fine. I have relatives that have no interest in digging into their issues, and would much rather ask an expert. However, others might show more initiative. I’ve had great success with simply sharing high-quality sources of information, such as vendor support numbers, official documentation, and forums known for their sound advice with my friends and relatives. When they run into an issue, they have somewhere to go before they pick up the phone to ask me a question. Tip 5: Keep it simple Finally, if you’re the type of person who really loves being the holiday sysadmin, remember to keep your solutions simple. Setting up a self-hosted Linux RADIUS server so that everyone has their own WiFi password for WPA Enterprise might be a fun project, but remember that someone has to maintain it once you leave. If you’re setting up tech for folks who prefer to remain non-technical, then try to keep your solutions as simple (and secure) as possible.
Pipx: Installing, Uninstalling, & Upgrading Python Packages in Virtual Envs
Ransomware at Colorado IT Provider Affects 100+ Dental Offices — Krebs on Security
How to validate your security measures | Enable Sysadmin
Russia Disconnects From Global Internet To Test Its Own Internet
How to Use Ansible Vault in Playbooks to Protect Sensitive Data - Part 10
Mozilla SSL Configuration Generator
Designing security for an open-source, containerized, cloud-native world - SiliconANGLE
Open Source Flan Scan Combines Nmap with Vulnerability Scanning | Decipher
Himblick: Raspberry Pi as a digital signage box
Episode 171 - Measuring cybersecurity with Kathryn Waldron
Creating Interactive Dashboards from Jupyter Notebooks - Practical Business Python
Comparison between LXC and LXD – Mi blog lah!
Researchers Develop Open Source EEG Visualization Tool – News
SATA HATs support up to four drives on Raspberry Pi 4 or Rock Pi 4
Managing the Linux kernel at AWS: 'A large team of security experts' dealing with fallout from Spectre, Meltdown flaws • The Register
Debian Releases Updated Intel Microcode for Coffe Lake CPUs, Fixes Regression
TAA
RipMe – Bulk image downloader for Linux | FOSS Linux
The easiest way to deploy Django application | Codementor
CVE patching alone is not making your Linux secure | Ubuntu
Healthcare Industry: Open-Source is gaining momentum
Linux check the physical health of a USB stick [ Flash drive ] - nixCraft
badblocks f3write f3read
OpenWiFi Open-Source Linux-compatible WiFi Stack Runs on FPGA Hardware
Large Hospital System Hit by Ransomware Attack | SecurityWeek.Com
Butterfly Network expands ultrasound access to Android devices
TenFourFox Development: RIP, Chuck Peddle
Security Awareness Training: Do It Well – Security For Your Business
Curl vs. PowerShell: Which is Best for Web Commands?
How to Automate Following Interesting Twitter Users
How to Manage IIS Websites with PowerShell [Tutorial]
PowerShell Objects: Learn the Foundation of PowerShell
Military Cyber Operations: The New NDAA Tailors the 48-Hour Notification Requirement - Lawfare
The Cyberlaw Podcast: Brad Smith on Microsoft’s Journey from Hubris to Humility - Lawfare
US military loves Linux
Supporting Multiple Languages In Django — Part 1 | Codementor
DSHR's Blog: Auditing The Integrity Of Multiple Replicas
What Is UEFI And How Does It Keep You More Secure?
What Is JavaScript and How Does It Work?
A Look at High and Low Earning Programs of Study – Robert Kelchen
maps, smaps and Memory Stats! - jameshunt(.us)
Liqid's PCIe Fabric is the Key to Composable Infrastructure - Architecting IT
Home - Brand
SQL Server Security from the ground up at SQLBits 2020 - Stuart Moore
Bringing humanity to work: Digital transformation and Industry 4.0 | The IT Skeptic
My First 3D Printer! Ender 3 Pro | b3n.org
Ender 3 Pro
DIY NAS: EconoNAS 2019 - briancmoses.com
Local Administrator Audit Script - byronpate.com
Internals of TDE Encryption scan - Microsoft Tech Community - 1059191
Book Freak #28: A Guide to Personal Freedom | Cool Tools
Use your words to create the life you want to live “The first agreement is to be impeccable with your word. It sounds very simple, but it is very, very powerful. Why your word? Your word is the power that you have to create.” Don’t swallow poison “Taking things personally makes you easy prey for these predators, the black magicians. They can hook you easily with one little opinion and feed you whatever poison they want, and because you take it personally, you eat it up. You eat all their emotional garbage, and now it becomes your garbage. But if you do not take it personally, you are immune in the middle of hell. Immunity to poison in the middle of hell is the gift of this agreement.” Ask questions instead of making assumptions “If others tell us something we make assumptions, and if they don’t tell us something we make assumptions to fulfill our need to know and to replace the need to communicate. Even if we hear something and we don’t understand we make assumptions about what it means and then believe the assumptions. We make all sorts of assumptions because we don’t have the courage to ask questions.” Avoid self criticism by always doing your best “Just do your best — in any circumstance in your life. It doesn’t matter if you are sick or tired, if you always do your best there is no way you can judge yourself. And if you don’t judge yourself there is no way you are going to suffer from guilt, blame, and self-punishment. By always doing your best, you will break a big spell that you have been under.”
VMware: List/Audit VMware Tools Versions | PeteNetLive
How to Sync Azure Blob Storage with AzCopy - Thomas Maurer
The History Of The Microphone - krypted
OceanLotus: Hackers tried to infiltrate the network of German car manufacturer BMW | Born's Tech and Windows World
Insides: Windows 10 19H2 development/deployment (V1909) | Born's Tech and Windows World
Chris's Wiki :: blog/linux/ZFSSplitPoolExperience
Chris's Wiki :: blog/spam/BlackboxAndWhiteboxFiltering
Chris's Wiki :: blog/linux/MappingNVMeDrives
Chris's Wiki :: blog/python/DjangoSettingsOurStructure
The Top Mistakes You'll Make When Moving to the Cloud
Cost Control Not Having a Good Cloud Strategy The cloud is riddled with vendor lock-in Understand security models
Uninstall Software Application with PowerShell |
$uninstallApp = Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -Like "SomeApp*"}; $uninstallApp.Uninstall() Get-WmiObject -Class Win32_Product | Select-Object Name | Sort-Object Name
Welcome - Apple Support
Everything You Wanted to Know about Apple Security but Were Afraid to Ask - TidBITS
How Kali deals with the upcoming Python 2 End-of-Life | Kali Linux
Getting Started with tmux Part 5 - Customization and Tweaks - YouTube
Getting Started with tmux Part 4 - Creating and Switching Between Sessions - YouTube
Getting Started with tmux Part 3 - Creating and Managing Windows - YouTube
Getting Started with tmux Part 2 - Horizontal and Vertical Panes - YouTube
Getting Started with tmux Part 1 - Overview and Features - YouTube
New graphing tool for PipeWire debugging
15 Useful Firefox Keyboard Shortcuts You Should Know - It's FOSS
P2PE Versus E2EE | PCI Guru
PenTesting: Gaining Root Privileges on Kioptrix – ls /blog
SEC charges IT administrator over $7 million insider trading ring | Engadget
Malware at Wawa stores has been stealing credit card info since March | Engadget
Boost Workplace Safety with Customized Lift Tables – Business
Alejandra’s Top 5 Favorite re:Invent🎉 Launches of 2019 | AWS News Blog
1. Amazon Braket: explore Quantum Computing 2. AWS Wavelength: ultra-low latency apps for 5G 3. AWS DeepComposer: learn Machine Learning with a piano keyboard! 4. Amplify: now it’s ready for iOS and Android devs too! 5. EC2 Image Builder
New – Amazon Comprehend Medical Adds Ontology Linking | AWS News Blog
Check out The Amazon Builders’ Library – This is How We Do It! | AWS News Blog
Country IPv6 ranges lists | blog.erben.sk
Reliable USB DVB-T2 adapter for Linux | blog.erben.sk
WinTV-DualHD
VMware OS Optimization tool now supports Windows Server 2019 | ESX Virtualization
VMware vSphere 6.7 U3b Released | ESX Virtualization
Upgrading the home lab ESXi 6.5 to 6.7 - rhyshammond.com
DoD STIGs for VMware | Ryan Birk – Virtual Insanity
vSphere 6.7 Security Guide | Ryan Birk – Virtual Insanity
vCloudNotes : Information Sharing: PowerCLI script to get HBA firmware and driver version for all ESXi hosts
Virtualization The Future: VMware Ports and Protocols For VMware Products
Raspberry Pi 4: Chronicling the Desktop Experience - Viewing PDFs - Week 9 - LinuxLinks
How automation can optimize DevOps | Enable Sysadmin
How to Install Custom Fonts on a Debian 10 System
The 20 Best Raspberry Pi OS Available to Use in 2020
Script - A Simple Command-Line Tool for Recording Your Terminal Session Activity | 2daygeek.com
How to Setup Rsyslog Server on Ubuntu 18.04 LTS
How to Simplify 7z Compression with Bash Aliases - Make Tech Easier
You Know WSL is Bad for GNU/Linux Because Anti-Linux People, Microsoft and Its Propagandists, Want People to Use That | Techrights
How To Install Kali Undercover Mode On Any Xfce Linux Distribution - Linux Uprising Blog
Some pretty useful SQUID proxy tips & tricks - LinuxTechLab
An open source culture | Joinup
How to Create and Download Roles on Ansible Galaxy and Use Them - Part 9
How to Work with Ansible Variables and Facts - Part 8
How to Create Templates in Ansible to Create Configurations On Managed Nodes - Part 7
How to Use Ansible Modules for System Administration Tasks - Part 6
List Of 4 Open Source Network Asset Management Systems For Data Centers
List of Network Asset Management Systems for Data Centers Open-AudIT RackTables Kuwaiba Ralph
Hands-free Raspberry Pi Airdrum | The MagPi 89 - Raspberry Pi
Osquery vs. OSSEC: Which Is Best for Linux Security in 2020?
A profile of Cliff "Cuckoo's Egg" Stoll, a pioneering "hacker hunter" / Boing Boing
s. Security researchers still treat the book as a touchstone
How To Automate Directory Database And Website Backup Using Bash
Setting the record straight on AWS and open source | AWS Open Source Blog
How to Manage Active Directory Hosted on AWS Cloud | LinuxGAIN
Orbifolds and Other Games - Precise Unit Tests with PyHamcrest
Introduction to automation with Bash scripts | Opensource.com
LXD: storage | panticz.de
How to Automatically Disconnect Idle or Inactive SSH Sessions After Five Minutes of Inactivity | 2daygeek.com
Copying files into a container at run time | Adam Young’s Web Log
IT Team Support: Getting Value for Money – Technology
How to Host a Successful Conference Call – Running Your Business
Why Policymakers Should Repeal the Medical Device Tax
Busy Entrepreneurs: Stay Ahead with Organizational Tips – Entrepreneurs
State Online Sales Taxes in the Post-Wayfair Era | Tax Foundation
Unlock Bootloader using Fastboot on Android (Detailed Guide)
Stop hurting yourself by: Not updating the drivers and firmware in Windows and Windows Server. – Yong Rhee's Microsoft Technet Blog
Stop hurting yourself by: Not applying the non-security updates for Windows and Windows Server. – Yong Rhee's Microsoft Technet Blog
How to identify a strong sysadmin job applicant | Enable Sysadmin
A beginner's guide to using Vagrant | Opensource.com
CentOS 6 Through CentOS 8 Benchmarks On Intel Xeon Server - Phoronix
Linux 5.5 Livepatching Tracks The System State For Better Patch Handling/Compatibility - Phoronix
How To Enable "Run As Administrator" For A Batch File In Windows 10?
Editing A Podcast With Audacity on Linux - YouTube
Create Virtual CD And DVD Drives Using CDEmu On Linux - OSTechNix
How to Increase VirtualBox HDD Size with Clonezilla - Make Tech Easier
Low-cost, 802.11ac mesh router runs on OpenWrt
10 Office 365 mobile apps you must have on your phone - SharePoint Maven
Newsletter #3 – Tools / automation and the right song | The Frog Pond of Technology
Why the Medical Device Tax Should Be Repealed | Affordable Care Act
Oracle_versioning_old_new.png (PNG Image, 1642 × 1018 pixels)
Erman Arslan's Oracle Blog: Exadata/RDBMS -- Database Release Schedule + Support Dates - 19C + Exadata Image Upgrade (to the latest version // 19.3.1)
Automate OS Image Build Pipelines with EC2 Image Builder | AWS News Blog
Marketing Automation: 5 Methods You Need to Be Using – Marketing
How to change careers in 12 months (or less)
Off-Grid Cyberdeck! The Raspberry Pi Recovery Kit — BACK7.CO
Welcome to AWS IoT Day – Eight Powerful New Features | AWS News Blog
Secure Tunneling – You can set up and use secure tunnels between devices, even if they are behind restrictive network firewalls. Configurable Endpoints – You can create multiple AWS IoT endpoints within a single AWS account, and set up a unique feature configuration on each one. Custom Domains for Configurable Endpoints – You can register your own domains and server certificates and use them to create custom AWS IoT Core endpoints. Enhanced Custom Authorizers – You can now use callbacks to invoke your own authentication and authorization code for MQTT connections. Fleet Provisioning – You can onboard large numbers of IoT devices to the cloud, providing each one with a unique digital identity and any required configuration on its first connection to AWS IoT Core. Alexa Voice Service (AVS) Integration – You can reduce the cost of producing an Alexa built-in device by up to 50% and bring Alexa to devices that have very limited amounts of local processing power and storage. Container Support for AWS IoT Greengrass – You can now deploy, run, and manage Docker containers and applications on your AWS IoT Greengrass-enabled devices. You can deploy containers and Lambda functions on the same device, and you can use your existing build tools and processes for your IoT work. To learn more, read about the Docker Application Deployment Connector. Stream Manager for AWS IoT Greengrass – You can now build AWS IoT Greengrass applications that collect, process, and export streams of data from IoT devices. Your applications can do first-tier processing at the edge, and then route all or selected data to an Amazon Kinesis Data Stream or AWS IoT Analytics for cloud-based, second-tier processing. To learn more, read AWS IoT Greengrass Adds Docker Support and Streams Management at the Edge and Manage Data Streams on the AWS IoT Greengrass Core.
Amazon AI generates medical records from patient-doctor conversations | Engadget
Security fails we’re kinda thankful for | Engadget
let's give thanks for anything reminding us that hacks are supposed to be fun, and people still love making each other smile.
Broken Headband on Bluetooth Headphones | Repair Instead of Replace – CubicleNate's Techpad
Loctite 444 Loctite SF7452
How to Set Up a Home Media Server with Jellyfin on Ubuntu - Make Tech Easier
How To Find Windows 10 Product Key Using CMD, PowerShell, And Windows Registry?
wmic path softwarelicensingservice get OA3xOriginalProductKey
How To Block A Program From Accessing The Internet In Windows 10?
Now You Can Run Ubuntu Touch OS On Raspberry Pi 3 With Touchscreen
This Smartphone Microscope Will Let You See Your Own Blood Cells
4 Ways to get a Detailed Laptop Battery Report on Debian 10
Worried about 5G and Cancer? Here’s Why Wireless Networks Pose No Health Risk - TidBITS
The Cross-Platform Source Explorer Sourcetrail is Now Open Source - It's FOSS
How to Clear Systemd Journal Logs - Linux Handbook
How to Create Ansible Plays and Playbooks - Part 5
AWS Compute Optimizer – Your Customized Resource Optimization Service | AWS News Blog
AWS Outposts Now Available – Order Yours Today! | AWS News Blog
How to fork a GitHub repository and contribute to an open source project | SQL DBA with A Beard
DNUG Domino Day 2019 – First Look into Domino 11 | eknori.de
30 Years of Notes-Domino
Our first annual family meeting
ContractZen: The Complete Corporate Governance Hub – Business
Red Hat strengthens commitment to open source tooling, joins new working group - Red Hat Developer
Cooling off your Raspberry Pi 4
Red Hat Responds to ZombieLoad v2 Security Vulnerabilities Affecting Intel CPUs
The rise of the network edge and what it means for telecommunications
IT Salary 2020
Top 15 Best Security-Centric Linux Distributions of 2019
Red Hat Enterprise Linux and CentOS Now Patched Against Latest Intel CPU Flaws
Amazon’s Ring Doorbells Sent Wi-Fi Passwords in the Clear - TidBITS
How to Make Medium Work for You: 6 Strategies – Business Ideas
Factors That Affect Workplace Performance – Productivity
Best practices: Go and Oracle - Guy Harrison - Medium
AI determines how much help Shakespeare had writing a play | Engadget
Hitting the Books: Humans are responsible for the antics of our AIs | Engadget
Announcing Firelens – A New Way to Manage Container Logs | AWS News Blog
Dynamically Creating Azure Data Studio Notebooks with PowerShell for an Incident Response Index Notebook | SQL DBA with A Beard
Site Reliability Engineering: How Google Runs Production Systems – Book Review – DB-Tune
“Embrace the idea that systems failures are inevitable, and therefore teams should work to optimize to recover quickly through using SRE principles.”
Erman Arslan's Oracle Blog: EXADATA -- Connecting to the nodes using the Serial Management Port (RJ45-DB9-RS232-USB) + Connecting to the Cisco switch via CAT-5
8 great podcasts for open source enthusiasts | Opensource.com
Zombieload V2 TAA Performance Impact Benchmarks On Cascade Lake - Phoronix
Zombieload V2 TAA Performance Impact Benchmarks On Cascade Lake - Phoronix
TeXstudio - A cushty yet nerdy LaTeX frontend
Python and fast HTTP clients
7 Java tips for new developers | Opensource.com
Security advice for sysadmins: Own IT, Secure IT, Protect IT | Enable Sysadmin
A low-cost, open-source, computer-assisted microscope | ブログドットテレビ
Pirelli's 5G tire warns other vehicles about dangerous road conditions | Engadget
Stanford's new tech-laden hospital includes pill-picking robots | Engadget
Some words about SOUG Day in Lausanne - Blog dbi services
Create a PowerShell Notebook for Azure Data Studio with PowerShell | SQL DBA with A Beard
Everything you need to know about Grace Hopper in six books | Opensource.com
VLANs for sysadmins: The basics | Enable Sysadmin
An Overview at the New Azure Stack Portfolio - Thomas Maurer
Will Europe Succeed At Democratizing The Cloud? - TFiR: Open Source & Emerging Technologies
MSDN Magazine Issues | Microsoft Docs
Why Work is Getting in the Way of ... Work | APMdigest - Application Performance Management
ThousandEyes Releases Internet Insights | APMdigest - Application Performance Management
CKA Labs (18): Kubernetes Metrics Server for CPU and Memory Monitoring -
FAQ: Windows 10 Enterprise LTSC 2019 Explained | Windows OS Hub
LG open-sources Auptimizer, a tool for optimizing AI models | VentureBeat
Auptimizer
Linux Journal is Offline, But the Articles Will Come Back | Techrights
Creating Your First Windows Docker Image [Tutorial]
Equifax Data Breach Update: Backsliding | Electronic Frontier Foundation
RipMe Is An Easy To Use Bulk Image Downloader (GUI And CLI) - Linux Uprising Blog
Business Travel: How to Manage It Right – Running Your Business
Digital Transformation: A Company Make-Over – Running Your Business
Cloud Accounting and Taxation: A New Paradigm – Running Your Business
Install CentOS 8 on VirtualBox - Blog dbi services
A simple Terraform script to create an AWS EC2 playground - Blog dbi services
Demographics vs Psychographics for Machine Learning « Oralytics
Connect to ActiveDirectory with ldapsearch on Unix – Laurent Schneider
Intel unveils its first chips built for AI in the cloud | Engadget
Chris's Wiki :: blog/sysadmin/AutomatedEmailSourceFooter
Azure Synapse Analytics new features | James Serra's Blog
Archiving and deleting 23andMe | Nelson's log
These 10 Android Devices Can Be Hacked Into Spying On Their Owners
My System Administration Ethics book has been published
How Power Over Ethernet (PoE) Works | Hackaday
Hospitals Impacted By Data Breach Have Increased Death Rate: Study
Why Everyone Working in DevOps Should Read The Toyota Way – zwischenzugs
Finding USB Bugs The Hard Way | Hackaday
The Blessings And Destruction Wrought By Lead Over Millennia | Hackaday
GitHub - markszabo/FakeBeaconESP8266: Fake beacon frames for ESP8266 using the Arduino IDE
WiFi Messages
Advertise Your Conference Schedule Via SSID | Hackaday
ESP8266 Broadcasts Memorial WiFi Spam | Hackaday
Unix Tell All Book From Kernighan Hits The Shelves | Hackaday
Testing Suspicious emails using Windows Sandbox | Tallan Blog
Creating a PowerShell Backup System Part 2 • The Lonely Administrator
Creating a PowerShell Backup System • The Lonely Administrator
Mako “Things I Like”: 2018 – Furrygoat
Mako “Things I Like”: 2017 – Furrygoat
CPU and Device Shares in Libvirt – ZenCoffee Blog – random notes, guides, and thoughts…
High Disk I/O Usage - Part Two – ZenCoffee Blog – random notes, guides, and thoughts…
High Disk I/O Usage by a VM? – ZenCoffee Blog – random notes, guides, and thoughts…
How to use Java 13 features with Java 8-Part 4( JDeps and multi-jars)
How to use Java 13 features with Java 8- Part 3 (How to find deprecated methods)
How to use Java 13 features with Java 8- Part 2 (Adding support modules)
How to use Java 13 features with Java 8- Part 1
How to use Java 13 features with Java 8- Part 1
3 reasons Java developers switch to JDeli from ImageIO
Improved Garbage Collection in Java 13
The Open Source Smart Home | Hackaday
An Open Hardware Laser Engraver For Everyone | Hackaday
Will The Real UNIX Please Stand Up? | Hackaday
RPi4: Now Overclocked, Net-Booted, And Power-Sipping | Hackaday
Career Development: A Guide for Mentoring Your Employees – Ideas
Bash Script to Generate Patching Compliance Report on CentOS/RHEL Systems | 2daygeek.com
The City Of Baltimore Blew Off A $76,000 Ransomware Demand Only To Find Out A Bunch Of Its Data Had Never Been Backed Up | Techdirt
4 Way to Find Which Process is Listening on a Specific Port - Putorius
The Top & Fastest Growing Open Source Projects On GitHub In 2019
A sysadmin's guide to configuring an email server | Enable Sysadmin
6 Excellent Free Books to Learn TeX - LinuxLinks
How automation can boost your security compliance | TechBeacon
Basic troubleshooting with telnet and netcat | Enable Sysadmin
4 container usage takeaways from the 2019 Sysdig report - Red Hat Developer
» Small computers find an industrial niche
Cyber Defense | 16 Things to Know About John Hubbard and our NEW SEC450: Blue Team Fundamentals - Security Operations and Analysis course | Part 2 | SANS Institute
Cyber Defense | 16 Things to Know About John Hubbard and our NEW SEC450: Blue Team Fundamentals - Security Operations and Analysis course | Part 1 | SANS Institute
Five Main Differences between SIEM and UEBA
Point-in-time vs. Real-time Analysis Manual vs. Automated Threat Hunting Logs vs. Multiple Data Types Short vs. Long-Term Analysis Alerts vs. Risk Scores
Myth Busters: How to Securely Migrate to the Cloud
Human-Centered Security: What It Means for Your Organization
All Cybersecurity Is Not Created Equal - Linux Included
Security, Privacy and Confidentiality: What's the Difference? - Mike Chapple, CISSP, Ph.D.Mike Chapple, CISSP, Ph.D.
Windows Incident Response: Registry Analysis
Windows Incident Response: A Brief History of DFIR Time, pt II
Ineffective Response and Perverse Insurance Incentives Compound Ransomware Problems | Security Architects Partners
Enterprise DevSecOps: How Security Works With Development
MegaCortex Ransomware Changes Windows User Password | Born's Tech and Windows World
PowerShell – Run command in Batches of 100 | geekdudes
IBM and McAfee primary backers of new open source cybersecurity group | FierceTelecom
Open source Raspberry Pi microscope project - Geeky Gadgets
Things to Do Before Starting Your Own Business – Business Ideas
Released: SQL Assessment API (GA) - Microsoft Tech Community - 989677
The Nonprofit's Guide To Inclusive Walking Meetings: Strolling Meetings | Beth's Blog
Seeing what changed in a docker containers file system -- Prefetch Technologies
A Pattern Language | Cool Tools
DeployHappiness | AD Documentation and Health Checks with PowerShell
What do we say to health checking Active Directory? – Evotec
Ransomware Payments Rise as Public Sector is Targeted, New Variants Enter the Market
Ransomware Sentiment After a Summer of Headlines
Windows 7 Extended Security Updates (ESU) reuirements | Born's Tech and Windows World
40 Useful Linux Network Commands for Modern SysAdmins
What Are The Best Books For AI For Beginners? - Fossbytes
Artificial Intelligence – A Modern Approach (3rd Edition) Life 3.0: Being Human in the Age of Artificial Intelligence Artificial Intelligence: The Basics Speech and Language Processing Deep Learning (Adaptive Computation and Machine Learning series)
GIT Flashcards
Servicing Update for SQL Server 2019 RTM (GDR) - Microsoft Tech Community - 978207
Announcing Performance Optimized Storage Configuration for SQL Server on Azure VMs with SQL VM RP - Microsoft Tech Community - 891583
APEX 19.2 : Vagrant and Docker Builds | The ORACLE-BASE Blog
Midlands Microsoft 365 and Azure User Group – November 2019 | The ORACLE-BASE Blog
5 ways for healthcare providers to build a fortress against cyber threats
Educate employees about phishing attacks. Beware of ransomware. Have a top-down security program. Make sure vendors have protection. Update passwords often.
New system helps defend critical infrastructure from attack
Insecure file transfers leave organizations at risk
Understanding the network plumbing that makes Kubernetes pods and services work -- Prefetch Technologies
Penetration Tests Take Hackers To A Whole New Level - LinuxTechLab
EU patches 20-year-old open source vulnerability
The Leading Causes of IT Outages - and How to Prevent Them | APMdigest - Application Performance Management
Java License Fallout Continues Impacting IBM i Shops - IT Jungle
GNU Health: 10 years of Freedom and Equity in Healthcare | MeanMicio
New Performance Monitor for Windows Server - Thomas Maurer
Talking About Cloud Computing - 2019 | DennisKennedy.Blog
A Guide to Cable Management – Running Your Business
Dell EMC Enterprise Storage Analytics 5.0 – Dell EMC PowerMax with VMware
Playing Blu-Ray discs with VLC | Fun with virtualization
Understanding Premium Azure File Storage – Notes from MWhite
Top 20 Best Linux NAS Solutions and Linux SAN Software
Snuffleupagus: Open source security tool hardens PHP sites against cyber-attacks | The Daily Swig
The goldsmith and the chaos warrior: a typology of workers – The Open Sourcerer
How to Install and Use a Vulnerability Scanner in Linux - Make Tech Easier
» company it takedown by ransomeware by 0-day in the Bonjour utility for iTunes – followup to emotet and trickbot | dwaves.org
Background Checks: A Hiring Essential – Administrivia Learn What to Expect
An Illustrated Guide to Some Useful Command Line Tools - WezM.net by Wesley Moore
Product vs. project in open source | Opensource.com
First Windows 'BlueKeep' Attacks Spotted Installing Cryptocurrency Miners
Norsk Hydro reveals initial cyber insurance payout | Insurance Business
Cloning a MAC address to bypass a captive portal - Fedora Magazine
Bootlin's Best Techniques For A Smaller Kernel + Faster Boot Times - Phoronix
25 Python Logging examples – Linux Hint
The Enough Curve: Consider the Ongoing Costs Of Your Purchases — My Money Blog
How to Use Static and Dynamic Inventories in Ansible - Part 4
Bash Read Comma Separated CSV File on Linux / Unix - nixCraft
Taking Itinerary to the Next Level – Kai Uwe's Blog
Understanding Boxplots | Codementor
The simplest dpkg you will ever build - James
Import VirtualBox Images to GNS3 – Linux Security Blog
Explaining Docker Volumes With Examples - OSTechNix
Awk one-liners and scripts to help you sort text files | Opensource.com
6 remarkable features of the new United Nations open source initiative | Opensource.com
Sixi 2, An Open Source 3D Printable 6 Axis Robot Arm | Hackaday
darkport | Ahh shhgit!
Supercharge your research: a ten-week plan for open data science
How to Enable Timestamp in Linux History Command Output
Microwaves enable painless, radiation-free mammography - Japan Today
Getting Started with Haxe - Programming Blog
My Metasploit Cheat Sheet - krypted
SQL Server Books
Your Dashboards Still Suck - Thomas LaRock
HOWTO: Use Domain and OU Filtering to limit the objects in scope for Azure AD Connect - The things that are better left unspoken
DHCP Does Not Set Default Gateway – Thin Light
Learn about Azure Stack Migration in this Video Series - Thomas Maurer
Hyperconverged Infrastructure Part 1 - A Modern Infrastructure for Modern Manufacturing | APMdigest - Application Performance Management
System Logs on ESXi Host are Stored On Non-Persistent Storage | Windows OS Hub
How to Measure Storage Performance and IOPS on Windows? | Windows OS Hub
On the Usability of OSI Layered Networking Model « ipSpace.net blog
Saved: TCP Is the Most Expensive Part of Your Data Center « ipSpace.net blog
How Complex Systems Fail - How Complex Systems Fail.pdf
Samba 4.12 Bringing Much Faster Encryption Performance With GnuTLS - Phoronix
BlueKeep now being used in attacks – but the sky isn’t falling @ AskWoody
Migrating an EFI Linux Install to a new Server – blog.kroy.io
Windows 10 v1903: Mouse stutter with RDP sessions | Born's Tech and Windows World
Windows: Timeout with TLS connections [Workaround] | Born's Tech and Windows World
VMware ESXi 6.5, Patch Release ESXi650-201910001 | Born's Tech and Windows World
System76 Launches Two Linux Laptops Powered by Coreboot Open-Source Firmware - Updated
Get server(s) power consumption | panticz.de
Using PowerShell ArrayLists and Arrays [Tutorial]
How to Find your Next Awesome Tech Job
The Windows Virtual Desktop Technology Partner Cheat Sheet v2.0
How to Install Stratis to Manage Layered Local Storage on RHEL 8
10 Best Flowchart and Diagramming Software for Linux
How to Configure Ansible Managed Nodes and Run ad-hoc Commands - Part 3
How to Install and Configure an Ansible Control Node - Part 2
Understand Core Components of Ansible - Part 1
Setup a Centralized Log Server with Rsyslog in CentOS/RHEL 8
VMware’s Joe Beda: Enterprise Open Source Is Growing
online home renovation platform
How to Create a Windows 10 Installer USB from Linux - Make Tech Easier
UNIX Co-Founder Ken Thompson's BSD Password Finally Cracked
Agile project management: 10 reasons to use it | The Enterprisers Project
DHCP + PING = DHCPING = Testing DHCP Availability - Putorius
Linux find NVMe SSD temperature using command line - nixCraft
Power Cycling PCIe Devices from the Command Line – CubicleNate's Techpad
Malware uses web apps to turn PCs into conduits for attacks | Engadget
Review: Keyboardio Model 01 keyboard
How to Install TWRP
TWRP and Android 10
MIT’s algorithm could improve imaging techniques used during pregnancy | Engadget
Wisconsin firms hope to make radioactive isotopes for nuclear medicine (updated) | Engadget
Google wants to give doctors web-like searches for medical records | Engadget
APEX 19.2 Download Available | The ORACLE-BASE Blog
What’s new with Oracle database 19.5 versus 19.4 | Frits Hoogland Weblog
What’s new with Oracle database 18.8 versus 18.7 | Frits Hoogland Weblog
The Complexity Defense and Other DBA Crimes
Changing Your Bash Shell Prompt and Colors
Erman Arslan's Oracle Blog: ODA-- Health Check Reports // the control points & the subtitles
Erman Arslan's Oracle Blog: ODA X6-2 HA -- Virtualized // Network Architecture / Internal NFS and fault tolerant cabling
Get TLS for OpenFaaS the easy way with k3sup
Unix50 – Unix Today and Tomorrow: Future of Compute & Platforms: The Kernel | Fun with virtualization
Just one more esxi-guy: Some cool esxcli iscsi commands
Just one more esxi-guy: Some cool esxcli system commands
LiveCDCustomization - Community Help Wiki
Weekend Project: Create a Live USB Key Linux Distribution - Linux.com
How to Troubleshoot Java CPU Usage Issues | APMdigest - Application Performance Management
Provisioning a AKS cluster and KubeInvaders with Terraform - Blog dbi services
Is Wannacry back? | Born's Tech and Windows World
AI can help doctors spot brain hemorrhages faster | Engadget
New version of Upgrade / Migrate / Consolidate to Oracle 19c uploaded
DoD's $10 billion 'Jedi' cloud contract goes to Microsoft over Amazon | Engadget
LucidLink Filespaces: It’s Object Storage But Not As You Know It – Ather Beg's Useful Thoughts
Creating a VM on Oracle Always Free « Oralytics
Oracle memory troubleshooting using analysis on heapdumps, part 2 | Frits Hoogland Weblog
Oracle memory troubleshooting using analysis on heapdumps | Frits Hoogland Weblog
10 Tips for Standing Out in a Job Interview – Business Ideas
The secret to easy organisational change: hacking the org. | The IT Skeptic
Kill the restructure | The IT Skeptic
Free Microsoft Teams Course from Microsoft Learn - Tom Talks
Technical Renewal Cycles - SysAdmin1138 Expounds
Updating “Weird Al” Yankovic’s track It’s All About The Pentiums – Stick To The Script
Group Policy Preferences and Client Side Extensions | PeteNetLive
PowerCLI: Connect-VIServer Certificate Errors | PeteNetLive
Chris's Wiki :: blog/solaris/ZFSFullQuotaPerformanceIssue
Chris's Wiki :: blog/programming/TestsNotInCIProblem
Use PowerShell to Get Drive List and Capacity | Life of a Geek Admin
Python – Search registry key | geekdudes
PowerShell – password expiration reminder | geekdudes
Windows 7 Extended Security Updates (ESU) Explained - Daniel Engberg
Cyber attac (DDoS) at Amazon AWS | Born's Tech and Windows World
Microsoft Introduces Secured Core PCs w. Firmware Protection | Born's Tech and Windows World
Understanding LDIF: LDF Files for LDAP Directories
New-ADUser: Creating Active Directory Users with PowerShell
Notes client doesn’t launch after upgrade: SOLVED | The Notes Guy in Seattle
20 years in IT, here’s what I’ve picked up along the way
The Great Rack Migration – D1541 – blog.kroy.io
Configuring HP BIOS settings using Intune Win32app and PowerShell – CCMEXEC.COM – Enterprise Mobility
IT failure stops production at German car manufaturer Porsche | Born's Tech and Windows World
Ransomware hits global shipping company Pitney Bowes | Born's Tech and Windows World
Cyber attacks at Rheinmetall and Airbus contractors | Born's Tech and Windows World
Microservices architecture best and worst practices – Dimitri's Wanderings
Managing Legacy Backups - Architecting IT
4 Extra-Curricular Activities You Should Engage Children In | Penniless Parenting
The DRY Principle: How to Write Better PowerShell Code
Automating Azure Usage Reports with PowerShell
Essential Steps for Starting a Business – Business for Beginners
What happened to Early Retirement Extreme? An update from Jacob Lund Fisker
Yes, Health Insurance Costs Impacted My Early Retirement (FIRE) Plans — My Money Blog
Electronic Signature: 4 Important Ways to Use It – Running Your Business
Travel Tech for my 10 days of travel with my parents to Germany, Austria, Czech Republic and Italy before and after 2019 Veeam Vanguard Summit in Prague | TinkerTry IT @ Home
Homelab part 2 -
m
DTA 537000 – VMFS corruption with XCOPY – Dell EMC PowerMax with VMware
vCenter Server Appliance: A Tale of Rejuvenation – doOdzZZ'sNotes
Updating vSphere Customized Images: The VIB Space Conflict – doOdzZZ'sNotes
Building a Home Fibre Router Firewall | Long White Virtual Clouds
Change management VLAN on Ubiquiti UniFi Hardware and Controller - The time I've wasted on technology...
Available for IT Consulting Services - The time I've wasted on technology...
Another Vester Test file generator and more vCenter checks | Adventures in a Virtual World
Kubernetes Homelab with Raspberry Pi and k3sup
OpenFaaS Cloud for Development
Get a LoadBalancer for your private Kubernetes cluster
What is Microsoft Stream? - SharePoint Maven
Solr Sharding - Concepts & Methods - Blog dbi services
CBO Oddities – 1 | Oracle Scratchpad
Patching all my environments with the Oct 2019 Patch Bundles
Oracle Fail Safe is deprecated with Oracle Database 19c
Creating a customized PostgreSQL container using buildah - Blog dbi services
Oracle 19c - Blog dbi services
Migrating Oracle database from windows to ODA - Blog dbi services
Using non-root SQL Server containers on Docker and K8s - Blog dbi services
Oracle on Azure- Options, Options, Options
Solving accountability for ssh/linux servers without creating personal accounts | Frits Hoogland Weblog
What’s new with Oracle database 19.4 versus 19.3 | Frits Hoogland Weblog
What’s new with Oracle database 18.7 versus 18.6 | Frits Hoogland Weblog
What’s new with Oracle database 12.2.0.1.190416 versus 12.2.0.1.190716 | Frits Hoogland Weblog
When it comes to deduplication, block size is critical | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
Migrating from PowerShell ISE to Visual Studio Code | The Frog Pond of Technology
Getting SQL Server installation date with PowerShell using dbatools | SQL DBA with A Beard
USB Storage with iOS 13: The FAQ - TidBITS
When terms shift - SysAdmin1138 Expounds
GitHub - RolandPheasant/TailBlazer: A modern file tail utility based on Rx.Net which show cases reactive programming and Dynamic Data (see https://github.com/RolandPheasant/DynamicData)
Managing Windows Updates with Group Policy – Stick To The Script
Find The Azure AD Join Type | PeteNetLive
Chris's Wiki :: blog/spam/MalwareBeingClear
Python fundamentals part IV – Scope resolution – LEGB rule | geekdudes
Python fundamentals part V – importing modules | geekdudes
Disk > Mdadm > LVM – it's notes
Pyhon fundamentals part VI – OOP concepts | geekdudes
Building an Active Directory Health Check Tool [In-Depth]: Part II
Building an Active Directory Health Check Tool [In-Depth]: Part I
Configuring Dell BIOS Settings using Intune Win32App and PowerShell – CCMEXEC.COM – Enterprise Mobility
The latest supported Visual C++ downloads
Why Debian Is the Gold Standard of Upstream Desktop Linux | FOSS Force
An overview of compliance features in SharePoint and Office 365 - SharePoint Maven
Subplot
Tips on how to take Microsoft Azure Certification Exams - Thomas Maurer
How Americans Spend Their Money » Money Boss
How to Change the Windows Terminal Background Image - Thomas Maurer
Ways to access data in ADLS Gen2 | James Serra's Blog
Image based upgrades: Upgrading software and OS of 80k servers every two weeks - Philipp's Tech Blog
Domain Controller Cloning on VMware vSphere - The things that are better left unspoken
Chris's Wiki :: blog/sysadmin/BinatAndSplitHorizonDNS
How to Backup AWS S3 Buckets – it's notes
The Perfect Media Server 2017
Install minio Ubuntu – it's notes
restic with MinIO Server – it's notes
Powershell – Check if machine IP is in range | geekdudes
Powershell – Get Memory,CPU and Free Disk space | geekdudes
Chris's Wiki :: blog/unix/ChrootFtpdAndContexts
Windows 7/Server 2008/R2: 0patch delivers security patches after support ends | Born's Tech and Windows World
Powershell Script to Configure Outlook Signatures - Daniel Engberg
Python fundamentals part III – Boolean,for loops,while,zip,iterators,functions,args and kwargs | geekdudes
Python fundamentals part II – file manipulation | geekdudes
Python fundamentals part I – basic data types | geekdudes
Your Guide to Updating to PowerShell 7
Hacking a serial port into an EdgeRouter X – blog.kroy.io
Microsoft Security Update Summary (September 10, 2019) | Born's Tech and Windows World
Chris's Wiki :: blog/sysadmin/PrometheusFindUnpairedMetrics
Chris's Wiki :: blog/programming/GoBinaryStructureNotes
PowerShell WhatIf: How Your Bacon is Saved
NuGet and IIS on Windows Server: Ultimate Guide
PsExec: The Ultimate Guide
Chris's Wiki :: blog/tech/TLSCertVerifyTwoParts
NJCCIC
Writing_Style_Guide.pdf
Waves at Bessel-on-Sea | Tinkerings
A dentist made a game in MS Paint and it's terrifying
Not even Allbirds is safe from Amazon's copycat ways
ClearView – Zero Configuration Web Server Monitoring Tool – Techno Chat|Tech Blog!!
The Value of Training and Certification at VMworld 2019 Europe - VMware Education Services
“team members who have been through VMware training are much more resourceful and valuable to the organization than those who have not.”
Why an IT Guy Is Essential in 2019 – Running Your Business
Be careful when using DAOS and compact -c -ZU | eknori.de
As of Domino 10.0.1 FP2, -ZU will pull all attachments of a DAOS enabled application back into the application!
Oracle 19c : Point-In-Time Recovery in a PDB - Blog dbi services
When Read-Scale availability groups and Windows Failover Cluster are not good friends - Blog dbi services
About VMSA, CVE, CVSS and more | Adventures in a Virtual World
The Five Pressures of Leadership
1. Unclear boundaries 2. Pay 3. Working with volunteers 4. Burden of responsibility 5. Loneliness
Virtualization The Future: How to Create Custom Docker Images - Part 8
State Farm Security Fail – The Wacky World of Chris Knight
Basics: Handling a Failed Backup | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, PowerProtect, CSM
Multitenant : Massive Changes in 19c and 20c | The ORACLE-BASE Blog
ODA X8-2: the new generation - Blog dbi services
Redefining Hyper Converged Infrastructure — ThinkCharles.net
Terraform Cloud – Step by step configuration | JohannStander
SAN vs. NAS: Comparing two approaches to data storage | Enable Sysadmin
Blue's Yeti X microphone comes with everything you need to sound like a pro
AI can gauge the risk of dying from heart conditions
If you’re not using SSH certificates you’re doing SSH wrong - smallstep
Moving oracle database to new home on ODA - Blog dbi services
Millions of Americans' medical records are out in the open on the internet
Alleged JPMorgan hacker set to plead guilty
Andrei Tyurin
SIM-based attack has been used to spy on people for two years
ANSI or Oracle Style Joins? – ThatJeffSmith
Ansible Blocks With Conditionals - EverythingShouldBeVirtual
Installing the windows subsystem for linux and use Terraform with VS Code | JohannStander
Checking power settings on VMs using powershell • My Virtual Vision
The Memory/Storage Hierarchy | The SSD Guy
Cyber Security Roundup for August 2019 - Security Boulevard
Scaling-Up and Automating Web Application Security - Security Boulevard
How to get a big picture of K8s pods and PVs by script - Blog dbi services
Taking Health Care Out of the Ransomware Hot Seat - Security Boulevard
What is the CCPA and Who Must Comply? The California Consumer Privacy Act Explained - Security Boulevard
Top 5 Back to School AppSec Tips for Developers
#1 Be Security Minded #2 Embrace Automated Testing #3 Keep Your Code Secure from Prying Eyes #4 Keep Your Dependencies Up to Date #5 Beware the Input Validation Error — Test, Test, Test
A Cyber Incident Response Plan for Your Web Applications - Security Boulevard
Why Most Organizations Still Can’t Defend against DCShadow – Part 2 - Semperis
Why Most Organizations Still Can’t Defend against DCShadow - Semperis
CISOs in the Boardroom: Translating Tactical Cybersecurity into Business Objectives - Security Boulevard
What’s it like being a cybersecurity risk analyst? - Security Boulevard
Review of Apache Struts vulnerabilities yields 24 updated advisories - Security Boulevard
Serverless Security Explained - Security Boulevard
How GDPR, CCPA impact healthcare compliance - Security Boulevard
50 Valuable PCI Compliance Tips
5 Modern Skills for Modern Chief Information Officer (CISO)
1. Financial Fluency 2. Communication Skills 3. Empathy 4. Technical Chops 5. Ambition
Three Ways for Healthcare to Handle Cyber Threats - Security Boulevard
How to Address PCI DSS Requirement 6.6 — A Two-For-One Solution From Threat Stack - Security Boulevard
HOWTO: Handle Windows Activation on non-domain-joined Web Application Proxies - The things that are better left unspoken
Overview of NIST 800-171b: What you need to know
URGENT/11 – New ICS Threat Signatures by Nozomi Networks Labs - Security Boulevard
The Benefits, Characteristics and Components of Flyaway Kits for Incident Response | Bricata
Detecting Cars With An ESP8266 Magnetometer | Hackaday
Migration to Github Pages! – ZenCoffee Blog – random notes, guides, and thoughts…
Kubernetes Pentest Methodology Part 2 | CyberArk
Kubernetes Pentest Methodology Part 1 | CyberArk
The Top Five Cybersecurity Issues Trending in 2019 - Security Boulevard
1. Phishing Attacks 2. IoT Ransomware 3. Increased Data Privacy Regulation 4. Cyber Attacks on Mobile Devices 5. Increased investment in automation
Understanding CCPA: It's Time to Action a Plan for Compliance - Security Boulevard
7 most common application backdoors
The Four Pillars of CASB: Threat Protection
20 Surprising IoT Statistics You Don’t Already Know - Security Boulevard
SSH Key Management Without the Hassle | JumpCloud
How To Handle HIPAA Compliance with Serverless Security | Protego
HIPAA Compliance Checklist - Threat Stack
10 of the Most Significant Ransomware Attacks of All Time
Introducing Accelerated Database Recovery with SQL Server 2019 - Blog dbi services
Transaction / Regular Paper Title - govins20.pdf
The Cyberwar In Yemen - VICE
InfoSec Handlers Diary Blog - Verifying SSL/TLS configuration (part 1)
The Cost of Dealing With a Cybersecurity Attack in These 4 IndustriesSecurity Affairs
Healthcare providers can improve their third-party vendor management  - Security Boulevard
Zero Day Initiative — The August 2019 Security Update Review
Windows Incident Response: A Brief History of DFIR Time, pt I
The five basic data privacy rules - VinciWorks Blog
Privilege Escalation Cheatsheet (Vulnhub)
Guide to Red Team Operations
NBlog - the NoticeBored blog: NBlog Aug 20 - cyber-insurance standard published
NBlog - the NoticeBored blog: NBlog Aug 19 - extending the CIS security controls
Pentagon Buys Equipment With Known Vulnerabilities: Audit
Firmware Slap - Discovering Vulnerabilities In Firmware Through Concolic Analysis And Function Clustering
VulnWhisperer - Create Actionable Data From Your Vulnerability Scans
Backup is Your Responsibility - Even in Public Cloud - Architecting IT
More Than 99% of Cyberattacks Need Victims' Help
Remembering Gene Crick, Digital Rights Pioneer | Electronic Frontier Foundation
Automated incident response in Office 365 ATP now generally available
OWASP ASVS Version 4.0 Controls Checklist Spreadsheet + 5 Benefits | Pivot Point Security
OWASP ASVS
Securing Software on Healthcare IoT Devices - ShiftLeft Blog
Build a Kali Linux ISO with the latest OS patches and packages | slice2
Apache Struts Security Advisories updated after review | Synopsys
History Doesn't Repeat Itself in Cyberspace
8 Head-Turning Ransomware Attacks to Hit City ...
Demystifying New FIDO Standards & Innovations
Transforming 'Tangible Security' into a Competitive ...
Calculating the Value of Security
The 10 Essentials of Infosec Forensics
'IBM PC Compatible': How Adversarial Interoperability Saved PCs From Monopolization | Electronic Frontier Foundation
Retadup Worm Squashed After Infecting 850K Machines
Retadup
Annual global data breach costs to exceed $5 trillion by 2024: report
ThreatList: 4.1B Records Exposed in Breaches in First Half of 2019 | Threatpost
NIST Lays Out Roadmap for Developing Artificial Intelligence Standards - Nextgov
The health record interoperability dilemma
'It Saved Our Community': 16 Realistic Ransomware ...
It's Not Healthy to Confuse Compliance with Security
The Philosophy Behind My New Product Discovery Idea | Daniel Miessler
GitHub - toniblyx/my-arsenal-of-aws-security-tools: List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Very Short Introduction to Data Science Terminology
Understand Machine Learning in 6 Minutes - Towards Data Science
4 to-do list managers for the Linux desktop | Opensource.com
4 Different Rules of Thumb For How Much House You Can Afford — My Money Blog
Causes of Wealth: Reality vs. News Coverage — My Money Blog
Supply-Chain Security in Open-Source Software « ipSpace.net blog
An Open Letter To IT Recruiters | Advanced Persistent Security
Improving BGP routing security by minding your MANRS | CSO Online
Can VMware become a leading cybersecurity vendor? | CSO Online
4 Reasons Waiting to Switch to the Cloud May Cost You | CSO Online
Why cybersecurity is a central ingredient in evolving digital business models | CSO Online
Summary: Never Split the Difference | Daniel Miessler
A Conversation with Ken Modeste | Daniel Miessler
Day-1 Skills That Cybersecurity Hiring Managers Are Looking For | Daniel Miessler
The Definition of a Green Team | Daniel Miessler
How to Check the Software and Hardware Version of a Raspberry Pi | ozzmaker.com
VMware Tools installation and upgrade tips and tricks - ivobeerens.nl
Nmap Idle Scan tutorial – Linux Hint
Adding Third-Party Drivers into VMWare ESXi 6.7 ISO Image | Windows OS Hub
VMWare ESXi Doesn’t Detect FC HBA adapters | Windows OS Hub
Say hello to Isaac Computer Science - Raspberry Pi
From 1999 to 2017: PCI Continues to Evolve | Sword & Shield
CERIAS Blog - CERIAS - Purdue University
Cyber Security Hall of Fame 2019 Inductees - CERIAS - Purdue University
8 hot IT security jobs and what they pay | CSO Online
Leader of new NSA Cybersecurity Directorate outlines threats, objectives | CSO Online
Insecure virtual USB feature in Supermicro BMCs exposes servers to attack | CSO Online
5 signs your security culture is toxic (and 5 ways to fix it) | CSO Online
Data privacy in the IoT age: 4 steps for reducing risk | CSO Online
7 steps to ensure your Azure backup works when you need it | CSO Online
What is the cost of a data breach? | CSO Online
e
Ransomware Gaining Momentum | Advanced Persistent Security
Intro to Malware Dynamic Analysis: Part 5 | Advanced Persistent Security
Intro to Malware Dynamic Analysis: Part 4 | Advanced Persistent Security
Intro to Malware Dynamic Analysis: Part 3 | Advanced Persistent Security
Intro to Malware Dynamic Analysis: Part 2 | Advanced Persistent Security
Intro to Malware Dynamic Analysis: Part 1 | Advanced Persistent Security
Researchers Discover Vulnerable SCADA Product & Responsive SCADA Vendor – RBS
Incident Response report 2018 | Securelist
Robert Penz Blog » Proxmox Container with Debian 10 does not work after upgrade
Overview of LEAPWORK Web Automating Tool - EvilTester.com
AWS High Performance Storage – Gabe's Blog
Google Online Security Blog: How Google adopted BeyondCorp: Part 2 (devices)
Google Online Security Blog: How Google adopted BeyondCorp
Three Strategies to Avoid Becoming the Next Capital One
Azure Guest Users - Risks and Security Considerations
Verizon White Paper: CISO’s Guide to Cloud SecurityRafeeq Rehman – Personal Blog
CISO MindMap 2019: What Do InfoSec Professionals Really Do?Rafeeq Rehman – Personal Blog
What Are the Benefits of Cyber Exercises? - Delta Risk
Top 10 Uses of Wireshark for Hackers Part II - The Ethical Hacker Network
Notes on ZFS / Solaris forensics | DiabloHorn
A Consumer’s Guide to Protecting Important Data From Ransomware
ZigDiggity - ZigBee Hacking Toolkit
Securing the Cloud: A Story of Research, Discovery, and Disclosure - Black Hills Information Security
Getting IT & OT to speak the common language of IIoT vulnerability management
SMBs focused on improving IT security
The breach prevention playbook
Security professionals now think cloud is safer than on-premise
8 Ridiculous EULA Clauses You May Have Already Agreed To
3 Android Motion Sensor Security Risks and How to Stay Safe
How to Build a Mind Map in Microsoft Word
How to Use OneNote for School: 10 Tips for Students and Teachers
The 11 Best Raspberry Pi Projects for Beginners
eDiscovery Checklist Manifesto
Linked: Don’t worry about shadow IT. Shadow IoT is much worse.
Is USB blocking misguided security? - The Silicon Underground
Reviews of the NanoVNA: An Ultra Low Cost $50 Vector Network Analyzer
Cognitive Governance: 5 Principles | TheGRCBlueBook
Cognitive Governance: The First Pillar of a Cognitive Risk Framework | TheGRCBlueBook
Five More L&D Books for Learning Professionals
Performance Evaluations: What Not to Do » Public Libraries Online
PowerShell: Add All Members of an OU to a Security Group | PeteNetLive
When Experienced Women Engineers Look for New Jobs, They Prioritize Trust and Growth — The WordPress.com Blog
DSHR's Blog: Optical Media Durability: Update
Java mon amour: docker cheat sheets
Java mon amour: awesome Kubernetes Best Practices videos
Java mon amour: WebLogic, dramatic reduction of TLS sessions creation by rejectClientInitiatedRenegotiation
Java 13 articles index-What is new in Java and other tutorials
SWAPGS: Meltdown may be over, Spectre looms – Marksei
How to pick the right Azure Exam Certification Path - Thomas Maurer
Under The Stairs: Many Things Go Well with PowerShell 7 - But Not All!
Securing Virtual Machines with Azure Bastion - byronpate.com
Kubernetes Visually - With VMware Octant - The IT Hollow
Fail2Ban, iptables and config management – The ongoing struggle
How to Save Money on Azure using Azure Reservations - Thomas Maurer
Prevent mistakes with Azure Resource Locks - Stuart Moore
Recession is coming - SysAdmin1138 Expounds
Creating Multi-Part Ansible Playbook With Variables - NetApp and VMware
Microsoft: Flash in Browser will be removed end of 2020! | Born's Tech and Windows World
Windows 7: Free Extended Update Support and usage | Born's Tech and Windows World
Chris's Wiki :: blog/python/Python3AndCentOS7
Chris's Wiki :: blog/solaris/ZFSNotUniversal
Clint Boessen's Blog: Preparing Exchange Topology - PrepareAD, PrepareSchema, PrepareDomain etc
Apache – Hosting multiple SSL/HTTPS PHP Laravel sites using Single IP – CentOS 7 | geekdudes
PowerShell - Executing code at specific times - LazyWinAdmin
PowerShell Productivity Hacks: How I use Get-Command – Mike F Robbins
802.11 bad signal diagnostics (Ubiquiti) | Nelson's log
802.11ac, 802.11ax, and friends | Nelson's log
Open-Sourcing the CoreNIC Firmware - Netronome
Monitoring Home Power Consumption for less than $25 – blog.kroy.io
Fully embracing Docker – blog.kroy.io
Get full control of Windows Update | >_
How to Build an IIS SMTP Relay Server [Tutorial]
PowerShell Import-Csv and Export-Csv: The CSV Whisperers
Marketing: The Most Important Skill Engineers Think They Don't Need
How to Turn your Script into a PowerShell GUI (WPF)
An application-focused backup inventory - Architecting IT
The Expanding Storage Hierarchy - Architecting IT
Battle of the Virtual Routers – blog.kroy.io
Building a ZFS on Linux Fileserver – blog.kroy.io
The ZFS walk-of-shame with Seagate and OmniOS CE. – blog.kroy.io
Virtualization The Future: Old Way vs New Way to Run Docker Commands - Part 7
Virtualization The Future: Docker Containers Truly Isolated With Proof!!!!! - Part 6
Virtualization The Future: Docker Commands - Part 5
Virtualization The Future: Docker Installation on Windows Operating System - Part 4
Virtualization The Future: What is Container? - Part 3
Virtualization The Future: What is Docker? - Part 2
Virtualization The Future: Why One Should Use Docker? - Part 1
28 facts about Linux for its 28th birthday
Announcing Oracle Solaris 11.4 SRU12 | Oracle Solaris Blog
Optimize Storage Cost with Reduced Pricing for Amazon EFS Infrequent Access | AWS News Blog
A project manager's guide to Ansible | Opensource.com
HealthyPi v4 open source, wireless, wearable for human vital signs monitoring - Geeky Gadgets
Global reinsurance experts urge investment in open-source risk models
1. Invest in open-source models that provide a long-term view of climate risk and link to insurance solutions. 2. Joined-up policy-making to put climate-risk models at the heart of national adaptation strategies. 3. Develop consistent climate adaptation regulation and standards across countries. 4. Foster insurance innovations that can respond to a changing climate risk landscape. 5. Strengthen dialogue between insurers and policy-makers around Build Back Better. 6. Converge insurance, humanitarian and development agendas. 7. Promote and invest in risk literacy throughout society
Securing DSC resources for VMware | Adventures in a Virtual World
Wear Estimation for Devices with eMMC Flash Memory
First Python Program | Janusworx
Jupyter Notebook for Beginners Tutorial — Dataquest
RHELvolution 2: A brief history of Red Hat Enterprise Linux releases from RHEL 6 to today
Django Optimization: Or how we avoided memory mishaps | Codementor
stylesheet for nmap output
nmap -sC -sV -oA toots toots.dgplug.org --stylesheet nmap-bootstrap.xsl
The continuing rise of Kubernetes analysed: Security struggles and lifecycle learnings - Cloud Tech News
CommonHealth Will Enable Android™ Phone Users to Access and Share their Electronic Health Record Data with Trusted Apps and Partners | BioSpace
CommonHealth
7 tips for sysadmins to improve communication skills | Enable Sysadmin
Introducing Glean — Telemetry for humans - Georg Fritzsche - Medium
Rotating Images in ReportLab - The Mouse Vs. The Python
How to use the LXD Proxy Device to map ports between the host and the containers – Mi blog lah!
Council Post: Open Source Is Poised To Have A Greater Impact On Security
Test & Code - Python Testing & Development 86: Teaching testing best practices with 4 testing maxims - Josh Peak
Nping and Nmap arp scan – Linux Hint
A Cyber Command Operational Update: Clarifying the June 2019 Iran Operation - Lawfare
A Comprehensive Intro to Darktable: A Free Lightroom Alternative
Draw.io is a free Flowchart and diagram creation software for Windows, Linux, macOS and your browser - gHacks Tech News
Most common custom SSH Configurations of the OpenSSH Server - LinuxConfig.org
ESXI 6.7 update: No space left on device | eknori.de
The newest patching surprises - and how to fix some of them
Benchmark Linux systems: Install Sysbench tool - LinuxTechLab
Essential System Tools: hyperfine - command-line benchmarking tool - LinuxLinks
DNS configuration with Ansible | Enable Sysadmin
Thousands Of Linux Servers Infected By Lilu (Lilocked) Ransomware
Configure DNS over TLS on Linux Mint to Protect DNS Privacy
Put A TimeStamp on Bash History | UITS Linux Team
HISTTIMEFORMAT="%d/%m/%y %T "
Memory Ballooning
VirtScreen on openSUSE | Turn a Tablet into a Second Monitor – CubicleNate's Techpad
Connect to Wi-Fi From Terminal on Ubuntu 18.04/19.04 with WPA Supplicant - LinuxBabe
Finally, I Can Make Multiboot USB of openSUSE from Ubuntu
Excellent Free Books to Learn Pascal - LinuxLinks
Why Spinnaker matters to CI/CD | Opensource.com
Who-T: Tuhi - an application to support Wacom SmartPad devices
LDAP Guide Part 4: Schema and Objects — Firstyear's blog-a-log
LDAP Guide Part 3: Filters — Firstyear's blog-a-log
LDAP Guide Part 2: Searching — Firstyear's blog-a-log
LDAP Guide Part 1: Foundations — Firstyear's blog-a-log
Using ramdisks with Cargo — Firstyear's blog-a-log
Raspberry Pi 4 and Raspbian: Two months in, here's what I've learned so far | ZDNet
A Guide to Excel Spreadsheets in Python With openpyxl – Real Python
Combine Multiple Excel Worksheets Into a Single Pandas Dataframe - Practical Business Python
7 years of Django in 7-ish days | tlog
How to Install Windows 3.1 in DOSBox, Set Up Drivers, and Play 16-bit Games
7 Best SNMP Monitoring Tools For Linux
Anatomy of a Linux DNS Lookup – Part V – Two Debug Nightmares – zwischenzugs
Anatomy of a Linux DNS Lookup – Part IV – zwischenzugs
Anatomy of a Linux DNS Lookup – Part III – zwischenzugs
Anatomy of a Linux DNS Lookup – Part II – zwischenzugs
Anatomy of a Linux DNS Lookup – Part I – zwischenzugs
Seven God-Like Bash History Shortcuts You Will Actually Use – zwischenzugs
Nikola - Static Site Generator for your webz
Boostnote is an easy to use open-source, cross-platform note-taking app in active development
Using the LXD Kali container image – Mi blog lah!
Provisioning ESXi with MAAS: An overview | Ubuntu
Multi-tenancy in MAAS | Ubuntu
iTWire - Business losses to cyber crime data breaches to exceed US$5 trillion by 2024
iTWire - Internet Society weighs up the cost to business of cyber security breaches
Making containers safer [LWN.net]
Build a monitoring infrastructure for your Jaeger installation - Red Hat Developer
20 Excellent Free Books to Learn Perl - LinuxLinks
A technical comparison between snaps and debs | Ubuntu
How to Make Your CSO Happy with Your Open Source Components - CPO Magazine
Corelight’s Brian Dye: Data-Driven Approach, Open Source Tools Key to Building Defensive Cyber Program – GovCon Wire
How long before SSDs replace nearline disk drives? – Blocks and Files
Changing the face of computing: UNIX turns 50 - Developer Tech
Glia Is Making Open Medical Devices, And You Can Help | Hackaday
A Clinical Grade Libre/Open Source 3D Printed Otoscope
Thank The NSA For Their Ghidra Software Now Helping Firmware Reverse Engineering - Phoronix
Western Digital's Long Trip from Open Standards to Open Source Chips
Six simple money habits that changed my life
How to Use Budgeting Skills to Improve Your Time Management
LineageOS: Samsung Galaxy Note 3 | panticz.de
F-Droid: A security-conscious repository for Free and Open Source Software (FOSS) applications for Android – The Gadgeteer
Two Researchers Recreate The "Dangerous" OpenAI Text Generator
Ukranian Employees Connect Nuclear Plant To Internet To Mine Cryptocurrency
How secure is DNA testing?
[Howto] Get a Python virtual environment running on RHEL 8 – /home/liquidat
A dozen ways to learn Python | Opensource.com
9 Quick 'mv' Command Practical Examples in Linux
Exadata Upgrade to OL7 and to Oracle 19c
Creating a Normalized Vegetation Index Sensor with two LEDs | Underwater Arduino Data Loggers
CPU Security Mitigation on openSUSE | Tuning it for Your Case – CubicleNate's Techpad
AD Reading: Windows Server 2019 Active Directory Features – Active Directory Security
Announcing VMware Tanzu and Project Pacific - CormacHogan.com
Get faster GitLab runners with a ramdisk · major.io
PowerCLI: vMotion Multiple VMs | PeteNetLive
VMware Converter Slow! | PeteNetLive
How to Measure Cybersecurity - Lawfare
VMware Integrated Openstack Federation Guide and SAML2 ADFS Walkthrough
ZFS: Performance and capacity impact of ashift=9 on 4K sector drives
VMworld 2019: Top Security Keynotes and Sessions You Should Attend
Chris's Wiki :: blog/solaris/ZFS4KDiskWithAshift9
ashift=12
Add machine to Nagios using Ansible | geekdudes
How To Monitor SSD Health Status on VMware ESXi Host | KC's Blog
HOWTO: Find NAV user running long SQL queries – Please Work
Divorce dispute leads to accusation of crime in space
Battle of the Virtual Routers
FDA to trial innovative computer-assisted heart surgeries this fall
How to use StarWind VSAN As a Resilient and Highly Available Shared Storage | ESX Virtualization
Z-Wave best hubs: Ring, SmartThings, Aeotec and more - 9to5Toys
How to Write Better Scripts with PowerShell Modules
Mastercard: Data leak larger than feared | Born's Tech and Windows World
Robocopy: The Ultimate Guide
Migrating a Ubiquiti Unifi Controller to run on a Raspberry Pi for Pennies - Doug Rathbone
Demystifying Active Directory and LDAP Filters in PowerShell
Report: The new .NET updates break Veritas Backup Exec @ AskWoody
Useful Linux commands for an Oracle DBA - Blog dbi services
Dissecting 190716 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
Humair's Blogs » Blog Archive » Second VMware Press Book Published – My Thoughts and Tips
Unbuntu, Android Studio and Emulated Google ChromeOS – Michelle Laverick…
LXD with OpenvSwitch network | panticz.de
Install: tinyproxy | panticz.de
How To Find USB Device Bandwidth Usage On Linux - OSTechNix
Six practical use cases for Nmap | Enable Sysadmin
Hubstaff - Work Time Tracking Software for Productive Teams
Share Your Keyboard and Mouse Between Linux and Raspberry Pi - It's FOSS
Which financial advice should you trust?
Maximizing Retirement Time: Being Flexible in Both Work Income and Spending — My Money Blog
Birmingham Digital & DevOps Meetup : August 2019 | The ORACLE-BASE Blog
The Difference Between Data, Information, and Intelligence | Daniel Miessler
How to Setup SSH Passwordless Login in Debian 10
A compendium of container escapes - Help Net Security
How To Set up Automatic Security Update (Unattended Upgrades) on Debian/Ubuntu? | 2daygeek.com
KVM: Windows 7 VM | panticz.de
PyFunnels: Data Normalization for InfoSec Workflows - Black Hills Information Security
Apache Software Foundation's Code-Base Valued At $20 Billion USD - Phoronix
Patchday Windows 10 Updates (August 13, 2019) | Born's Tech and Windows World
Patchday: Updates for Windows 7/8.1/Server (August 13, 2019) | Born's Tech and Windows World
Microsoft Security Update Summary (August 13, 2019) | Born's Tech and Windows World
Chris's Wiki :: blog/linux/OOMKillerWhen
Chris's Wiki :: blog/linux/NoMemoryButNoOOM
How To Create a Menu Selection Script in Powershell - Daniel Engberg
The lifecycle of infrastructure at a standard-pattern cloudy startup - SysAdmin1138 Expounds
Replication considerations for Domain Controllers running on VMware vSphere - The things that are better left unspoken
Windows: Critical Patches (CVE-2019-1181/CVE-2019-1182) August 13, 2019 | Born's Tech and Windows World
CVE-2019-1181 CVE-2019-1182
Running Your Own Encrypted DNS Server for Fun and Profit | badllama.com
August 2019 Security patches: It’s a biiiiiiiiig month @ AskWoody
"Now is the best time I've ever seen to get into LegalTech" - Legal IT Today | DennisKennedy.Blog
Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope | CSO Online
3 ways security is improving While there is a lot of work ahead, all is not doom and gloom. Here are a few positive observations from Black Hat 2019: Application security is getting the attention it deserves. Agile development, DevOps, and cloud computing have finally forced the industry to confront a historical weakness – for the past 20 years or so, we’ve tended to bolt security on rather than bake it in. I’m seeing profound changes here, with security moving rapidly into the CI/CD pipeline. It’s still early, and application development is moving much faster than security knowledge, but at least we are heading in the right direction. The industry is making progress on security operations automation. Security operations has long suffered from too many point tools, a reliance on manual processes, and a shortage of skilled personnel. To address these problems, many CISOs have slowly moved beyond the basics of security operations automation. For example, there is a trend toward continuous red teaming combined with automated remediation actions. I even talked to one CISO who hired an “automation person” who had no security skills. His job is to work with the security operations team to discover and automate manual processes. I’m encouraged by stories like these that I heard at Black Hat. The MITRE ATT&CK Framework (MAF) has gained a lot of traction. For all the talk about artificial intelligence (AI) and machine learning technologies, the MITRE ATT&CK Framework is becoming ubiquitous in the enterprise. This can be extremely beneficial, as it forces security professionals to think in terms of pervasive attacks and kill chains rather than individual events.
Safe travels: 7 best practices for protecting data at border crossings | CSO Online
Securing Your Multi-Cloud Strategy | CSO Online
Gartner estimates that Shadow IT comprises 30 to 40 percent of IT spending in large enterprises.
12 things every computer security pro should know | CSO Online
1. Your opponents’ motives 2. Types of malware 3. Root cause exploits
Why It’s Time to Update Your Endpoint Security Approach - Delta Risk
Example of modelling an application flow as a diagram for Software Testing - EvilTester.com
IT Governance’s 2019 Cyber Resilience Report reveals major data protection weaknesses - IT Governance Blog
43% of organisations don’t have a formal information security management programme. 33% of organisations don’t have documents that state how they plan to protect their physical and information assets. 30% haven’t implemented identity and access controls.
Meet Bluetana, the Scourge of Pump Skimmers — Krebs on Security
A Roadmap for Lawyers With Cybersecurity Paralysis | SENSEI ENTERPRISES, INC.
Fayetteville Tech Lawsuit to Require Digital Forensics | SENSEI ENTERPRISES, INC.
SSLH - Share A Same Port For HTTPS And SSH - OSTechNix
Using WebThings Gateway notifications as a warning system for your home - Mozilla Hacks - the Web developer blog
YouTube download and convert to mp3 | panticz.de
Geeking outside the office | Enable Sysadmin
Cooling The Raspberry Pi 4 With The Fan SHIM & FLIRC For Better Performance - Phoronix
Top 9 Django Concepts - Part 1: 4 Mins | Codementor
Teaching cybersecurity in an open classroom | Opensource.com
Excellent Free Books to Learn X86 Assembly - LinuxLinks
A comprehensive guide to agile project management | Opensource.com
Top 20 Best Plotting Tools for Linux for Creating Scientific Graphs
Reinventing Your Own STP Wheel... « ipSpace.net blog
How Hexdump works | Opensource.com
Database Migration from non-CDB to PDB – Migration with Data Pump
Introducing vSphere Cloud Native Storage (CNS) - CormacHogan.com
VMware vSphere 6.7 U3 Announced - What's New? | ESX Virtualization
Runecast Analyzer makes hardware checking against the VMware HCL easy - ivobeerens.nl
Operational Debt the lead weight around IT’s neck – Virtual Me
Automating an Azure Lab Setup with PowerShell [Demo]
Getting Started with Terraform on Windows (Demo Walkthrough)
The Underused Power of the Microsoft Graph API with PowerShell
Fundamentals: Study Them for Long-Term Trading Gains – Business Ideas
1. Buy the Rumor, Sell the News This is a phrase that every forex trader has heard at some point. However, if you think about it, you’ll see that often the markets behave in ways the policymakers least expect. And when there is a big disconnect between expectation and outcome, you can gain an edge with your contrarian opinion. 2. Look at the Longer-Term Trends The fundamentals often hit the headlines for the wrong reasons. For example, a recent US jobs report just made big headlines. If you read that news release without considering the larger context, you might think that the US economy had just tanked. However, the long-term trends will give you better insights. 3. Everything Is Interrelated In short, what happens in Asia affects Europe, the US, and other markets. Therefore, fundamental analysis can help you to anticipate what’s coming next. For example, when the Chinese stock markets take a tumble, US stocks take a hit as well.
Portfolio Charts Tool Tests Flexible Withdrawals in Retirement — My Money Blog
Biggest Bang For Your Buck States, 2019 | Tax Foundation
Azure VMs with Oracle- Next Steps
The Ten Rules of Database Administration
With that said, I’m going to list my Ten Rules of Database Administration. Fixing a performance problem with hardware is the best way to guarantee the return of the problem in the near future. A Database Administrator is only as good as their last backup, (or database image, clone, flashback and other redundancy.) It’s the only protection from ID10T errors- our own and others. The best performing database is one that has no users. The best performing query is one that doesn’t have to be executed. Optimize what annoys the user vs. what annoys you and you’ll never have to worry about your job. Never assume, always research and double-check/triple-check your findings. Data is the savior of the DBA. Performance issues are rarely simple. If they were simple, the user could fix them and we’d be out of a job. If a database is up and running, then something has changed. Don’t ever accept the answer that nothing’s changed. They’d have to be using paper and pen instead of the database. A developer’s goal is to have an application or procedure complete requirements. Your job is to make sure the code they produce does so without risk to data, database and does so efficiently. You can’t do your job as well as you can if you understand what the application developer, user and business does. The database is always guilty until proven innocent and by the way, you only have access to 1/2 the case evidence. You’re it’s attorney- Congratulations.
The Morning After: The mystery of Virginia's TV Man
Scientists have even found microplastics in the Arctic
Hacking 4G hotspots – when did you last update? – Naked Security
GDPR privacy can be defeated using right of access requests – Naked Security
FileZilla fixes show how far we’ve come since Heartbleed – Naked Security
‘Urgent/11’ flaws affect 200 million devices – from routers to elevators – Naked Security
How to protect your OT Assets from Cyber Threats & Cyber Risks
How To Discover and Protect Your OT Assets
New Capabilities to Automatically Discover and Assess Rogue Assets
Oracle Critical Patch Update for July Contains 265 Fixes
Cybersecurity as a Public Service: 3 Ways Local Governments Can Change the Conversation - Blog | Tenable®
Include cybersecurity as a key element of public safety. The cybersecurity budget line item in state government is less than 3 percent of the total IT budget, according to a 2018 study by the National Association of State Chief Information Officers (NASCIO); anecdotally, we hear that the local cybersecurity budget is often even less. Public safety is a much larger component of local budgets, in part because the public can see where their tax dollars are going in the form of more police officers and firefighters. Yet, cybersecurity is essential to keeping increasingtly internet-facing critical infrastructure safe and secure. It is a true statement that “cyber tools don’t rescue cats from trees,” so it is unlikely that they will ever be valued as highly by local taxpayers. But what if we spoke of cybersecurity in the language of public safety? For example, framing predictive prioritization of cyber vulnerabilities as an essential public safety measure — much like local governments justify the spending on tools like CompStat for law enforcement or SeeClickFix systems for community alerts — would demonstrate that public funds are being used as efficiently as those used to address violent crime and quality-of-life needs. Make cybersecurity a community campaign. If public services go down then everybody suffers, especially the most vulnerable in society. Homebound seniors may see interruption in their remote medical devices if power is lost. Low-income residents may not be able to get to work if public transportation is interrupted. And a loss of public safety communications, such as 911 service, can lead to loss of life. All of these scenarios are acutely felt at the local level and will certainly affect a large segment of the population. Avoiding these interruptions is thus a community responsibility and can be used as justification to rally support for public campaigns to improve cyber hygiene and increase awareness of cyber threats. Utilize cybersecurity curriculum in K-12 education in to shrink the digital divide. Internet of Things (IoT) and web-based applications to streamline service delivery are showing great promise but they also have the potential to widen the digital divide. Cities are making broadband access available to larger segments of residents but it may not be utilized equally by all. Promoting cybersecurity skills and tools in K-12 education can help close this divide by making cyber careers more accessible to a larger swath of the community, breaking down barriers of entry to IT careers and affecting multiple generations, as students instruct their parents and other family members on the importance of cybersecurity and the value of digital transformation.
Cyber Exposure: Taking a Holistic Approach to Vulnerability Management
Where are we exposed? How should we prioritize based on risk? How are we reducing exposure over time? How do we compare to our peers?
6 Security Considerations for Wrangling IoT
1. Team mindset: For security to become a priority, it helps to have an entire team that is invested in security. This includes everyone from the CEO and website manager to the developer. When teams and priorities are aligned, budgets and actions are built into short- and long-term goals. 2. Standardization: IoT industry standardization is needed across the board — much like the standards for browsers and websites in the early days of the Internet. Web browsers and websites have evolved a lot over the years, and we are very much in the early stages of IoT. 3. Secure the supply chain: We must hold vendors accountable, but it's not just about the device itself — supply chain partners are numerous. As we saw with Google Home Nest cameras, third-party service providers were part of the problem that allowed old owners of cameras to spy on new owners. 4. Consumer education: If more people are educated on what could go wrong, they will be more security conscious. If they're aware of vulnerabilities and issues, they can help prevent attacks. For example, as we saw with the Nest vulnerability, they can make sure their devices are set to factory settings and check for updates to systems on a frequent basis. Educating kids at an early age can also go a long way, just like they're told to not open the door to strangers. In our modern age, "safety" is still the issue, but the risks have changed. The simple task of installing an application off the Web itself can become the weakest link. 5. Secure applications that support IoT devices: We must ensure that the code and software we build for IoT is continually tested for vulnerabilities. For instance, we can pre-emptively change default passwords of devices, and also manage the patch level of the kernel software on devices to prevent exploitation of new vulnerabilities. 6. Multilayered network security: Many things can be done at the enterprise network level. Segmentation of networks can ensure that hacked IoT devices can't affect other areas of networks. Perimeter security can help ensure hackers can't see networks in the first place. Companies should also limit the ability of IoT devices to initiate network connections.
How to Scan Websites for Interesting Directories & Files with Gobuster « Null Byte :: WonderHowTo
The 15 Most Popular Talks from DEFCON's Hacking Conferences « Null Byte :: WonderHowTo
How to Load Kali Linux on the Raspberry Pi 4 for the Ultimate Miniature Hacking Station « Null Byte :: WonderHowTo
How to Set Up Network Implants with a Cheap SBC (Single-Board Computer) « Null Byte :: WonderHowTo
80/20 Cyber Security, Part 2—The 3 Most Critical Controls | Pivot Point Security
80/20 Cyber Security—How to Reduce 80% of Your Cyber Risk with 20% of the Effort | Pivot Point Security
How to avoid and protect against medical identity theft
Here are some things you can do right now to protect yourself against medical identity theft. Use a VPN service Delete receipts and prescriptions Stop sharing everything on social media Stop sharing your medical insurance Pay as much attention to the security of your medical information as your SSN Keep an eye on your credit report. Keep your eyes open for any suspect correspondence Start talking regularly with insurance providers.
How to get the Organization Units (OU) and Hosts from Microsoft Active Directory using Python ldap3 | Alexander V. Leonov
Patching or reimaging your ODA? - Blog dbi services
Your DSLR Camera Can Be Prone To Ransomware; Here’s How
Staffing the CISO office: A call to senior management for some expansive thinking | CSO Online
Top 10 Python Web Frameworks – Linux Hint
Built to scale: 5 tips for structuring your security organization for growth | CSO Online
87th Annual Meeting: June 28-July 1, 2019 in Honolulu - usmayors.org
4 signs the CISO-board relationship is broken (and 3 ways to fix it) | CSO Online
Smishing and vishing: How these cyber attacks work and how to prevent them | CSO Online
Black Hat keynote: Why security culture needs to change | CSO Online
11 new state privacy and security laws explained: Is your business ready? | CSO Online
How Nyotron Paranoid puts endpoint security worries to rest | CSO Online
Looking for answers at Black Hat: 5 important cybersecurity issues | CSO Online
Network security platforms Endpoint security consolidation? Managed detection and response – it’s all about the people Serverless security – the new frontier Security analytics innovation and confusion
Top cyber security certifications: Who they're for, what they cost, and which you need | CSO Online
How JustEat finds and trains in-house security talent | CSO Online
3 Steps to Deploying a Hardened OS by Tailoring | CSO Online
6 lessons from Venmo’s lax approach to API security | CSO Online
What is a CASB? What you need to know before you buy | CSO Online
11 top DEF CON and Black Hat talks of all time | CSO Online
Equifax’s data breach disaster: Will it change executive attitudes toward security? | CSO Online
31 hardware and firmware vulnerabilities: A guide to the threats | CSO Online
Learning the Vulnerability Management Fundamentals
Here are six discovery questions to ask as a starting point: Where are your business offices and network infrastructure sites, including failover and backup sites, located? What are the key web applications, operating systems, software packages and databases supported by the IT organization? What types of assets (IT/OT, physical, software, mobile, development) are used by the company? Do you have an asset management tool or a database of all assets owned by the organization? Do you use an asset and data classification policy to enforce security and access controls? Which assets, applications and data are considered critical for the organization?
15 Cybersecurity Fundamentals for Water and Wastewater Utilities | WaterISAC
The 15 fundamentals are: Perform Asset Inventories Assess Risks Minimize Control System Exposure Enforce User Access Controls Safeguard from Unauthorized Physical Access Install Independent Cyber-Physical Safety Systems Embrace Vulnerability Management Create a Cybersecurity Culture Develop and Enforce Cybersecurity Policies and Procedures Implement Threat Detection and Monitoring Plan for Incidents, Emergencies, and Disasters Tackle Insider Threats Secure the Supply Chain Address All Smart Devices (IoT, IIoT, Mobile, etc.) Participate in Information Sharing and Collaboration Communities
Protect against BlueKeep
5 essential controls to include in your cyber security checklist - IT Governance Blog
How to recover from a cyber attack - IT Governance Blog
How to make sure your cyber insurance policy pays out - IT Governance Blog
How to Get on the Dark Web: A Step-by-Step Guide
SECURITY ALERT: GermanWiper Ransomware Erases Your Data Even If You Pay
How to search effectively and efficiently – Part I: basic principles, tips and tricks for OSINT – We are OSINTCurio.us
ISO 27001 Certification Proven Process Explained! Step 8: Maintenance, Continuous Improvement and Recertification | Pivot Point Security
ISO 27001 Certification Proven Process Explained! Step 7: Certify Your ISMS | Pivot Point Security
ISO 27001 Certification Proven Process Explained! Step 6: Conduct an Internal Audit | Pivot Point Security
ISO 27001 Certification Proven Process Explained! Step 5: Execute the Risk Treatment Plan | Pivot Point Security
ISO 27001 Certification Proven Process Explained! Step 4: Build a Risk Treatment Plan | Pivot Point Security
ISO 27001 Certification Proven Process Explained! Step 3: Identify and Analyze Information Related Risk | Pivot Point Security
ISO 27001 Certification Proven Process Explained! Step 2: Understand Your InfoSec Controls | Pivot Point Security
ISO 27001 Certification Proven Process Explained! Step 1: Understand Your Scope | Pivot Point Security
4 Reasons to Establish and Exercise Your Right to Audit Vendors | Pivot Point Security
3 “First To-Dos” after You Complete Your Privacy Data Mapping Exercise | Pivot Point Security
CHIME, AHIMA push Senate on national patient identifier
US State Comprehensive Privacy Law Comparison
Hospital executives and HHS at odds on protecting patient data
Google Online Security Blog: Understanding why phishing attacks are so effective and how to mitigate them
MalConfScan with Cuckoo: Plugin to Automatically Extract Malware Configuration - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Extract Malware Configuration with MalConfScan - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Top Three Cross-Site Scripting Attacks You Need to Know Now
Eight Steps to Migrate Your SIEM
What Call Center Fraud Can Teach Us about Insider Threats
Best Practices for Remote Workers’ Endpoint Security
Security Operations Center (SOC): Prioritizing Log SourcesRafeeq Rehman – Personal Blog
NBlog - the NoticeBored blog: NBlog July 20 - what is the ISMS for?
Build Your Own Multi-Cloud Security Monitoring in 30 Minutes or Less
A New Approach to Application Security Testing - ShiftLeft Blog
Hacker Summer Camp 2019: What I'm Bringing & Protecting Yourself · System Overlord
Automated ESXi Installation to USB using Kickstart
Intro to Hardware Hacking - Dumping your First Firmware
Top 10 Uses of Wireshark for Hackers Part I - The Ethical Hacker Network
Manual Vulnerability Detection - The Ethical Hacker Network
Errata Security: Hacker Jeopardy, Wrong Answers Only Edition
Errata Security: Securing devices for DEFCON
PHP: Supported Versions
Brief History of Internet Wide Scanning
Healthcare Exchange Standards: IHE Profiles on FHIR R4 now have conformance resources available
Web con: 'How to Make Yourself Understood by the CISO and CIO'
VA OIG report shows holes in security, privacy for patient information
NY gov. signs two new data breach security laws
InfoSec Women: Leaders and In Charge | CyberWatch
Rocky Mountain Health IT Summit ~ Cyber Thoughts
How to Become Hacker, Check you are Eligible or Not
Infosec's Unfortunate Departure from Spaced Learning | Chris Sanders
The Story of a Top 10 Insurance Company - Pindrop
Azure Security Lab: a new space for Azure research and collaboration – Microsoft Security Response Center
Command Injection Cheatsheet - HackersOnlineClub
Your Reporting Matters: How to Improve Pen Test Reporting - Black Hills Information Security
Publicly available Tenable .audit scripts | Alexander V. Leonov
IBM offers explainable AI toolkit, but it’s open to interpretation | ZDNet
Check whether laptop is running on battery or cable Using echo, eval
Assessing Open Source Software for Industrial Use | Automation World
Black Hat USA 2019 conference Highlights | Packt Hub
A Fistful of Dongles: The Application Era of Digital Forensics
Humans Are Genebots | Daniel Miessler
We Don't Need Patches Why Organizations Don’t Patch
8 Ways to Encourage Cyber Security Awareness - Delta Risk
How Cyber Security Exercises Can Keep You in Shape - Delta Risk
What’s New in Azure Active Directory for July 2019 - The things that are better left unspoken
Passed Microsoft Certified: Azure Solutions Architect Expert – UseIT | Roman Levchenko
almost
RDP vulnerability puts Hyper-V at risk | Born's Tech and Windows World
Automating employee onboarding the PowerShell way
Microsoft has found a way to hurt the partnership between Amazon Web Services and VMware by raising prices for customers using non-Microsoft clouds | Business Insider India
Open Sourcing the Kubernetes Security Audit - Cloud Native Computing Foundation
Scrum vs. kanban: Which agile framework is better? | Opensource.com
Transport Layer Security version 1.3 in Red Hat Enterprise Linux 8
New Bluetooth 5 Channel Hopping Reverse Engineered For Jamming And Hijacking | Hackaday
AT&T Employees Took Bribes To Plant Malware On Company's Network | Techdirt
Windows Kernel Information Disclosure Vulnerability CVE-2019-1125 | Born's Tech and Windows World
CVE-2019-1125
SDRTrunk 0.4.0 Alpha 9 Updates Highlighted
GNU Radio 3.8.0.0 Released – First Minor Release Version in Six Years
Testing Linux Docker Images in CloudBees CodeShip CI - via @codeship | via @codeship
AWS Lake Formation – Now Generally Available | AWS News Blog
Preview Release of the new AWS Tools for PowerShell | AWS News Blog
Cannot download attachment (due to size) with mobile device on Exchange ActiveSync - The time I've wasted on technology...
Microsoft is changing the rules of the game - robbeekmans.net
Creating Isolated Networks with Ubiquiti UniFi · vNinja.net
Hackers Threaten Medical IoT Devices: Here's How to Keep Them Safe
What Is an M.2 SSD? The Pros, Cons, and How to Install One
Where to Buy Ebooks? The Best Online Ebook Stores
The Best Flowchart Templates for Microsoft Office
4 Essential Google Account Settings to Change for Better Security
10 Amazingly Useful Spreadsheet Templates to Organize Your Life
The 9 Best USB Audio Interfaces for Musicians
The Essential Ebook Converter Guide
How to Remove the DRM on Every Ebook You Own
Automate The Freight: When The Freight Is People | Hackaday
Building A Safe ESP32 Home Energy Monitor | Hackaday
Jazzberry All-In-One Computer by machineboy - Thingiverse
Brain-Computer Interfaces: Separating Fact From Fiction On Musk’s Brain Implant Claims | Hackaday
GitHub - nexusofdoom/lancache-installer
Java mon amour: Openshift 4, interesting readings
Java mon amour: OpenShift CI/CD
Java mon amour: Openshift RedHat plugin for Intellij
Java mon amour: SAML and JWT
There Are 2 Times of Year You Should Never Job Hunt
Free Up Your Hands With Speech-to-Text on Android
Erman Arslan's Oracle Blog: Weblogic -- Disaster Recovery implementations
The Hitchhiker's Guide to Ethical AI
Almost half of employees have access to more data than they need
Load balancer flaw could lead to major breaches at large organizations
Ransomware turns its sights on large organizations
Using Automation vs Making Automation - EtherealMind
New Teensy 4.0 Blows Away Benchmarks, Implements Self-Recovery, Returns To Smaller Form | Hackaday
Espionage On Display As GCHQ Hosts A Temporary Exhibit | Hackaday
A SuperCap UPS | Hackaday
First Look At DEF CON 27 Official Badge; Kingpin Is Back! | Hackaday
Chris's Wiki :: blog/linux/IptablesRewriteUsingIpset
SMEs forced to meet cybersecurity demands in order to win contracts
The top 11 security threats to cloud computing
The top 11 in order of significance are: Data Breaches Misconfiguration and inadequate change control Lack of cloud security architecture and strategy Insufficient identity, credential, access and key management Account hijacking Insider threat Insecure interfaces and APIs Weak control plane Metastructure and applistructure failures Limited cloud usage visibility Abuse and nefarious use of cloud services
Biggest ransomware threat is encryption of shared cloud files
3 ways IoT will impact our future
Chris's Wiki :: blog/unix/NoSwapConsequence
Half of companies won't move mission critical workloads to the cloud
DIY Embroidery Machine V2 | OpenBuilds
Build an ESP8266 web server – Code and schematics (NodeMCU) « Dangerous Prototypes
The 5 Elements of Effective Thinking by Edward B. Burger and Michael Starbird
Occasionally go back to the basics Plan to fail Before getting started, make sure you are asking the right question
Supercell cloud - Japan Today
VMworld 2019 - Preflight Checklist - VirtuallyInclined.com
Monitoring Kubernetes with Wavefront via Proxy Chaining - CormacHogan.com
How to Create a RAM Disk on Windows Server? | Windows OS Hub
Sysdig Secure 2.4 Announced - The IT Hollow
Patch Lady – we have another Spectre/Meltdown @ AskWoody
The End-All Guide to Repairing Active Directory Trust Relationships
Finding the last time your domain controller backup happened
Intro to Black - The Uncompromising Python Code Formatter - The Mouse Vs. The Python
RV Offsite Backup Update | Linux Journal
Security scanning your DevOps pipeline | Opensource.com
Python Celery Guide | Codementor
How to scan your Docker installment with docker-bench-test - TechRepublic
France Says Ransomware Attacks on Big Companies Are on the Rise - Bloomberg
Seven Concerns Open Source Should Worry About - Part 1 | ConsortiumInfo.org
From Linux to cloud, why Red Hat matters for every enterprise | ZDNet
Get going with EtherCalc, a web-based alternative to Google Sheets | Opensource.com
Explainer: What is post-quantum cryptography? - Linux Security - Cryptography
The Spend Safely in Retirement Strategy
An Ansible reference guide, CI/CD with Ansible Tower and GitHub, and more news | Opensource.com
Top 20 Best Cybersecurity Courses That You Can Sign Up Now
What's your favorite open source BI software? | Opensource.com
Managing Risk in the Supply Chain
8chan owner blasts 'sinister' shutdown - Japan Today
Google, Money and Censorship in Free Software communities | DanielPocock.com
Original Cult of the Dead Cow Members Keep it "Wacky, Weird, and Wild" to Celebrate Joseph Menn's Newest Book | Electronic Frontier Foundation
Top 20 Best Bioinformatics Tools for Linux: An Ultimate Collection
Manage your passwords with Bitwarden and Podman - Fedora Magazine
24 sysadmin job interview questions you should know | Opensource.com
A new tool for measuring continuous learning | Opensource.com
Announcing coreboot 4.10 – coreboot
Linux with a 30-year lifespan | Joinup
Top 20 Best Raspberry Pi Projects That You Can Start Right Now
Web server security – Part 0: How to start · InfoSec Handbook – information security blog
How to Use Binder and Python for Reproducible Research - Erik Marsja
Excellent Free Books to Learn Java - LinuxLinks
The Growing Threat of Targeted Ransomware | SecurityWeek.Com
Assessing-Medical-Device-Cyber-Risks-in-a-Healthcare-Environment.pdf
Freedombone version 4.0 | Freedombone Blog
The Definitive Guide to Centralized Logging with Syslog on Linux
An Open Hardware Rubber Ducky | Hackaday
Fernando Corbato: Scientist who fostered the digital revolution and the computer password | The Independent
3 tools for doing presentations from the command line | Opensource.com
Top 15 Best Linux Log Viewer & Log file Management Tools
Preliminary Observations on the Utility of Measuring Cybersecurity - Lawfare
Excellent Free Books to Learn PHP - LinuxLinks
Using Metrics to Guide Container Adoption, Part I – Red Hat OpenShift Blog
U.S. GAO - Cybersecurity: Agencies Need to Fully Establish Risk Management Programs and Address Challenges
U.S. GAO - Federal Information Security: Agencies and OMB Need to Strengthen Policies and Practices
Disks and Partitions Management with Windows PowerShell | Windows OS Hub
Azure Dedicated Host for your Azure VMs - Thomas Maurer
Three Companies Bringing Innovation to Open Keyboards | FOSS Force
How to Build PowerShell Functions for Easier Pester Testing
Vagrant – creating Virtual machine | geekdudes
How to Setup Travis for Quick Ansible Playbook CI | hobo.house
NHS: The Long-Term Plan
German schools ban Microsoft Office 365 because of privacy concerns
The History Of Computing: The Xerox Alto - krypted
65 percent of cybersecurity analysts say they've considered quitting
Microsoft's web-based Outlook 365 is leaking users' IP addresses in emails
Businesses still at risk from outdated operating systems
66 percent of SMBs don't believe they’re vulnerable to a cyberattack
Confessions of a paranoid DEC Engineer: Robert Supnik talks about the great Dungeon heist! – Virtually Fun
Looking inside a 1970s PROM chip that stores data in microscopic fuses « Dangerous Prototypes
Building a bluetooth DAC with Raspberry Pi Zero W « Dangerous Prototypes
Quote Details: Bertrand Russell: In all affairs it's... - The Quotations Page
Watergate Salad: A Fluffy Green Bite Of Washington, D.C.'s Past : The Salt : NPR
An Introduction to Structured Data at Etsy - Code as Craft
ESP32 with DHT11/DHT22 Temperature and Humidity Sensor using Arduino IDE | Random Nerd Tutorials
Getting Started With the ESP8266 and DHT22 Sensor
Continuous Integration/Continuous Development with FOSS Tools | Linux Journal
Automated Report Generation with Papermill: Part 2 - Practical Business Python
Automated Report Generation with Papermill: Part 1 - Practical Business Python
Three ways automation can help service providers digitally transform
EPIC - Capitol One Breach Sets Record
RTL-SDR: Seven Years Later | Hackaday
Ansible: IT automation for everybody | Enable SysAdmin
Log management: Helping IT admins to achieve infrastructure-wide visibility
USENIX ATC 2019: A retargetable system-level DBT hypervisor, an I/O scheduler for LSM KVs, and more | Packt Hub
Syslog : The Complete System Administrator Guide – devconnected
What We Can Learn from the Capital One Hack — Krebs on Security
5 experimental cybersecurity trends your business needs to know about - TechRepublic
Buttercup is an open source password manager for Windows, macOS, Linux, - gHacks Tech News
6 Challenges In Using Open Source Cybersecurity Tools
Open Source Licensing and Turkish Law - Lexology
85% Of Total Bitcoins On Earth Have Already Been Mined, What's Next?
AWS Certified Solutions Architect - Associate (2019) | Exam Experience - CHRIS STARK
Chemical or Mineral Sunscreen? What To Know About Current Sunscreen Research : Shots - Health News : NPR
What’s new in Java13?
Java mon amour: No suitable client certificate could be found - continuing without client authentication
DSHR's Blog: Blockchain briefing for DoD
DSHR's Blog: Emulation as a Service
The Life of Kenneth: Building Your Own Bluetooth Speaker
Retired Certifications and Exams | Certification Policy - vmw-certification-retired-exams.pdf
IT'S SO HOT OVER HERE. WE'RE MELTING. SEND HELP. - Raspberry Pi
Performance Analysis Methodology - YouTube
How to write great container images - Ricard Bejarano
What is the common wire in electrical wiring? - The Silicon Underground
What the Shuck is Going on Here?! - briancmoses.com
SalesForce.Org Study: 40% of Nonprofits Planning To Integrate AI for Marketing | Beth's Blog
The new 30-person research group in DC investigating how emerging technologies could affect national security - 80,000 Hours
A Beginner's Guide to AWS CloudWatch (Walkthrough)
Learn How to Code or Else: An IT Pro Guide
Using PowerShell to copy to the clipboard (Core support too!)
Step-by-step guide on how to set up WinRM on a Linux client
Managing and automating AWS EBS snapshots (PowerShell)
How to find Active Directory admin accounts authenticated by RODCs
How to create a Chocolatey package (tutorial)
Using the Invoke-DscResource cmdlet (no configuration needed)
Discover Active Directory database size with PowerShell
Under The Stairs: The End Of My Era
Azure Security Center: How to Protect Your Datacenter with Next Generation Security | Robert Smit MVP Blog
Deduplicating NTFS file systems (fsdup) - Philipp's Tech Blog
When Redundancy Actually Helps - Marc's Blog
1. The complexity added by introducing redundancy mustn't cost more availability than it adds. 2. The system must be able to run in degraded mode. 3. The system must reliably detect which of the redundant components are healthy and which are unhealthy. 4.The system must be able to return to fully redundant mode.
HOWTO: Disable weak protocols, cipher suites and hashing algorithms on Web Application Proxies, AD FS Servers and Windows Servers running Azure AD Connect - The things that are better left unspoken
Solution for the SMB1 AD Authentication issue – ESXi 6.5U3 update | Techbrainblog
How To Encrypt Data In Amazon S3
HOWTO: Disable Unnecessary Services and Scheduled Tasks on Windows Servers running Azure AD Connect - The things that are better left unspoken
Managing Active Directory Time Synchronization on VMware vSphere - The things that are better left unspoken
HOWTO Enforce Azure AD Connect to use TLS 1.2 only - The things that are better left unspoken
Building Azure policies to ensure compliance
Security and Compliance in Microsoft Teams Video Series - Tom Talks
Updating List of Trusted Root Certificates in Windows 10/8.1/7 | Windows OS Hub
How to increase local datastore from the command line (using SSH) for ESXi 6.7.0 – Welcome to my blog
Writing sustainable Python scripts | Vincent Bernat
How To Automate NetApp Installations with Ansible
Microsoft deactivates VBScript in IE as of August 2019 | Born's Tech and Windows World
Cisco Live – The Minimalist Packing List | Herding Packets
Conference Packing – The Little Things | The Networking Nerd
Bond WiFi and Ethernet for easier networking mobility - Fedora Magazine
Start a new git repository
2019 is the year of NVMe - Architecting IT
Quick tip: uninstall a driver | >_
Get-WindowsDriver -Online | Where {$_.Version -eq '10.1.1.40'} | Foreach-Object { pnputil.exe /delete-driver $_.Driver /force }
From the iPhone to Huawei: The New Geopolitics of Technology - Lawfare
Computing and storage, both of which will increasingly migrate to remote servers (the “cloud”), bringing down the cost and increase the scale of data storage. This could have potential implications for security and communications, especially features such as distributed record-keeping (blockchain) and new developments in data storage. Telecommunications, specifically the developments of a fifth generation (5G) of infrastructure, which may operate up to 20 times faster than existing systems, with low latency (delay in data communication). This will enable a vast array of applications, including driverless cars and machine-to-machine communications. Artificial intelligence, specifically machine learning, which involves fast and accurate pattern recognition by feeding vast troves of data to computers in order to “teach” them. This can then be applied to language, visual imagery, and other domains to resemble a form of intelligence. Automation, including the online integration of physical objects: cyber physical systems (CPS) or the “internet of things” (IoT). Think health monitors, remotely-managed factory robots, or internet-enabled security systems. Manufacturing, including in materials, optics, sensors, and additive manufacturing (“3D printing”). Energy, particularly renewable and mobile energy sources and smarter management systems.
Unlocking Market Forces to Solve Cyber Risk - Lawfare
Database Migration from non-CDB to PDB - Various Pitfalls
Version 19.2 is now available – ThatJeffSmith
Database Migration from non-CDB to PDB - The Patch Level Pitfall
VMware Snapshots: vRealize Orchestrator SSL Certificates
I'm going all-in on Serverless at AWS! :-) - WoodITWork.com
VMware Snapshots: vRealize Orchestrator SSL Certificate
Virtual Machine Compute Optimizer
Demystifying IO Operation Readouts in ESXi | Cody Hosterman
Amplify Framework Update – Quickly Add Machine Learning Capabilities to Your Web and Mobile Apps | AWS News Blog
Synology Memory Issues and Crashing - The time I've wasted on technology...
Make Sure Your SQL Servers are Running the Latest CU with the New SQL Assessment cmdlets | SQLvariations: SQL Server, a little PowerShell, maybe some Power BI
Database Migration from non-CDB to PDB - Typical Plugin Issues and W/A
Database Migration from non-CDB to PDB - The COMPATIBLE pitfall
Database Migration from non-CDB to PDB - The Time Zone Pitfall
Database Migration from non-CDB to PDB - The Component Pitfall
Oracle Database Proactive Patch 12.1.0.2.190716 failing with ORA-04068 ORA-04061 ORA-04065 - DBA - Rodrigo Jorge - Oracle Tips and Guides
Programmer Uses "Logic Bomb" To Fool Company Into Rehiring Him Every Few Years
Soft Skills Every Team Leader Should Have – Business Ideas
How to Install Kanboard Project Management Software on Debian 10
7 Python Machine Learning Modules To Get Acquainted With - krypted
Top Modern Data Warehouse questions | James Serra's Blog
Happy Sysadmin day 2019 | Born's Tech and Windows World
BlueKeep is almost here. If you haven’t installed Win7/XP patches since May, get your systems patched! @ AskWoody
Bluetooth privacy and the FreeStyle Libre 2 glucose monitoring system | Ctrl blog
Is AWS passing on the benefits of storage media price reductions? - Architecting IT
Windows 7: Support ends in 6 months | Born's Tech and Windows World
Update history of .NET Framework patches | Born's Tech and Windows World
BlueKeep warning: Exploit might come soon? | Born's Tech and Windows World
PowerShell Tutorial Mini-Course (Free)
Create a PowerShell script to monitor SQL services
An Active Directory user is locked out: don't panic! Use PowerShell
Hi, I'm Dave and this is how I work
How to remove Windows 10 apps with PowerShell (tutorial)
Using WMI in PowerShell the easy way
AWS X-Ray: Peering into Microservices built in AWS
Using PowerShell to escape double quotes and all things strings
Impress the boss with this basic PowerShell Windows Update report
Building a PowerShell script from existing docs
Cheat.sh Shows Cheat Sheets On The Command Line Or In Your Code Editor - Linux Uprising Blog
How to earn a promotion as a sysadmin | Enable SysAdmin
Top Cloud Compliance Software Tools
Listen to Music through the Ubuntu Terminal
Wielding PowerShell with file shares: Getting started
The Cyberlaw Podcast: Illuminating Supply Chain Security - Lawfare
The Cyberlaw Podcast: What It’s Like to Live Through a Big Data Breach - Lawfare
Attorney General William Barr on Encryption Policy - Lawfare
The Sorry State of Cybersecurity Imagery - Lawfare
What can we learn from recent ransomware news? | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, Power Protect, CSM
Use PowerShell to test a remote connection (a tutorial)
Infrastructure testing with Pester: from the trenches
How to use PowerShell to create scheduled tasks
Here's how SRPs (Software Restriction Policies) work (tutorial)
How to import an OVF file in VMware with PowerShell
The unforeseen benefits of scripting and automation
How to Transfer File Permissions with PowerShell
How to check your PowerShell version (all the ways)
How to check for a pending reboot (automated with PowerShell)
Frankenstein at 200 - Lawfare
Hiiro: A Modern Bizen-Yaki Water Carafe | Spoon & Tamago
Bizen-yaki
How To Check Swap Usage Size and Utilization in Linux - nixCraft
How to Speed Up Package Downloads and Updates with apt-fast on Ubuntu
Setting up a JMeter Cluster for web server load testing
IT Burnout – The Task List | The Networking Nerd
How to Use Topgrade to Easily Upgrade Your Linux System - Make Tech Easier
CISSP Process Guide - Fadi Sodah (madunix) | ThorTeaches CISSP, CISM & CISA
Sunflower notes - CISSP - Maarten de Frankrijker | ThorTeaches CISSP, CISM & CISA
The memory palace – Prashant Mohan | ThorTeaches CISSP, CISM & CISA
SQL Server 2019 availability group R/W connection redirection, routing mesh and load balancing - Blog dbi services
How to Stay Ahead of the Competition – Running Your Business
Video : Oracle Linux 8 Installation | The ORACLE-BASE Blog
Moving your SQL Developer preferences between machines – ThatJeffSmith
Data in a Flash, Part IV: the Future of Memory Technologies | Linux Journal
On a Budget: Best Ways to Cut Back on Costs As a Single, Working Mother | Penniless Parenting
ICND1 & ICND2 » Connect Python to GNS3 for Automation in Win10
Which Households Spend More, Less, or Exactly What They Earn? Breakdown by Income Level — My Money Blog
The power of focus: Why you should tackle one goal at a time
Negotiation Skills You Should Cultivate – Entrepreneurs
vSphere 6.7 Update 2 Upgrade Guide - VirtuallyInclined.com
Building a Modern CI/CD Pipeline in the Serverless Era with GitOps | AWS News Blog
United State's DMARC Status script X-Post /r/Sysadmin : netsec
Test your Windows Server 2016 configuration with PowerShell
Bulgarian tax agency breach may have compromised 5 million people
Build a PowerShell menu that'll blow your users' socks off
The PowerShell parameter demystified and uncovered
Backup as a Service - Architecting IT
On-premises infrastructure - as a service - Architecting IT
Equifax reportedly close to $700 million data breach settlement
I Was A 10x Engineer. And I’m Sorry. | The Networking Nerd
=
ICND1 & ICND2 » OSPF Sim
ICND1 & ICND2 » OSPF Neighbor Sim
Erman Arslan's Oracle Blog: OBIEE -- Strange error & Interesting Solution "You cannot publish to the Apps Library because you do not have write permission on the /Apps folder in catalog."
Best Practices for Oracle Data Guard on Azure – DBAKevlar
“Cadillac Tax,” While Likely Repealed, Would Control Health Care Costs
it would tax $0.40 of every dollar of health insurance benefits over $11,200 for individuals and $30,150 for families. According to Kaiser Family Foundation, in 2018, average annual premiums for individuals were about $7,000, and about $20,000 for families.
Unison: Your Home Has a ~30% Chance of Being Worth Less in 5 Years — My Money Blog
Whats a SQL Notebook in Azure Data Studio? | SQL DBA with A Beard
Don't buy a new car without this cheat sheet!
3 Areas to Start Freelancing on the Right Foot: Communication, Invoicing and Learning – Business Ideas
Learning Docker Image Layers and Cache Best practices – Virtual Me
Druva – In The Cloud, Of The Cloud, Protecting The Cloud | PenguinPunk.net
AWS Named as a Leader in Gartner’s Infrastructure as a Service (IaaS) Magic Quadrant for the 9th Consecutive Year | AWS News Blog
The Four Horsemen of the Appocalypse | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, Power Protect, CSM
Apathy: It doesn’t matter if this application is old, we’ll just let the requirements of the legacy application define what we can or can’t do within the business. I perhaps saw this best when new Windows laptops had to be forcibly downgraded to 32-bit versions because a critical business desktop application was 16-bit and incompatible with 64-bit versions of the OS. This caused a plethora of other challenges, but hey! the 16-bit application kept on ticking. Procrastination: Let’s leave it another year and see if the problem goes away. (Narrator’s voice: It won’t.) This is the “kicking the can down the road” solution. It’s not quite the same as apathy. Whereas apathy will result in delays on new systems upgrades or functions, procrastination will lead to some upgrade, at some point, being done, and chaos erupts! as the legacy application ceases to be accessible. Budget: We’d get to this if we have the money. But it’ll cost $X to fix it and we don’t have that money. Meanwhile, flagellate the IT department for having to pay a 30% increase in maintenance fees on end of service life equipment, and ignore the soft costs of people spending endless amounts of time keeping equipment and systems on life-support. Emulation: Virtualise it and make it go away. More recently, that can also mean containerise it and make it go away. (Maybe the next step will be legacy production applications running in WINE?)
How to convert an employee handbook to SharePoint library with metadata - SharePoint Maven
Planning a cloud migration? Get your identity privileges in check first
Tech Debug » Sunscreen – Does it really help?
Chris's Wiki :: blog/sysadmin/SwitchesAndPowerGlitch
Active Directory Administrator ‘Backdoor’ | Born's Tech and Windows World
The king of dal | Seth's Blog
LEGO-Based Robot Arm With Motion Planning | Hackaday
Steganography: The Art of Concealing
Post Archive - Ohio InfoSec Forum
Inside the IT industry’s largest commercial open source software ecosystem - Technology, Tech, Red Hat, Open Source, Business, Society - Comms MEA
Are Open Source Active Path Testing Tools Viable for You? | Insight for the Connected Enterprise
What Is Open-Source Software? (+The Benefits and Risks)
ThoughtWorks Releases Taiko - A Free and Open Source Browser Automation Tool
Swimlane research team open sources pyattack | Swimlane
Computer password inventor Fernando Corbato dies at 93
Fernando "Corby" Corbato
Two Years After WannaCry, NHS Still Not Properly Safeguarded Against New Attacks - Security Boulevard
Cyberattack shuts down La Porte County government systemsSecurity Affairs
CVE-2019-1132 Win 0Day used by Buhtrap Group in government attackSecurity Affairs
CVE-2019-1132
Executives’ Changing Views on Cybersecurity - Security Boulevard
Healthcare Needs Cybersecurity Pros that Anticipate What Threat Actors Will Do Next [Q&A with Dr. Rebecca Wynn] - Security Boulevard
Matrix Medical Network
Top 10 Best Cyber Security Podcasts of 2019 - Security Boulevard
Thirty-four years - Building out Disaster Recovery (Part 6)
Thirty-four years - System Administration, Backups, and Data Centers (Part 5)
GDPR Bares Its Fangs: €315 Million in Penalties over Just Three Days - Security Boulevard
Fire Up Your Cyber Security Career with These 9 Job-Related Tips - Hashed Out by The SSL Store™
Hack the Box (HTB) machines walkthrough series — YPuffy - Security Boulevard
"Glass-box" Solutions Are Critical For Cybersecurity Reporting To Executive Management - Security Boulevard
What is Shadow IT? - Security Boulevard
How Do Your Cyber Exposure Practices Stack Up to Those of Your Peers? - Blog | Tenable®
Cybersecurity: Malware lingers in SMBs for an average of 800 days before discovery - TechRepublic
the time between an attack penetrating a network's defenses and being discovered—ranged from 43 to 895 days for SMBs, the report found. The average dwell time for confirmed, persistent malware was 798 days. Dwell time for riskware—including unwanted applications, web trackers, and adware—averaged 869 days.
Wannacry ransomware attack: Industry experts offer their tips for prevention - TechRepublic
Zero Day Initiative — The July 2019 Security Update Review
Cheat-Sheets — Malware Archaeology
deploying-security-onion-for-monitoring-hids.pdf
5 Tips to Create an Effective Information Security Management Committee (ISMC) | Pivot Point Security
Major Security Risks and Mitigation Strategies for 2019Rafeeq Rehman – Personal Blog
Rifiuti2 - Windows Recycle Bin Analyser
Cloud Security Audit - A Command Line Security Audit Tool For Amazon Web Services
Commando VM v1.3 - The First Full Windows-based Penetration Testing Virtual Machine Distribution
Install Kubernetes on Windows 10 Professional | geekdudes
Trial period reset of Visual Studio Community Edition – Dimitri's Wanderings
Is insurance coverage for cyber claims barred by a war exclusion?
Automatically Build Kali VM’s in VirtualBox – JerryGamblin.com
Documentation required by ISO 27001 - IT Governance Blog
To use ITIL 4 or not use ITIL 4, that is the question - IT Governance Blog
The GDPR: Preparing your organisation for DSARs - IT Governance Blog
How to handle a ransomware attack - IT Governance Blog
How should you investigate a data breach? - IT Governance Blog
Infosecurity.US - Web Log - Nearly Thirty Percent Of Most Popular VPNs Worldwide Owned By Hidden Chinese Organizations
ShowMeCon 2019 20 TLSv13 Minor Version Major Changes John Wagnon - YouTube
How a decentralized cloud model may increase security, privacy | CSO Online
How to bridge the cyber-risk management gap | CSO Online
Certain Anesthesia Devices Have Vulnerabilities: Researchers
Researchers Disclose Vulnerability in Siemens' ICS Software
An Introduction to API Based Documentation Automating - EvilTester.com
U.S. Coast Guard Issues Alert After Ship Heading Into Port Of New York Hit By Cyberattack
Combating WannaCry and Other Ransomware with OpenZFS Snapshots - iXsystems, Inc. - Enterprise Storage & Servers
The Prehistory of the Computer - krypted
McAfee Endpoint Security blocks Windows login | Born's Tech and Windows World
Tomato and Watermelon Salad, Easy, Vegan, Paleo, and Delicious | Penniless Parenting
Why application security should be a key part of development [Q&A]
Hyperconvergence Performance Testing | ESX Virtualization
VMware vRealize – Operations Without Operators | PenguinPunk.net
Building a Multi Regional Web Application with Azure Front Door - Cloud for the win!
Performance Hub in Oracle Autonomous Database – ThatJeffSmith
GIS on Linux with SAGA | Linux Journal
JSON and XML: How Do They Compare? - via @codeship | via @codeship
Three key checklists and remedies for trustworthy analysis of online controlled experiments at scale – the morning paper
Empathy, Applications, User Experience. | Tallan Blog
Top 10 Tools in My Personal Learning Environment 2019
The $50,000 an hour gate agent | Seth's Blog
Java mon amour: Java JSSE SSL flags
Write a Novel with Open Source Tools » Linux Magazine
How to be an IT rock star - Cliff Saran’s Enterprise blog
Preserving Laptop Stickers on MacBooks - Graham Stevens – Grh.am
SQL SERVER – Security Conversations and Notes with a DBA – it's notes
Chris's Wiki :: blog/sysadmin/YubikeyMostlyDropped
The 10 Top GUI Tools for Linux System Administrators
RHEL 8 enables containers with the tools of software craftsmanship
Building a computer - part 1
German data protection organization: use of Office 365 in schools is illegal – Nextcloud
MTTR is dead, long live CIRT | Opensource.com
Why virtualize Domain Controllers? - The things that are better left unspoken
Sizing Domain Controllers correctly on VMware vSphere - The things that are better left unspoken
Microsoft Putting Patent Traps Inside Linux While Blackmailing Companies Using Patents Associated With These Traps | Techrights
Customising an ESXi Image Profile
Azure VM vs Disk vs Costs, Does Size matter ? or a Higher price for better specifications #Azure #Storage #Performance | Robert Smit MVP Blog
On PASCAL - krypted
Microsoft Security Update Summary (July 9, 2019) | Born's Tech and Windows World
What you should measure on your database storage and why - Blog dbi services
Storage performance benchmarking with FIO - Blog dbi services
Microsoft surreptitiously adds telemetry functionality to July 2019 Win7 Security-only patch @ AskWoody
Cloud Services - Build, Buy or Fork? - Architecting IT
Automating PowerShell Universal Dashboard Installation in Azure
4 Reasons Why SOC Superstars Quit
Vulnerability Found in GE Anesthesia Machines
Industry Insight: Checking Up on Healthcare Security
Monroe College Hit with Ransomware Attack
British Airways faces record £183 million GDPR fine after data breach
Learn Everything There is to Know about Testing PowerShell Scripts
The most magnificent thing about Vulnerabilities and who is behind the magic | Alexander V. Leonov
Marriott Faces $124 Million GDPR Fine in UK
Microsoft Patches Zero-Day Vulnerabilities Under ...
32 Active Directory Scripts to Automate Anything
10 tips for reviewing code you don't like - Red Hat Developer Blog
Happy 20th Birthday SAP Linux Lab! - SUSE Communities
A Complete History of Computers: From the 1800s to Now
I’ve Been Reading Books Wrong | levlaz | лев | 列弗
Steve Jobs Magically Saved Apple By “Casting Spells”: Bill Gates
Serverless: The Minimilism Mindset - WoodITWork.com
Assumptions | Oracle Scratchpad
Yes you can! Submitting an InfoSec CFP | CyberWatch
Book Review: The Spy in Moscow Station
Linux for Pentester: git Privilege Escalation
Croatia government agencies targeted with news SilentTrinity malwareSecurity Affairs
SilentTrinity
Chris's Wiki :: blog/linux/SoftwareRaidClearingDiskErrors
Howto create a Debian 9 preview as Vagrant box with Packer
DarkScrape - OSINT Tool For Scraping Dark Websites
Story – Packet Loss and Failing 10Gbps SFP+ Optic
Raspberry Pi: Combine a Raspberry Pi with up to 4 Raspberry Pi Zeros for less than US$50 with the Cluster HAT - NotebookCheck.net News
Essential Eight Maturity Model | Cyber.gov.au
10 Types of Phishing Attacks and Phishing Scams - Hashed Out by The SSL Store™
Pi4 not working with some chargers (or why you need two cc resistors) – The blog of Tyler Ward (aka scorpia)
How to design a proper USB-C™ power sink (hint, not the way Raspberry Pi 4 did it)
How many kinds of USB-C™ to USB-C™ cables are there? — Benson Leung
Patch OBIEE the quicker way - with OPatch napply
How to find expensive, inefficient and long running LDAP queries in Active Directory | Ask Premier Field Engineering (PFE) Platforms
CERN Computer Security Information
unclass-faq_dodroot_cert_chaining_issue.pdf
CISSP 16-week Study Guide, Resources, and Links to Source Documents : cissp
Study Notes and Theory - A CISSP Study Guide
1230_DISAs_Application_Security_and_Development_STIG_How_OWASP_Can_Help_You-Jason_Li.ppt - DISAs_Application_Security_and_Development_STIG_How_OWASP_Can_Help_You-Jason_Li.pdf
Design and Development of a Web-Based DOD PKI Common Access Card (CAC) Instruction Tool
Microsoft Word - Section Dividers.doc - 2012pki.pdf
Passed, Thank You. : cissp
Remediate Specific Cipher and TLS/SSL Vulnerabilities in Windows | RainingForks Tech Blog
UK Forensics Firm Paid Ransom in Cyberattack
Secure Oracle database binaries by updating JDK – Geodata Master
CPSC 4660
PowerPoint Presentation - TueAM2_2_CMMI.pdf
Index of /~grewe
Ten Strategies of a World-Class Cybersecurity Operations Center - pr-13-1028-mitre-10-strategies-cyber-ops-center.pdf
Want to Raise Successful Kids? Science Says Do These 5 Things Every Day | Inc.com
mdctf
Why Cybersecurity Threats in Medtech are Really Scary | MDDI Online
Steve Abrahamson
Common Access Card (CAC)
CAC Overview
DoD PKI and KMI Token Protection Profile (Medium Robustmess), Version 3, 22 Mar 2002 - PP_PKIKMI_TKN_MR_V3.0.pdf
Study resources | ThorTeaches CISSP, CISM & CISA
Developer Resources
Medical Device Security: The CISO’s View - HealthcareInfoSecurity
Jennings Aske
Securing Remote Desktop (RDP) for System Administrators | Information Security Office
Dangerous States of Mind – SafeStart
The Packer, The Windows, and the Vagrant box
How To Design A Quick Reference Card
10. Virtualization with KVM
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
Ansible vs. Terraform: Fight! - Linux Academy Blog
NVD - Data Feeds
Why Healthcare CIOs Are Embracing the Cloud
1. Communication With Patients 2. Collaboration with Physicians 3. Scalability for Growth 4. Data Recovery 5. Research Opportunities 6. Compliance
Boscloner Next-Gen RFID Testing
The Purdue model for Industrial control systems - Industrial Cybersecurity
2018-Present - dpmilroy
Ten User
Pavilion Data Systems Overview | PenguinPunk.net
VMWare vSphere 5.5 - Showing incorrect information in vSphere Web Client - The time I've wasted on technology...
Script Compare Server Configurations
Script Compare DHCP Server Settings with PowerShell DHCP Cmdlets
VM Become Unresponsive During vMotion. – VMwareMinds
Microsoft Word - nessus_compliance_checks (2).docx - nessus_compliance_checks.pdf
3 Tips for Enterprise Patch Management
I Feel Stupid Doing This but It Helps When Presenting
Report: UK's Largest Forensics Firm Pays Ransom to Attacker
Introducing Kvasir - Cisco Blog
TIP: List of Undocumented WUAUCLT Command Parameters - System Center Central
Windows Update WUAUCLT Command Line Switches » Technology & MSG » Blog Archive
PowerShell script help for Windows Update
The Skills Needed to Combat Today’s Cybersecurity Threats - Security Boulevard
Some notes on the Raspberry Pi - Security Boulevard
Top 30 Security Auditor Interview Questions and Answers for 2019
The Top 10 Linux Kernel Vulnerabilities You Should Know
Are We in a Cyberwar? Yes, Say Many IT Security Pros - Security Boulevard
Employee Attack Likelihood: The Hidden Indicator Nobody Talks About - Security Boulevard
The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure - Security Boulevard
Deriving value from the MITRE ATT&CK Threat Model - Security Boulevard
Top 4 Things to Tell New Hires About Cybersecurity - Security Boulevard
A basic question about TCP - Security Boulevard
Ransomware Attack Encrypts Medical Records at Australian Hospital - Security Boulevard
OODA and Cybersecurity - Security Boulevard
Cybersecurity Dashboards That Empower Decision Making
Ransomware Attacks Becoming are More Widespread, Destructive and Expensive - Security Boulevard
The Five Most Startling Statistics from this 2019 Global Survey of 1,200 Cybersecurity Pros [Infographic] - Security Boulevard
Kubernetes Security Best Practices to Protect Your Cloud Containers -
HCISPP or CISSP? What’s the Difference and Which Is Best for You? - Security Boulevard
Jeff Man Chats about His NSA Origin Story and the State of Cybersecurity Today - Security Boulevard
Ransomware forces Michigan medical practice to close shop - Security Boulevard
Best Practices for Automation in Cyber Security
NYDFS Implementation Grace Period Marks Strengthening Of Vendor Security - Security Boulevard
Carbon Black Report Indicates Industries Most Targeted For Cyber Attack - Security Boulevard
Healthcare Industry Remains Cybersecurity Laggard - Security Boulevard
Is FedRAMP Criticism Fair?
Internal Audit and IT: Joining the Same Cybersecurity Team - Security Boulevard
Cloud Security Myth vs. Fact #1: My Provider Protects My Data - Security Boulevard
Security that Doesn’t Slow You Down - Security Boulevard
GDPR Business Benefits Beyond Just Compliance - Security Boulevard
Part of the IT Career Energizer podcast - Thomas Maurer
Load Balance IIS with Microsoft ARR | PeteNetLive
Lessons in Vendor Lock-in: Google and Huawei | Linux Journal
Wesng - Windows Exploit Suggester
Understanding Key Management Policy – Part 2 - Gemalto blog
Understanding Key Management Policy – Part 1 - Gemalto blog
RobbinHood Ransomware Demands Grow $10K Per Day after Fourth Day - Security Boulevard
Trends in Cyber Attacks Over the Last 15 Years by Bill Crowell - Security Boulevard
Ransom amounts rise 90% in Q1 as Ryuk increases - Security Boulevard
Why Every Leadership Meeting Should Include a Cybersecurity Update
PKI: Why it’s as relevant today as it was 10 years ago - Security Boulevard
Third Party Security Risks to Consider and Manage - Security Boulevard
Navicent Health Discloses Data Breach as the Result of a Digital Attack - Security Boulevard
Treating security like safety: What the FDA’s recognition of UL 2900-2-1:2018 means for developers - Security Boulevard
5 Minute Guide: The NYDFS 500 Cybersecurity Regulations - Security Boulevard
Part Two: How Healthcare Cybersecurity Can Enable Innovation
How Healthcare Cybersecurity Can Enable Innovation
A Battle-Cry for Oracle EBS Security - Security Boulevard
Programming languages infosec professionals should learn - Security Boulevard
Why your development team should care about software compliance - Security Boulevard
April's Oracle CPU Fixes Critical Bugs Reported by Onapsis - Security Boulevard
Automating chaos experiments in production – the morning paper
Tracking Company Jets with ADS-B to Give an Edge to Hedge Fund Investors
Understanding Elliptic Curve Cryptography And Embedded Security | Hackaday
Bird Feeder Monitor V2.0: 12 Steps (with Pictures)
OpenPGP experts targeted by long-feared ‘poisoning’ attack – Naked Security
Docker Image Security Scanning: What It Can and Can't Do - Security Boulevard
50 Best Kubernetes Architecture Tutorials - Threat Stack
30,000 organisations have certified to Cyber Essentials - IT Governance Blog
FreeBSD Enterprise 1 PB Storage | 𝚟𝚎𝚛𝚖𝚊𝚍𝚎𝚗
China Targeting USG Employees Via Anthem Hack - Security Boulevard
Why doesn't the next Pi add...? Why doesn't the Pi 4 have...? The definitive debunking! - Raspberry Pi Forums
Six Myths People Still Believe About GDPR
Ransomware Takes Weather Channel Live Broadcast Offline - Security Boulevard
Samba 4.11 Aims To Be Scalable To 100,000+ Users - Phoronix
My Best Hires had 30% of “The Wrong Stuff” - Security Boulevard
Think Cybersecurity Insurance Will Save You? Think Again. - Security Boulevard
ITIL 4 — The main ITSM methodology gets agile and integrated with the most modern business practices - Security Boulevard
AWS HIPAA Compliance Best Practices Checklist - Threat Stack
ITIL v3 vs ITIL v4: What changed? | Phoenix TS
Is The NIST CSF Replacing HIPAA In Healthcare? - Security Boulevard
Ransomware First Response Guide - What to do in the ‘Oh $#@t’ moment - Security Boulevard
IT vs. Sales - Turning Cybersecurity Into a Revenue Center - Security Boulevard
Top 7 Tools and Tips for Improving Your DevOps Pipeline - Security Boulevard
CyberSeek career path: Cybersecurity architect
Protecting customer data at contact centers - Security Boulevard
The CEO's Guide To Understanding Cyber - Security Boulevard
Welcoming FIPS 140-3 - Security Boulevard
FIPS 140-3
8 security points of vendor lifecycle management - Security Boulevard
Inventorying vendors. List all your vendors and third parties that access any part of your networks or systems. Although it may be time-consuming, this process will allow you to know ALL the vendors accessing your networks, systems, and applications. This is also vital for the next step in the process, the vendor risk assessment, where you rank the risks associated with that access. Vendor security assessment. Existing and new vendors should be transparent about their security and remote access practices. It’s important for them to implement best-in-class security that protects your customer data and other sensitive business information. Vendor contracts. Your vendor contracts should include service level agreements (SLAs) that define the type and level of security the vendor uses enterprise-wide. Also included should be penalties for any outages, breaches, or network misuse. Access management. Vendor technicians should only have access to the networks, servers, and applications they need to support your business. Ensure that you have the ability to restrict access rights at the system or user level. Look for a vendor privileged access management (VPAM) tool that allows you to schedule access for specific times for attended and unattended access. Onboarding. Any software that you use to implement VPAM should have full-service onboarding and implementation services included. Some VPAM solutions validate employment status and provide the necessary access while obfuscating the actual network credentials. This is more efficient and user-friendly for the vendor’s staff. Off-boarding. A VPAM solution should be able to transparently audit and track user activity (or lack of activity). It should also allow you to easily terminate access at the individual level. Your VPAM solution should provide an efficient and secure way for a vendor to de-provision their users that then doesn’t require customer intervention. Monitoring, audit, and compliance. Your VPAM solution must audit and record sessions so any breach can be discovered early and tracked. This also helps to uncover any vulnerabilities as well as keep you compliant with necessary regulations and standards. Since data security and regulatory compliance are imperative for companies in highly regulated industries, your VPAM solution should produce detailed reports of who has accessed sensitive data at any time. Usability. Solutions for third-party access should provide multi-factor vendor user authentication and automated user management that is easy to use. The process should be simple and should smoothly integrate into a normal workflow. The more user-friendly the solution, the more likely users will take advantage of it.
The Public's Interest in Cybersecurity
3 things finance professionals need to know about the GDPR - Security Boulevard
Document archiving Right of access Incident response
Fourth-Party Security: Another Level of Security Management
How organisations can effectively manage, detect and respond to a data breach? - Security Boulevard
8 Patch Management Best Practices to Implement
#1: Inventory Your Systems A comprehensive inventory of all software and hardware within your environment is a critical piece of any patch management process. Once you have a clear picture of what you have, you’ll be able to compare the known vulnerabilities to your inventory to quickly discover which patches matter to you. #2: Assign Risk Levels To Your Systems Risk levels give you the ability to choose the right priorities. Don’t waste the 18,000 hours spent on patching by applying patches to the wrong systems. While all systems should be patched, it makes sense to assign risk levels to each item in your inventory. For example, a server in your network that is not accessible from the Internet should not be as high a priority to patch as a laptop used by your sales team. The more exposed to attack an item is, the faster it should be patched. #3: Consolidate Software Versions (And Software Itself) The more versions of a piece of software you use, the higher the risk of exposure. It also creates large amounts of administrative overhead. Choose one version of Windows, Linux, or MacOs and keep that version up to date with patches. Large organizations sometimes buy different software products that perform similar functions. Periodically review all software in use and its purpose. When you find multiple pieces of software performing the same function, choose one and get rid of the rest. Fewer software products mean fewer patches you have to apply. #4: Keep Up With Vendor Patch Announcements Using third-party vendors is a common practice. It’s good business sense to use a product to perform a common task and to spend your energy building software that differentiates your business. Keeping up with vendor patch announcements is key in this heterogeneous environment. Once you have a clear inventory of products, subscribe to all of their security updates through whatever channel patch announcements are made. Monitor each of these by sending them to a specific inbox or Slack channel. Create a process to ensure none fall through cracks so each patch can be added to the patch schedule. #5: Mitigate Patch Exceptions Sometimes a patch cannot be applied right away. For example, a Java patch may break an existing business application. Changes need to be made to make the patch work. However, this will take time. In these situations, mitigate the risk to the extent possible. Lockdown user permissions on the server (which you should do anyway). Don’t leave an unpatched server exposed to the Internet. Figure out how to reduce the impact and likelihood of an exploit until the patch can be applied safely. #6: Test Patches Before Applying Everywhere Every environment is unique. A patch could cause problems or even bring down machines with certain configurations. Take a small subset of your systems and apply the patch to them to make sure there are no major problems. Once a handful of systems check out, begin rolling out the patch to larger and larger groups until the entire company is patched. Patching quickly doesn’t mean applying the patch everywhere at once. Make sure patches don’t fall through the cracks and that a plan is in place to get everything patched in a timely manner. #7: Apply Application Patches As Quickly As Possible Applications you build have much more flexibility than operating systems and servers. When security vulnerabilities are found in your custom code, these should be added to the dev team’s backlog and treated with the same importance as vendor patches. Don’t leave the door open for an attack in your own applications. Quickly fix vulnerabilities and update your software in production. #8: Automate Open Source Patching Open source components help dev teams to build software more efficiently. But open source libraries are susceptible to the same vulnerabilities as other software.
HIPAA Compliance and Cybersecurity: How the Two Work Together - Security Boulevard
10 Things You Need to Know About Kerberos - Security Boulevard
Who actually invented Kerberos and when? Kerberos is a stateless network protocol developed by MIT and considered as licensed for distribution and modification. Kerberos started as part of Athina (another mythology reference!) project in 1979, aimed at protecting MIT computer networks. What makes Kerberos so special? Kerberos uses secret-key cryptography to provide secure communication over non-secure channels. Essentially, Kerberos is a trusted 3rd party server that issues tickets for users so they can authenticate to systems and services. Which Kerberos feature made it so valuable for organizations? Although it may seem strange and perhaps somewhat naive, it became valuable because the implementation for Microsoft and Mac devices used DES encryption. What is a Kerberos ticket, in a nutshell? Kerberos uses tickets to authenticate and grant access. Tickets created by a ticket granting server (TGS) are trusted by authentication server, to a specific service or endpoint requested by an account. Ticket serves as a proof of (your) identity and is always encrypted with a secret key. As long as your Kerberos ticket is valid, you will get access to the system or service. Is it a pure single-side client server model or can it be used for mutual identity verification ? Yes and yes. It is a mutual handshake where the client and server can verify each other’s identities. They accomplish this by using the encryption of timestamp with joint session key or via challenge/response that was introduced in 2005 to solve associated vulnerabilities. When did Microsoft officially adopted Kerberos as default authentication protocol? In year 2000: Seven years after MIT released its first Microsoft implementation. Microsoft is now using their own implementation of Kerberos rather than MIT’s original version. Your guess is as good as mine as to what goes into Microsoft’s secret sauce. What is a “Pass the Ticket” attack? Attackers can use tools such as Mimikatz and Windows Credential Editor to mine Kerberos tickets from compromised user endpoints or from authorization servers. Once the hacker gets a hold of these tickets, they can laterally move around the network to see privileges and harvest information that can help them gain access to critical systems. What about ‘Golden Ticket’ – is that a VIP pass? Yes – you now can go to the Chocolate Factory! Jokes side: this is called a ‘Golden Ticket’ because you are granted indefinite creation of a Kerberos generating ticket which is usually hard coded to grant access for 10 years by default (modified if you want). Are encryption keys kept unencrypted in memory during protocol use? Yes, that is a fact. Try not to think about this too much; my grandmother always claims ignorance is bliss. If Kerberos is supposed to be secure and widely trusted, do I still have to use strong passwords? Passwords are, unfortunately, here to stay as they are used to encrypt the certificates. Failing to use strong passwords will allow for a bruteforce attack. Ok…for the mega-Kerberos fanatic, lets add a bonus question: What happens if the Kerberos authentication server is down? The authentication system will be out of service. This is one of the things that makes them so attractive and the reason behind why there are so many in each deployment.
Cybersecurity KPIs for the SMB
Mean Time to Detect: How long did it take us to detect the issue? Mean Time to Respond: This metric comes from a service management perspective, and assumes someone is alerting you to a problem like an outage – typically not the case for the SMB. If you’re using a SIEM, some organizations leverage the metrics it can provide (total number of events, total devices being monitored). I have discussed the shortcomings of SIEM for the SMB elsewhere, as well as how we are modernizing SIEM functionality within our MDR process/platform. Which Configuration Settings have you changed? How many? The policy should dictate one number – how many systems actually reflect your policy (that you spent so much time coming up with) is of interest in assessing the progress in executing on that vision. Patches per asset per month - shows you the rate at which you’re addressing hygiene issues. Of course, understanding this in the context of patches remaining can help too. Vulnerabilities identified/remediated per week – ultimately, these vulnerabilities are the source of your problems. By tracking your progress in remediating vulnerabilities, you are demonstrating progress in reducing the risk facing your organization, as there is a risk that any such vulnerability could be exploited.
St John Ambulance service hit by ransomware attack
How to Make Your Own Windows PE Rescue Disc (And Keep Your PC Safe)
The Cost of Ransomware Attacks on Cities - Security Boulevard
Zeodium pays up to $500,000 for VMware ESXi, Microsoft Hyper-V exploitsSecurity Affairs
Anubis II - malware and afterlifeSecurity Affairs
How to get back files encrypted by the Hacked Ransomware for freeSecurity Affairs
Norsk Hydro estimates losses roughly $41M in first week after cyberattackSecurity Affairs
7 tips for preventing ransomware attacks - IT Governance Blog
The German chemicals giant Bayer hit by a cyber attackSecurity Affairs
Sodin Ransomware includes exploit for Windows CVE-2018-8453 bugSecurity Affairs
Thirty-four years - Security and firewalling (Part 4)
Thirty-four years - The System Office, Novell Directories, and Building a State Backbone (Part 3)
Thirty-four Years - Networking and Software Development (Part 2)
Thirty-four Years - Instructor, Machinist, CNC and CAD/CAM (Part 1)
Dell precision screen upgrade (FHD to UHD) | NotebookReview
6GXDN - 4k cable B173ZAN01.0 - AUO 4k panel
Siemens Healthineers medical products vulnerable to Windows BlueKeepSecurity Affairs
Ransomware paralyzed production for at least a week at ASCOSecurity Affairs
US Government halves deadline for applying critical patches to 15 days – Naked Security
Health Apps Can Share Your Data Everywhere, New Study Shows - VICE
Ransomware Forces Two Chemical Companies to Order ‘Hundreds of New Computers’ - VICE
Rewite http to https – it's notes
Tracking and Analyzing Remote Desktop Activity Logs in Windows | Windows OS Hub
Enable Encryption for Microsoft SQL Server Connections
Docker, Docker-CE, Docker-EE and Moby, which one do I pick? – Marksei
WSUS: Endpoint decommissioned; SHA2 update required | Born's Tech and Windows World
PostgreSQL
VMware begins patching process for Linux SACK vulnerabilities
Security Teams: What You Need to Know About Vulnerability Response - Blog | Tenable®
Sodin ransomware exploits Windows vulnerability and processor architecture | Securelist
CCPA: What health care, biotech and life sciences companies should know now
Importing VMs to KVM with virt-v2v
The Pains Of Vulnerability Coordination – And What To Learn From It – RBS
MIG - Distributed And Real Time Digital Forensics At The Speed Of The Cloud
Hash-Identifier - Software To Identify The Different Types Of Hashes Used To Encrypt Data And Especially Passwords
'Zero Trust' Adds Up to Better Security - HealthcareInfoSecurity
Adoption of Security Best Practices: A Status Report
Medical Device Security: The Manufacturer’s View
Unsupervised Learning: No. 181 | Daniel Miessler
Top 20 Best Disk and File Encryption Software for Linux in 2019
Raspberry Pi: Power On / Off A TV Connected Via HDMI-CEC - Linux Uprising Blog
Functional Programming in Python – Real Python
Robots.txt is 25 years old — Martijn Koster's Pages
5 common mistakes made by beginner python programmers - https://www.pythoncircle.com
LINUX Unplugged 308: The One About GPU Passthrough
Getting rid of annoying, repetitive messages in /var/log/messages | Frits Hoogland Weblog
D-Link agrees to 10-year security assessment to settle FTC lawsuit
Fix Apple Hardware Problems with Deep Cleaning - TidBITS
Mellanox: automatic firmware update | panticz.de
The Command Line In 2004
Learn how to Record and Replay Linux Terminal Sessions Activity
Microsoft’s Threat & Vulnerability Management now helps thousands of customers to discover, prioritize, and remediate vulnerabilities in real time - Microsoft Security
The Forgotten Operating System That Keeps the NYC Subway System Alive - VICE
How To Buy Hardware That’s Likely to Last - TidBITS
Learning Docker creating your own base image – Virtual Me
Learning Docker create your own micro-image – Virtual Me
Learning Basic Docker Commands – Virtual Me
US Cyber Command warns of nation-state hackers exploiting Outlook
AI Could Usher in a New Generation of Catfishing - VICE
China Is Forcing Tourists to Install Text-Stealing Malware at its Border - VICE
Why time series databases are exploding in popularity - TechRepublic
Inspecting Audit Logs with ausearch and aureport | Lisenet.com :: Linux | Security | Networking
Health Data Breach Tally: A Mid-Year Update - HealthcareInfoSecurity
Cybersecurity for Gamers 101: Gaming Malware and Online Risks
Lake City Employee Fired Following Ransom Payment
Healthy Food Choices For Healthy Teeth | Penniless Parenting
HOWTO: Disable Unnecessary Services on Web Application Proxies - The things that are better left unspoken
Five Skills That Help You Lead Remotely
Be a flexible communicator Set clear expectations. Be observant. Build trust. Use technology.
Horizontal leadership | Seth's Blog
5 Bootable Windows PE-Based Recovery Discs That'll Save Your System
Build Your Own Selfie Drone With Computer Vision | Hackaday
Exploring Basement Humidity With A Raspberry Pi | Hackaday
FarmBot Unveils New CNC Gardening Robot Models | Hackaday
Intel and the auto industry pen first safety rules for self-driving cars
Risk Management - If a Thing is Worth Doing, Its Worth Doing Right | Pivot Point Security
Veeam Virtual Labs & SureBackup | PeteNetLive
Senator Warren Says Key FCC Cybersecurity Advisory Council Panders to Industry - VICE
Your Future Doctor Could Monitor Your Facebook Posts for Disease - VICE
John Deere's Promotional USB Drive Hijacks Your Keyboard - VICE
Kentucky Deploying 'Armored' Internet Fiber to Fend Off Hungry Squirrels - VICE
Thousands of Facebook Users Hit in Malware ...
What You Need to Know About Vulnerability Management Best Practices - Blog | Tenable®
KPIs Scan frequency: How often does your enterprise conduct assessments? Scan intensity: How many different scans are launched on a given scan day? Asset authentication: How does your enterprise measure assessment depth? Asset coverage: What proportion of the licensed assets are scanned in a 90-day period? Vulnerability coverage: What proportion of total vulnerability plugins are used in a 90-day period?
Keeping Up With the Patches: A Tour Through Spring 2019 Threat Alerts
One-fifth of the most-used Docker containers have at least one critical vulnerability | Kenna Security
Getting 2FA Right in 2019 | Trail of Bits Blog
Mortgage Payoff Experiment - Pay Off Mortgage Early or Invest? | Mad Fientist
Virginia updates its revenge porn law to include deepfakes
Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update - Microsoft Security
“From the Server Room to the Board Room”: The 4 Top Concerns of Security-Aware C-Suites | Pivot Point Security
1. Advanced Persistent Threats (APTs). Whether sponsored by nation-states or organized crime, the end goal of APTs is the same: advancing financial advantage and/or a political or social power play. As APTs have ramped up, smaller businesses have come well within their scope. Any adversary can easily find out about your company’s financial status and probable security posture, and target you at will. That is the harsh reality of today’s business landscape. 2.Moving to cloud solutions. Seeking to decisively enhance their security postures to manage the risk of APTs and other threats (among other drivers), more and more clients are asking us: “How do we address security in the context of moving to the cloud? Because we no longer want to buy, maintain and secure all that infrastructure ourselves.” Security and cloud are now part of the same conversation, versus moving to the cloud now and worrying about security later. 3. Finding security leadership. Having moved from the server room to the board room, security is no longer just an IT management issue. Analogous to the roles of the CFO and the General Counsel, today’s CISO must rise to a similar level of responsibility for the organization’s ongoing viability. Further, the move to cloud requires expertise around security architecture, auditing, maintenance, etc. that is different from “traditional” IT security roles. Attracting effective security leaders in these emerging areas given today’s leadership shortage is a major CxO concern. 4.Compliance with privacy mandates. With the emergence of GDPR and CCPA, many of our customers are worried about compliance with privacy regulations. They realize that security and privacy domains are similar in many ways, but privacy brings its own, unique challenges—and now is the time to meet them.
Thoughts on Two Years of Working from Home - PacketLife.net
NetBox v1.1.0 Released - PacketLife.net
Taking the CCIE Lab in RTP - PacketLife.net
Response to "Certifications Are Not A Big Deal. Stop Being a Princess About It." - MovingPackets.net
Auditing the SELinux Policy with sesearch | Lisenet.com :: Linux | Security | Networking
Can Patient Data Be Truly ‘De-Identified’ for Research?
A Privacy-Driven Security Culture - Security Boulevard
How to Create Smarter Risk Assessments
The Truth About Your Software Supply Chain
New Warning on Ryuk Ransomware
Retooling for Privacy | Calvin Bui
Ransomware Hits Georgia Court System
What to Expect from the Security and Risk Management Market in 2019: Recap from the Gartner Security and Risk Management Summit - Security Boulevard
Threat Intelligence Best Practices - Security Boulevard
10 Data Privacy and Encryption Laws Every Business Needs to Know - Security Boulevard
amass — Automated Attack Surface Mapping | Daniel Miessler
The tyranny of small debts, compounded | Seth's Blog
Boeing’s 737 Max Software Outsourced to $9-an-Hour Engineers - Bloomberg
Beginner's Guide v2 - The MagPi MagazineThe MagPi Magazine
Five defence challenges facing Canada
The 10 Best Calibre Plugins for Ebook Lovers
Leadership is a practice not a position of authority (Gurteen Knowledge)
5 tips to improve your company's IT security
» Open Hardware: Open-Source MRI Scanners Could Bring Enormous Cost Savings
Top Web Based Docker Monitoring Tools – Linux Hint
Top 10 Ethical Hacking Books – Linux Hint
AMD Releases Firmware Update To Address SEV Vulnerability - Phoronix
Linux Kodachi 6.1 The Secure OS | Eagle Eye | Nonprofit Organization
abcde - CD ripping software for the command line - LinuxLinks
OpenAssessIt Toolkit · GitHub
To defeat ransomware, we must first diagnose it correctly
The History of Cellular Network Security Doesn’t Bode Well for 5G | Electronic Frontier Foundation
Knowledgebase: Azure AD Connect’s Seamless SSO breaks when you disable RC4_HMAC_MD5 - The things that are better left unspoken
If you want Azure AD Connect’s Seamless Single Sign-on functionality to work, RC4_HMAC_MD5 will need to be available.
NetApp Ontap 9.6 Simulator Upgrade
Dijkstra was only partially correct about testing
This Malware Created By A 14-Yr-Old Is Bricking Thousands Of Devices
Silex
Syncing Time within An Active Directory Domain Checklist | KC's Blog
Find All HP iLOs on your Network | PeteNetLive
Migrating away from the Ubiquiti EdgeRouter Lite | Logan Marchione
Installing Docker on Linux – Virtual Me
Creamy Mushroom and Spinach Pasta - Spoonful of Flavor
Here’s the Microsoft April Patch Tuesday roundup – Naked Security
Belgian programmer solves cryptographic puzzle – 15 years too soon! – Naked Security
Can you get hit by someone else’s ransomware? [VIDEO] – Naked Security
Serious Security: Ransomware you’ll never find – and how to stop it – Naked Security
How to recover from a security breach
How to Obtain Valuable Data from Images Using Exif Extractors « Null Byte :: WonderHowTo
Don’t break Windows 10 by deleting SID, Microsoft warns – Naked Security
Top 10 Browser Extensions for Hackers & OSINT Researchers « Null Byte :: WonderHowTo
5 principles driving a customer-obsessed identity strategy at Microsoft
Seth - Perform A MitM Attack And Extract Clear Text Credentials From RDP Connections
Rdpscan - A Quick Scanner For The CVE-2019-0708 "BlueKeep" Vulnerability
BackBox Linux 6.0 - Ubuntu-based Linux Distribution Penetration Test and Security Assessment
MozDef - Mozilla Enterprise Defense Platform
Vxscan - Comprehensive Scanning Tool
One-Lin3r v2.0 - Gives You One-Liners That Aids In Penetration Testing Operations, Privilege Escalation And More
Cryptr - A Simple Shell Utility For Encrypting And Decrypting Files Using OpenSSL
GDPR and Apache logs, remove last octet of an IP address - Koen Van Impe - vanimpe.eu
Infosecurity.US - Web Log - New NIST IOT Cyebrsecurity Document Published
£60 million in recovery costs for Norsk Hydro after refusing ransom demand - IT Governance Blog
Project iKy - Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface
Home Office report reveals susceptibility to accidental data breaches - IT Governance Blog
Medical debt collection agency files for bankruptcy protection after data breach - IT Governance Blog
What are the 10 steps to cyber security? - IT Governance Blog
List of data breaches and cyber attacks in June 2019 ­– 39.7 million records leaked - IT Governance Blog
Safeguarding Health Information: Building Assurance through HIPAA Security 2019 | NIST
Experts: Spy used AI-generated face to connect with targets
Key Biscayne Hit by Cybersecurity Attack
Google's next undersea internet cable will link Africa and Europe
Medical Device Cybersecurity: The Top Challenges
Second Florida City Pays Up Following Ransomware Attack
Bill Proposes Easing HIPAA Enforcement Action in Some Cases
Police Arrest 6 in $28 Million Cryptocurrency Fraud Probe
TLS certs for internal OTS hardware - DigiNinja
Finding Free Images | Diary of a Network Geek
Jony Ive helped make Apple what it is today
Deploying and Configuring a vCenter Appliance using Terraform
Jaffar's (Mr RAC) Oracle blog: Oracle Exadata X8 key capabilities summary
work Agile in a GxP-regulated environment - Blog dbi services
Replaced my failed gas water heater with a much more efficient Rheem hybrid electric with WiFi, its quiet heat pump is also dehumidying and cooling my basement | TinkerTry IT @ Home
Health Insurer Reports Data Breach That Began 9 ...
Could Foster Kids Help Solve the Security Skills ...
Former Equifax CIO Sentenced to Prison for Insider ...
How GDPR Teaches Us to Take a Bottom-Up Approach to ...
Top 8 security mistakes in SAP environments | CSO Online
Quinoa and Beet Salad with Tahini Dressing Recipe -- Vegan, Easy, and Delicious | Penniless Parenting
5 Basic Maintenance Tips for Your Air Conditioning Unit | Penniless Parenting
Intel’s Optane: Two Confusing Modes. Part 4) Comparing the Modes | The SSD Guy
2 Medical Practices Among Latest Ransomware Attack Victims
The World is Collapsing into Two Countries—Green and Red | Daniel Miessler
Today’s Top Public Cloud Security Threats …And How to Thwart Them
NIST releases guidelines for building trustworthy, secure software
EFF reveals top priorities for consumer data privacy laws
Medical debt collector files for bankruptcy after data breach
Healthcare Exchange Standards: ACME is not appropriate for Heathcare use
Beginner’s Guide to Nexpose
Machine Learning Doesn't Introduce Unfairness—It Reveals It | Daniel Miessler
The Growing Threat of Botnets & Cryptominers | CyberWatch
I provide some details on which CVEs, which exploits, and which tactics are being used by attackers; which ports should be monitored and are used by miners; how Linux, Docker and Mac are now targets; and articles and sources on recent attacks. Some attacks I use to illustrate are: Kingminer: bruteforce entry on servers running MS IIS/SQL, disabling configuration file with API for evasion PSMiner: backdoor Trojan cryptominer targeting Linux and MacOS via CVE-2018-20062 Docker Rigs: Cryptojacking campaigns on vulnerable docker rigs leveraging CVE-2019-5736 to overwrite the runc binary and create a container escape to write arbitrary code Smominru: Massive cryptomining rig leveraging EternalBlue and WMI WireX: Botnet of Android devices infected through Google Playstore apps to connect them to a headless Web browser and encrypt malicious traffic using SSL CVEs/Vulnerabilities used for RCE: CVE-2012-0874: JBoss Enterprise Application Platform Multiple Security Bypass Vulnerabilities. CVE-2010-1871: JBoss Seam Framework JBoss AS 3/4/5/6: CVE-2017-10271: Oracle WebLogic wls-wsat Component Deserialization RCE CVE-2018-2894: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware. Hadoop YARN ResourceManager – Command Execution CVE-2016-3088: Apache ActiveMQ Fileserver File Upload
Windows 10: Diagnose tool SetupDiag | Born's Tech and Windows World
Parents' lack of cybersecurity knowledge holds back children's career choices
Kali Linux sets out its roadmap for 2019/20
What Is the Digital Divide, and Which Side Are You On?
Book recommendations–present, future and past | Seth's Blog
A tale of two cities: Why ransomware will just get worse | Ars Technica
Naples Rolls Out A Fine-Tuned Dough, And The New 'Cloud Pizza' Is Born : The Salt : NPR
Apple's Scary Buying Power And The Woman Who Named It : Planet Money : NPR
monopsony - the power a firm had when it was the single buyer of something.
Nines are not enough: meaningful metrics for clouds – the morning paper
What bugs cause cloud production incidents? – the morning paper
13 Websites to Find People on the Internet
6 Slideshow Design Mistakes You Should Avoid in Your Next Presentation
Never use Comic Sans. Avoid cursive script. Never use an image without permission. Never enlarge pixel based images. Don’t place your text in random order. Don’t ignore the importance of a theme.
Before Computers: Notched Card Databases | Hackaday
Finally, An Open Source Multimeter | Hackaday
. The
Your Security Audit Roadmap - Linux Academy Blog
The 9 Best Soldering Irons for Beginners
5 Ways to Safely Test Your Antivirus Software
Open Source Could Be a Casualty of the Trade War « bunnie's blog
Mentoring new system administrators | Enable SysAdmin
Raspberry Pi pHAT detects indoor pollution, and optionally, outdoors too
What is Fragmentation?
Cyber-attacks on hospitals most likely come from China, SRI says – The Romania Journal
Certificate Chain Incomplete | PeteNetLive
Understanding Public Key Infrastructure and X.509 Certificates | Linux Journal
Security-Focused HTTP Headers to Protect Against Vulnerabilities
Cranky Old Network Engineer Complains About The Youth Of Today - MovingPackets.net
Install CHR On Proxmox | Greg Sowell Consulting
Data breach at Desjardins (Canadian credit union) | Born's Tech and Windows World
US cyberattack reportedly knocked out Iran missile control systems
Microsoft releases out-of-band fixes for Win7 and Win8.1 on 6/20 @ AskWoody
A rogue Raspberry Pi helped hackers access NASA JPL systems
A Method for Establishing Liability for Data Breaches - Lawfare
Thank you VMware, for two and a half awesome years as an HCI Systems Engineer! | TinkerTry IT @ Home
The Budapest Convention Offers an Opportunity for Modernizing Crimes in Cyberspace - Lawfare
Windows Terminal preview now available to download
How will you backup and recover Windows 2008/R2 after January 2020? | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, Power Protect, CSM
Dump TNSNAMES.ORA from ActiveDirectory – Laurent Schneider
Why the US Government Just Made Its Own Font, Open Sans
Daniel Stori's 'Oracle Download Page' - Security Boulevard
Application Security Best Practices - Security Boulevard
How the “Diamond Model” Can Help SOC Analysts Boost Incident Response - Siemplify
The good, the bad and the unexpected: what GDPR has taught us in the last year - Security Boulevard
3 Ways Norsk Hydro Kept its Reputation During LockerGoga Cyberattack - Security Boulevard
Health Care Digitalization Brings New Security Challenges - Security Boulevard
GPOs for Windows, macOS, and Linux | JumpCloud
Your threat model is wrong - Security Boulevard
Docker Container Monitoring: Protect Your Investment - Security Boulevard
Journey to OSCP - 10 Things You Need to Know
During the less restricted labs, it is good practice to redo a system again “manually” after you were able to use it using a more automated method that isn’t allowed in the actual exam
CJIS Requirements: What Businesses Need to Know
Information security career resume tips
Unpatched Vulnerabilities Caused Breaches in 27% of Orgs, Finds Study - Security Boulevard
Four Essential Cloud Security Concepts - Security Boulevard
Cyber Security Roundup for May 2019 - Security Boulevard
U.S. Businesses Lost $654 Billion from Cyberattacks in 2018 - Security Boulevard
$654 Billion
Ransomware succeeds because targets don’t learn from history - Security Boulevard
Mimikatz and Windows RDP: An Attack Case Study - Security Boulevard
National Cyber Security Strategy 2016 to 2021: progress so far - GOV.UK
UK Security BSides, Mark Your Calendar & Don't Miss Out - Security Boulevard
How nCipher Security Recommends Hospitals Can Stay Resilient to Cyber-Threats - Security Boulevard
Automated Office Updates v1.0 – Stick To The Script
The essentials of vendor risk management - SecureLink
Seccubus - Easy Automated Vulnerability Scanning, Reporting And Analysis
Target Stores Back Online After Crippling Cash Register Computer Failure : NPR
How to Install uTorrent in Ubuntu 18.04 and Ubuntu 19.04 - LinuxBabe
Chris's Wiki :: blog/programming/IntelCPUIDNotes
shellcheck and You Should Too
Topic: Word Mailmerge Tips & Tricks @ AskWoody
Tip: PowerShell workarounds for June bug in Windows Event Viewer | Born's Tech and Windows World
The Cost of Cybercrime - Schneier on Security
InfoSec Handlers Diary Blog - Using AD to find hosts that aren't in AD - fun with the [IPAddress] construct!
InfoSec Handlers Diary Blog - Odd DNS Requests that are Normal
InfoSec Handlers Diary Blog - Keep an Eye on Your WMI Logs
WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
Excellent Analysis of the Boeing 737 Max Software Problems - Schneier on Security
Defending Democracies Against Information Attacks - Schneier on Security
Cybersecurity for the Public Interest - Schneier on Security
Protecting Yourself from Identity Theft - Schneier on Security
What the AMCA Data Breach Teaches Us About Modern Supply Chain Security - Security Boulevard
Radiohead Releases Music Online Instead of Giving in to Blackmailer Demands - Security Boulevard
84% of US employees have never heard of GDPR - TechRepublic
How to Patch BlueKeep and Get to Know Your Company's Critical Assets
Magdoff2.qxd - ReserveArmy.pdf
What’s the best approach to patching vulnerabilities? – Naked Security
Backpacker claims to find a network of hidden webcams in farm stay – Naked Security
Crazy: Windows 10 Enterprise LTSC 2019 offered a feature update to 1903 | Born's Tech and Windows World
Hackback Is Back: Assessing the Active Cyber Defense Certainty Act - Lawfare
Vulnerable Software – The Gift that Keeps on Giving - Security Boulevard
Building Modern Security Awareness with Experiences
Updating the VMware vCenter License Key using PowerCLI - thecloudxpert
5 Secure Coding Practices You Actually Need: Principles for Secure Code Every Time - Security Boulevard
Telegram App DDoS from China Hinders #612strike Protest - Security Boulevard
9 PCI Myths That Can Cost CIOs - Security Boulevard
Mitigating BlueKeep with PowerShell – Mike F Robbins
PrivacyCulture_GDPR_Maturity_Framework.pdf
The Biggest Data Breach Archive on the Internet Is for Sale - VICE
Sensory Overload: Filtering Out Cybersecurity's Noise
The Military Wants AI to Manage America's Airwaves - VICE
EPIC - EPIC's Rotenberg Speaks with Mueller Book Club
What kids get up to online | Securelist
A predatory tale: Who’s afraid of the thief? | Securelist
Spam and phishing in 2018 | Securelist
Active Dataguard : read only with apply – Laurent Schneider
Bugs in a popular hospital pump may let attackers alter drug dosages
The Best Encrypted Email Services You Need to Use in 2019
Threat Landscape for Industrial Automation Systems in H2 2018 | Securelist
Beware of stalkerware | Securelist
BadCert: Symcrypt vulnerability puts Windows Server at risk | Born's Tech and Windows World
Why You Need a Crisis Communications Plan | Pivot Point Security
Tenable Roundup for Microsoft's June 2019 Patch Tuesday
Tenable Roundup for Microsoft's June 2019 Patch Tuesday
IoT Cybersecurity Improvement Act: An Important Step Forward - Blog | Tenable®
Software Vulnerability Management with Device42 and VulnDB
New VulnDB Integration for ServiceNow Enables Better Vulnerability Response
Adapting Agile for Internal Security Operations
NBlog - the NoticeBored blog: NBlog June 12 - lack of control is not a vulnerability
Corrupt MP4 Files? Fix Them for Free With This Great Trick
2018 Year in Review
Zero Day Initiative — The June 2019 Security Update Review
Healthcare Security Summit Offers Insights From CISOs
Google Researcher Details Windows Cryptographic Library Bug
Microsoft Patch Tuesday, June 2019 Edition — Krebs on Security
RapidScan - The Multi-Tool Web Vulnerability Scanner
Yaazhini - Free Android APK & API Vulnerability Scanner
Unsecured Database Leaves 8.4 TB of Email Metadata Exposed
CIA, Cyber Risk and Patient Safety ~ Cyber Thoughts
SAP Security Notes June 2019 | Onapsis
Cyberattack Hits Aircraft Parts Manufacturer
Healthcare Exchange Standards: Patient Engagement - Access Log
Healthcare Exchange Standards: XDS sha-1 is still okay
Entering the Third Decade of Cyber Threats: Toward Greater Clarity in Cyberspace - Lawfare
How to Structure a Cover Letter and Resume When Sending via Email
An Amazing Job Interview | Don Jones®
Privacy Is Now a Luxury Good: Here's Why That's Bad for All of Us
Perovskites: Not Just For Solar Cells Anymore | Hackaday
Chris's Wiki :: blog/sysadmin/IntelMDSKillsOldServers
Trouble-shooting | Oracle Scratchpad
Yubico recalls government-grade security keys due to bug
Ansible: configuration management for everything – Marksei
Smarten Up Your Air Conditioning With The ESP8266 | Hackaday
Botanium: Urban Gardening For All
The 15 Most Popular Plex Podcasts in 2019
SSL Handshake Failures | Baeldung
Free up over 17GB of storage space by cleaning up after the Windows 10 May 2019 Update
The bits and bytes of PKI | Opensource.com
U.S. GAO - Information Technology: Agencies Need to Develop Modernization Plans for Critical Legacy Systems
Dealing with Scale and Security: How MasterCard is Mastering the Game - Big Data Beard
A Field Guide To Transmission Lines | Hackaday
How to Design a Lithium Battery Pack (Part 2 of 2)
How To Build Your Own Lithium Battery (Part 1 of 2)
A computer virus has thrown Philadelphia’s court system into chaos - The Verge
World domination with cgroups in RHEL 8: welcome cgroups v2!
Why Smart Cards Are Smart | Linux Journal
When the 'smart home' is actually a hospital room
Digital Transformation Suffers from Poor Alignment Between IT and Execs | APMdigest - Application Performance Management
vCenter 'Root' Account Expired | PeteNetLive
Darran's WildFly Blog: Security Feature Development for WildFly 17
Cyber Gaslighting: PsyOps in the Home - Lawfare
Free Websites Reveal Your Address History and Names of Relatives (How to Opt Out) — My Money Blog
Technology : You have to keep working just to stand still! | The ORACLE-BASE Blog
Switch Buffer Sizes and Fermi Estimates « ipSpace.net blog
Kubernetes Storage on vSphere 101 – StatefulSet - CormacHogan.com
World-class data science server to amplify Clemson’s supercomputer | Clemson University News and Stories, South Carolina
Patchday: Updates for Windows 7/8.1/Server (June 11, 2019) | Born's Tech and Windows World
June 2019 Patch Tuesday is rolling out @ AskWoody
How Ransomware Evolved | KC's Blog
'The Moscow Rules' By Tony And Jonna Mendez: How The CIA Evaded KGB Security : NPR
Microsoft Extends its Lead Over Amazon and Apple as the Most Successful U.S. Company | Alexander's Blog
GPS And ADS-B Problems Cause Cancelled Flights | Hackaday
Takata’s Deadly Airbags: An Engineering Omnishambles | Hackaday
Lessons From Global Cybersecurity Breaches For Your Next M&A
Top 10 ways to strengthen your personal online security – Jason Pearce
I switched to Duplicati for Windows Backups and Restic for Linux Servers | b3n.org
Kubernetes at 5: Joe Beda, Brendan Burns, and Craig McLuckie on its past, future, and the true value of open source – GeekWire
Data in a Flash, Part III: NVMe over Fabrics Using TCP | Linux Journal
Tokyo in the 1970s, Revisited by Photographer Greg Girard | Spoon & Tamago
To Do List Grid For When You Have a Lot of To Dos | DennisKennedy.Blog
Jeff Bezos Is a Post-Earth Capitalist - VICE
Scientists Discover Atomic-Forged Glass on Hiroshima's Beaches - VICE
Hiroshimaites
Adobe Tells Users They Can Get Sued for Using Old Versions of Photoshop - VICE
NBlog - the NoticeBored blog: NBlog April - spotting incidents
NBlog - the NoticeBored blog: NBlog April 11 - the KISS approach to ISO27k
NBlog - the NoticeBored blog: NBlog May 20 - the value of visuals
NBlog - the NoticeBored blog: NBlog June - physical information security
Hacking History
Twitch Flooded with Streams of 'Game of Thrones', Porn, and the Christchurch Attack Video - VICE
It’s Almost Impossible to Tell if Your iPhone Has Been Hacked - VICE
The Top 17 Free and Open Source Backup Solutions
Mark Zuckerberg Will Be Served a Summons If He Sets Foot In Canada - VICE
The Google Outage Highlights the Perils of a Centralized Internet - VICE
The US Ban on Huawei Is Causing a Global Mess - VICE
Hackers Breach Company That Makes License Plate Readers for U.S. Government - VICE
The Importance of Cybersecurity Training | United States Cybersecurity Magazine
Sadly, many employees don’t even realize how important cybersecurity training really is for the organization they work for. And even worse, according to a survey of over 4,500 employees, 22% of employees don’t feel like they should be obligated to keep their employer’s information safe.
The PC of Your Dreams Might be Hiding in a Company’s Surplus Bin - VICE
Solving the TLS 1.0 problem - Microsoft Security
Announcing the all new Attack Surface Analyzer 2.0
Introducing the security configuration framework: A prioritized guide to hardening Windows 10 - Microsoft Security
Discover and manage shadow IT with Microsoft 365
UK launches cyberstrategy with long-term relevance
Specifically, the cybersecurity document does an excellent job in the following areas: Insider threats—This type of threat is highlighted throughout the document; something that is not always emphasized sufficiently. For example, “Insider threats remain a cyber risk to organizations in the UK. Malicious insiders, who are trusted employees of an organization and have access to critical systems and data, pose the greatest threat.” We continue to hear about this problem from customers in nearly all industries and in all countries. This bold and clear statement makes it clear that this problem is front and center for the UK strategy, as it should be. Public incidents—It’s refreshing to see major incidents that impact companies and organizations in the UK highlighted rather than hidden from public view. The document includes several incidents, such as the 2015 TalkTalk breach, and the 2016 attack on the Society for Worldwide Interbank Financial Telecommunication (SWIFT) payment system in Bangladesh, the Philippines, and the Ukrainian power grid incident. While these incidents did not all occur on UK soil or directly to UK organizations, their impact was still felt in the UK. Diversity and inclusion—The UK is committed to increasing diversity while also addressing its cybersecurity skills shortage. The document states emphatically that “we will address the gender imbalance in cyber-focused professions, and reach people from more diverse backgrounds to make sure we are drawing from the widest available talent pool.” The need is so critical that cybersecurity has become known as a wonderful field for younger professionals to embark on a new career, even if it is not something that is well-known. Public-private collaboration—Cybersecurity is a “team sport” and working together across private and public sectors is essential. Openly admitting this and accepting government responsibility is a key tenet of this strategy, described as, “Government has a clear leadership role, but we will also foster a wider commercial ecosystem, recognizing where industry can innovate faster than us.” The document also states, “We will set out more clearly the respective roles of government and industry, including how these might evolve over time.” As we look at other areas that the strategy may wish to consider expanding into or elaborating upon in the coming years, three specific areas come to mind: Links to money laundering and terrorist financing—While the initial 2016 version did not mention how the flow of money impacts and funds cybercrime, the NSCR March 2018 update did, with three specific references to money laundering and terrorist financing, explaining, “We will take a whole-of-government approach including with the Devolved Administrations to tackle serious and organized crime and publish an updated Serious and Organized Crime Strategy in 2018.” It also stated, “We remain a leading player in developing and applying economic sanctions [… and will] … continue using sanctions smartly to deliver national security outcomes after we have left the EU.” Returning military veterans—Whether it be from armed conflicts or peace-keeping missions or other such activities, one way the UK could shrink the gap in cybersecurity skills would be to help military veterans transition into this field. The strategy states, “This skills gap represents a national vulnerability that must be resolved.” To that end, there are multiple paths that other countries have pursued that could be applied here. Cloud computing—The terms “cloud” and “cloud computing” are not mentioned in the original 2016 strategy document or in the NSCR March 2018 update. Cloud-based security offerings are a mainstay of any cybersecurity strategy and bring with them enormous benefits, speed, operational efficiencies, and more.
Uncovering Linux based cyberattack using Azure Security Center
Secure your journey to the cloud with free DMARC monitoring for Office 365
Security deployment - Microsoft Security
Lessons learned from the Microsoft SOC Part 2b: Career paths and readiness
Lessons learned from the Microsoft SOC—Part 2a: Organizing people
Lessons learned from the Microsoft SOC—Part 1: Organization - Microsoft Security
Commando VM - The First of Its Kind Windows Offensive Distribution
Wireshark Cheatsheet
CPU percent | Oracle Scratchpad
Metasploit Cheat Sheet
Imago Forensics - Imago Is A Python Tool That Extract Digital Evidences From Images
Faraday v3.6 - Collaborative Penetration Test and Vulnerability Management Platform
Legion - An Easy-To-Use, Super-Extensible And Semi-Automated Network Penetration Testing Tool That Aids In Discovery, Reconnaissance And Exploitation Of Information Systems
Vuls - Vulnerability Scanner For Linux/FreeBSD, Agentless, Written In Go
Reverse Shell Cheat Sheet
Acunetix Web Application Vulnerability Report 2019
CarbonCopy - A Tool Which Creates A Spoofed Certificate Of Any Online Website And Signs An Executable For AV Evasion
DOGE - Darknet Osint Graph Explorer
Armory - A Tool Meant To Take In A Lot Of External And Discovery Data From A Lot Of Tools, Add It To A Database And Correlate All Of Related Information
Freevulnsearch - Free And Open NMAP NSE Script To Query Vulnerabilities Via The cve-search.org API
mXtract - Memory Extractor & Analyzer
FIR - Fast Incident Response
H2T - Scans A Website And Suggests Security Headers To Apply
LEDs for use with solderless breadboard – Skippy's Random Ramblings
507 Mechanical Movements
Gareth's Tips, Tools, and Shop Tales | Revue
Gareth's Tips, Tools, and Shop Tales
How To Check if My Email is Encrypted during Transition | KC's Blog
Secure Email
DumpTheGit - Searches Through Public Repositories To Find Sensitive Information Uploaded To The Github Repositories
AutoSource - Automated Source Code Review Framework Integrated With SonarQube
Joy - A Package For Capturing And Analyzing Network Flow Data And Intraflow Data, For Network Research, Forensics, And Security Monitoring
BruteDum - Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC With Hydra, Medusa And Ncrack
Pacbot - Platform For Continuous Compliance Monitoring, Compliance Reporting And Security Automation For The Cloud
WAFW00F v1.0.0 - Detect All The Web Application Firewall!
Machinae v1.4.8 - Security Intelligence Collector
Machinae
Trigmap - A Wrapper For Nmap To Automate The Pentest
Adidnsdump - Active Directory Integrated DNS Dumping By Any Authenticated User
Vulmap - Online Local Vulnerability Scanners Project
Beagle - An Incident Response And Digital Forensics Tool Which Transforms Security Logs And Data Into Graphs
Free Cynet Threat Assessment for Mid-sized and Large Organizations
DefectDojo v1.5.4 - Application Vulnerability Correlation And Security Orchestration Application
Ttyd - Share Your Terminal Over The Web
Miteru - An Experimental Phishing Kit Detection Tool
Acunetix Vulnerability Scanner Now With Network Security Scans
Brutemap - Tool That Automates Testing Accounts To The Site's Login Page
Cybersecurity and the Mueller Report - Lawfare
Transnational Organized Crime and National Security - Lawfare
Persistent Engagement, Agreed Competition and Deterrence in Cyberspace - Lawfare
Progress in Cybersecurity: Toward a System of Measurement - Lawfare
A Manifesto: Using Empirical Research in Journalism and Scholarship to Understand Big Tech - Lawfare
Crossing a Cyber Rubicon? Overreactions to the IDF’s Strike on the Hamas Cyber Facility - Lawfare
Digital Will, Part I: Requirements | Linux Journal
What’s the Point of Charging Foreign State-Linked Hackers? - Lawfare
OpenProject - online project management software - free and open source
5 Tips for Prioritizing Vulnerabilities Based on Risk - Blog | Tenable®
Why Global Collaboration Is Key to Effective Cyber Defense - Blog | Tenable®
Cybersecurity Pros Face Significant Challenges with OT Security: Ponemon Report - Blog | Tenable®
VMware Releases Security Updates for Tools and Workstation | US-CERT
cyber.dhs.gov - Binding Operational Directive 19-02
Stop the Presses: Media Coverage as a Prioritization Metric for Vulnerability Management - Blog | Tenable®
Oracle WebLogic Affected by Unauthenticated Remote Code Execution Vulnerability (CVE-2019-2725) - Blog | Tenable®
Oracle Critical Patch Update For April Contains 297 Fixes - Blog | Tenable®
IT/OT Cybersecurity Convergence: Start Strong with These Six Controls - Blog | Tenable®
Nessus Essentials | Tenable®
PcapXray v2.5 - A Network Forensics Tool To Visualize A Packet Capture Offline As A Network Diagram
Vthunting - A Tiny Script Used To Generate Report About VirusTotal Hunting And Send It By Email, Slack Or Telegram
Recipes and Meals | Quality Products Low Prices | Lidl US
Why Your Business Continuity Plan Must Cover Cyber Incident Response | Pivot Point Security
Shared Assessments - They’re Not Just Vendor Risk Management
Open Source Software Legal Issues | FOSS Risks | Pivot Point Security
Avoid These Easily Guessable Passwords | Pivot Point Security
Password Strength Explained | Password Length vs. Complexity | Pivot Point Security
Password Tips 6-8: Reuse, Emails, and Default Passwords | Pivot Point Security
Password Tips #5-3: Secure Resets, 2FA, and Password Storage | Pivot Point Security
Password Sharing Security Tips | Pivot Point Security
Why Ignoring CCPA is Bad Business (As Opposed to ignoring GDPR) | Pivot Point Security
Don’t Pay the Price for an Unsecured Managed Services Vendor | Pivot Point Security
5 Success Factors: Law Firm Data Security & Privacy Initiatives (Part 3) | Pivot Point Security
5 Success Factors: Information Security for Law Firms (Part 2) | Pivot Point Security
5 Critical Success Factors: Cyber Security for Law Firms | Pivot Point Security
OBGYN Information Security | How InfoSec Has Changed My Annual OB/GYN Visit | Pivot Point Security
CREST vs. SANS | Pivot Point Security
5 Top Information Security Accreditations for SaaS Providers | Pivot Point Security
Address CCPA before September 2019... or Pay the Price | Pivot Point Security
Infosecurity.US - Web Log - GPS, The Rollover
Infosecurity.US - Web Log - President Theodore Roosevelt's 'Citizenship in a Republic' Oratorical Masterpiece, The 109th Anniversary
Oracle Downloads Page
Infosecurity.US - Web Log - Google Utilizing Consumer Gmail Accounts to Track Purchases, Financial Transactions
Key takeaways from the 2019 Verizon Data Breach Investigations Report - IT Governance Blog
Medical data is 18 times more likely to be compromised when an internal actor is involved, and the most likely threat actor is a medical professional such as a doctor or nurse.
What is an ISMS and 9 reasons why you should implement one - IT Governance Blog
1. A centrally managed framework for keeping an organisation’s information safe. 2. A set of policies, procedures, technical and physical controls to protect the confidentiality, availability and integrity of information. 3. Either applied to the entire organisation or only a specific area where the information it seeks to protect is segmented (the scope). 4. Includes not only technical controls but also controls to treat additional, more common risks related to people, resources, assets and processes. 5. Based on a risk assessment across the organisation that considers internal and external risks. This means all risks are assessed, analysed and evaluated against a set of predetermined criteria before risk treatments (controls) are applied. Controls are applied based on the likelihood and potential impact of the risks. 6. A framework that helps you make appropriate decisions about the risks that are specific to your business environment. 7. Dependent on support and involvement from the entire business – not just the IT department – from the cleaner right up to the CEO. 8. Not an IT function but a business management process. 9. An ISMS can be certified to the international best-practice information security standard ISO 27001. Achieving accredited certification to the Standard demonstrates to your clients, customers, regulators and stakeholders that your organisation is following information security best practice and your data is sufficiently protected.
Organisations struggling to meet GDPR requirements, with poor planning and lack of awareness to blame - IT Governance Blog
79% of organisations are failing to meet the GDPR’s requirements; 25% don’t consider themselves knowledgeable about the Regulation; Half of organisations have been subject to enforcement action related to data protection violations; and 70% are less open when engaging with customers about data privacy.
What is information classification and how is it relevant to ISO 27001? - IT Governance Blog
List of data breaches and cyber attacks in February 2019 - 692,853,046 records leaked - IT Governance Blog
A guide to the PCI DSS’s vulnerability scanning and penetration testing requirements - IT Governance Blog
Average cost of cyber crime is now $13 million - IT Governance Blog
2.3 billion data breaches, compared to 826 million in 2017 average cost of cyber crime grew by more than $1 million in 2018 to $13 million (about £9.9 million) per organisation. 85% of organisations experienced phishing and social engineering attacks and 76% suffered web-based attacks.$2.6 million (about £1.9 million) and $2.3 million (about £1.75 million) respectively
Requirements for achieving ISO 27001 certification - IT Governance Blog
ISO 27001: The 14 control sets of Annex A explained - IT Governance Blog
DPIAs for retail and hospitality  - IT Governance Blog
List of data breaches and cyber attack in March 2019 – 2.1 billion records leaked - IT Governance Blog
The 8 CISSP domains explained - IT Governance Blog
Law firms report increase in staff-related security incidents - IT Governance Blog
Do your employees care about cyber security? - IT Governance Blog
just 26% have introduced cyber security training for their employees. 15% stated that they “haven’t got around to it yet” while 5% think additional training should be offered but confessed that “they didn’t know where to start”. 17% of small UK businesses have suffered at least one cyber attack in the past year. 19% have been targeted between 6 and 10 times in the past year. 51% of organisations with 50–99 employees suspect that a breach has been kept a secret from them. 53% agreed that it seemed logical for cyber security awareness training to be near the top of the business agenda.
“An act of war”: Zurich American refuses to pay out on cyber insurance policy following NotPetya attack - IT Governance Blog
Toyota suffers second data breach in five weeks - IT Governance Blog
The ultimate guide to ITIL incident management - IT Governance Blog
List of data breaches and cyber attacks in April 2019 – 1.34 billion records leaked - IT Governance Blog
UK businesses are reporting fewer data breaches, but is this as positive as it sounds? - IT Governance Blog
This is a marked improvement on the previous two years, in which 43% (2018) and 46% (2017) of businesses were breached, but it doesn’t tell the full story of the UK’s threat landscape. Although the number of organisations being targeted seems to be decreasing, those that are vulnerable to attacks are experiencing them more often, with two in five organisations saying that they come under threat at least once a month. More businesses (57% vs 51% in 2018) and charities (43% vs 27%) update senior management on their cyber security actions at least once a quarter; Cyber security policies are becoming more common in businesses (33% vs 27%) and charities (36% vs 21%); Businesses (56% vs 51%) and charities (41% vs 29%) are more likely to have implemented controls in all five technical areas of the government’s Cyber Essentials scheme; Staff awareness training is becoming more common in businesses (27% vs 20%) and charities (29% vs 15%); Charities are getting better (60% vs 46%) at implementing measures such as health checks, audits and risk assessments; and More medium-sized (31% vs 19%) and large businesses (35% vs 24%) have invested in cyber insurance.
Different types of cyber attacks - IT Governance Blog
Recsech - Tool For Doing Footprinting And Reconnaissance On The Target Web
Recsech
Cyber News Rundown: Medical Testing Service Data Breach | Webroot
The State of VPN Security Today - Security Art Work
The Pains Of Vulnerability Coordination – And What To Learn From It
LabCorp: 7.7 Million Consumers Hit in Collections Firm Breach — Krebs on Security
On the Horizon: Parasitic Malware Will Feast on Critical Infrastructure
Oracle Database 19c (19.3.0) for Windows and zLinux is available
Baltimore Ransomware Attack Costing City $18 Million
City Finance Director Henry Raymond estimates, Baltimore has spent about $10 million in recovery and forensic expenses, and the city is expected to lose about $8 million in revenue.
Maine governor signs bill banning internet providers from selling consumer data without consent | TheHill
Hospital to Pay $250,000 After Alleged False HITECH Claims
Vendor Security Risk Management: A Growing Concern
Healthcare Exchange Standards: IHE Audit Log Specifications
Survey Says: Cost and Security are Top Hybrid Cloud Concerns | CIO
BrandPost: HPE Greenlake Improves Control Over Compliance, Security - Jellyfish Security
Automating SOX Controls Testing | Onapsis
Tap Into Your Valuable DNS Data - Black Hills Information Security
Check-LocalAdminHash & Exfiltrating All PowerShell History - Black Hills Information Security
Check-LocalAdminHash
Data protection authority reports itself to itself after data breach
Data protection authority reports itself to itself after data breach
Life on Contract: Product Development Lessons Big and Small | Hackaday
[New Research] 2019 Cloud Security Report Reveals Top Challenges
The top cloud security concern of cyber security professionals is data loss and leakage (64 percent). Unauthorized access through misuse of employee credentials and improper access controls (42 percent) takes the number one spot in this year’s survey as the single biggest perceived vulnerability to cloud security, tied with insecure interfaces and APIs (42 percent). This is followed by cloud misconfigurations (40 percent). Most respondents (54 percent) say cloud environments are at higher risk of security breaches than traditional on-premises environments – a 5 percent increase from last year.
Lessons from the Baltimore Cyber Attack—Are You Doing Enough to Protect Your Business? - Delta Risk
Philips and HPE: Healthcare Innovation From the Edge to the Cloud | CSO Online
The Intellectual Dark Web (IDW) and Dark Forest Theory | Daniel Miessler
The Holy Trinity of Air Travel Convenience | Daniel Miessler
The ABCs of Microsoft Office 365's Data Loss Prevention (DLP)
Baltimore ransomware attack will cost the city over $18 million
vSphere ESX: Replace / Update the VMware Tools ISO | PeteNetLive
Are Bluekeep patches causing BSODs with Server 2008 SP2 and Vista? @ AskWoody
Why ODA reimaging doesn't work on the first try? - Blog dbi services
Home on the Palo Alto Networks Cyber Range | The Networking Nerd
Java mon amour: SSL renegotiation and resumption
Under The Stairs: First Steps with With PowerShell 7
Establishing an Internet Performance Benchmark | APMdigest - Application Performance Management
Official Warren Buffett / Berkshire Hathaway Book Reading List 2019 — My Money Blog
Find why an account is getting locked out and where | Mohammed Wasay
Common Data Model | James Serra's Blog
Metasploit for Windows BlueKeep vulnerability | Born's Tech and Windows World
My session slides from DNUG46 | eknori.de
New VMware Security Advisory VMSA-2019-0009 - VMware Security & Compliance Blog - VMware Blogs
What kind of server channel are your running on: SAC or LTS? | >_
Cyber Command’s Strategy Risks Friction With Allies - Lawfare
UEFI 2.8 Specification Released With REST & Memory Cryptography - Phoronix
Defense Department General Counsel Remarks at IDF Conference - Lawfare
10 Most Secure Linux Distros For Advanced Privacy & Security
The GCHQ’s Vulnerabilities Equities Process - Lawfare
The dangerous folly of “Software as a Service” | Armed and Dangerous
Control, Freedom and Harm – Purism
Ubuntu 19.10's ZFS TODO List Goes Public - A Lot To Of Work Left - Phoronix
Azure Architect Study Guide – Service Endpoints
Learn about AWS Services & Solutions – June AWS Online Tech Talks | AWS News Blog
So long … | Oracle Scratchpad
Examples of Machine Learning with Facial Recognition « Oralytics
Homemade Turkish Salad Recipe -- Frugal, Paleo, Vegan, and Delicious | Penniless Parenting
The seven deadly sins of personal finance
DeployHappiness | PencilTramp – The Adventures of Passphrase Generation
Continuous integration of machine learning models with ease.ml/ci – the morning paper
Azure NetApp Files goes GA | Architecting IT
Power over Ethernet: Things You Should Know About it
Saving, Updating Text Files with PowerShell | KC's Blog
Oracle Critical Patch Update - April 2019
Deploy Sonarqube to Azure App Service Linux Containers using an Azure DevOps Pipeline – PowerShell, Programming and DevOps
Video : Multitenant : Proxy PDB in Oracle Database 12.2 Onward | The ORACLE-BASE Blog
Exposed database revealed security details for large hotel chains
Wazuh
Top 550+ Funny Passwords Ever Encountered
Ransomware Attack on Vendor Affects 600,000 - HealthcareInfoSecurity
Groups Ask FDA to Rethink Some Medical Device Cyber Proposals
An Inside Look at a Level 4 Threat Hunting Program
Georgia County Pays $400,000 to Ransomware Attackers
EU Seeks Better Coordination to Battle Next Big Cyberattack
The Future of Cybersecurity Education - Part 2
The Future of Cybersecurity Education - Part 1
Oregon Agency Reports Phishing Attack Affecting 350,000
The Dark Side of Cybersecurity: Burnout - HealthcareInfoSecurity
The Dangers of Unsecured Medical Devices - HealthcareInfoSecurity
Analyzing the $7.5 Million UCLA Health Data Breach Settlement
A proposed $7.5 million settlement of a class action lawsuit filed against ULCA Health in the wake of a 2015 cyberattack that affected 4.5 million individuals stands apart from most other breach-related settlements because it requires the organization to spend a substantial sum on improving its security, Under terms of the settlement, UCLA Health has agreed to spend at least $5.5 million beyond its current budget to expedite and implement cybersecurity enhancements to its computer network.
Data Breaches in Healthcare Affect More Than Patient Data
Meanwhile, Columbia, S.C.-based integrated healthcare delivery system Palmetto Health says it believes a recent phishing attack was aimed at trying to gain access to employee payroll information. Palmetto is undergoing a name change to Prisma Health as it completes a merger this year with Greenville Health System.
Ransomware Attack Costs Norsk Hydro $40 Million - So Far
What Led to a $4.7 Million Breach Lawsuit Settlement?
$4.7 million to settle a lawsuit stemming from the theft of a portable hard disk drive from a self-storage unit. The drive contained information on about 1.2 million individuals - much of it unencrypted - that was gathered for an education research project
Alerts: Vulnerability in Philips Records System
Audit: HHS Info Security Program ‘Not Effective’
The OIG report notes that auditors found weaknesses in five key cybersecurity framework areas, including: Risk management; Configuration management; identity and access management; data protection and privacy; and security training; Information security continuous monitoring; Incident response; Contigency planning.
DHS: Federal Agencies Need to Patch Vulnerabilities Faster
Directive: 'Critical' Vulnerabilities Must Be Patched Within 15 DaysBinding Operational Directive (BOD) 19-02,critical vulnerabilities needed remediation within 30 days
Health Data Breach Tally Update: What’s Been Added?
$3 Million HIPAA Settlement in Delayed Breach Response Case
$3 million HIPAA settlement in a case alleging that a medical imaging services provider delayed investigating and mitigating a breach involving patient information leaking onto the internet via a web server - and delayed notification of victims as well.
Ransomware Increasingly Hits State and Local Governments
Equifax's Data Breach Costs Hit $1.4 Billion - HealthcareInfoSecurity
Costs Hit $1.4 Billion
Executive Roundtable Recap: "Confessions of a Healthcare CISO"
Top 5 Legal Tips for Tornado Damage and Insurance - FindLaw
Auto-reload Celery on code changes | Celery how-tos and tutorials
The mysterious history of the MIT License | Opensource.com
Top 20 Best Linux VoIP and Video Chat Software in 2019
The difference between resilient and reactive organizations | Opensource.com
27 Excellent Free Books to Learn all about R - LinuxLinks
Under The Stairs: PowerShell 7 Is Here - Getting Started
Texas Linux Fest 2019 Recap · major.io
Red Hat Breathes New Life Into Java | Enterprise | LinuxInsider
The SmarchWatch: An open-source smartwatch that you can build yourself - NotebookCheck.net News
Towards an Information Operations Kill Chain - Schneier on Security
SSH Honey Keys
DevSecOps: 7 ways to address cultural challenges | The Enterprisers Project
Introduction to Reinforcement Learning with Python
Top 20 Best ML Algorithms For Both Newbies and Professionals
DOD looks to publish software blacklist -- FCW
A Better Route Planner & Other Open Source Projects Need Our Help | CleanTechnica
6 Open-Source Alternatives to Proprietary Software: Self-Hosted Applications | 256 Kilobytes
Adobe Warns Users Someone Else Might Sue Them For Using Old Versions Of Photoshop | Techdirt
davy wybiral: Always Secure Your localhost Servers
Portainer: Web-Based Docker GUI For Remote Or Local Use - Linux Uprising Blog
Kubernetes security: 5 mistakes to avoid | The Enterprisers Project
TLS 1.0 and 1.1 Removal Update - Mozilla Hacks - the Web developer blog
Safari, Firefox, Edge and Chrome are removing support for TLS 1.0 and 1.1 in March of 2020.
Cthulhu: New open source chaos engineering tool for Java - JAXenter
Cthulhu
U.S. Businesses Pay, Remit 93 Percent of All Taxes Collected in America
9 List of Best Free Penetration Testing tools | H2S Media
Easy and Delicious Chewy Gluten Free Vegan Chocolate Chip Cookies Recipe | Penniless Parenting
Juli's Gluten Free Pasta Salad | Penniless Parenting
How to write a business continuity plan: the easy way - IT Governance Blog
Is your organisation equipped for long-term GDPR compliance? - IT Governance Blog
Emotet: How to stop ‘the most destructive malware’ in existence - IT Governance Blog
A Ransomware Victim Shares His Story - HealthcareInfoSecurity
Tips on Tackling Medical Device Cybersecurity Challenges
Minimizing Cloud Security Risks - HealthcareInfoSecurity
Is Healthcare Sector Better Prepared for Ransomware Attacks?
Misconfigured IT (Again) Leads to Big Health Data Breach
Cloud-Based EHR Vendor Slapped With HIPAA Fine
Under GDPR, UK Data Breach Reports Quadruple - HealthcareInfoSecurity
Audit Identifies Australian Health Sector Security Weaknesses
What CCPA Means to Security Leaders - HealthcareInfoSecurity
Windows Notepad hack allows shell access | Born's Tech and Windows World
Covert Channel: The Hidden Network
Beginner’s Guide to Nessus
CCIE Renewed Once More - Exam 400-101 v5.1 · Lindsay Hill
PowerCat -A PowerShell Netcat
Google Stored Business Customers’ Passwords in Plaintext on Its Servers… For 14 Years
Exploring different Linux RAID-10 layouts with unbalanced devices – The ongoing struggle
AI Universal Guidelines – thepublicvoice.org
OECD Legal Instruments
The Evolution of Cybercrime
A Cybersecurity Checklist for Modern SMBs | Webroot
The Ransomware Threat isn’t Over. It’s Evolving.| Webroot
Cyber News Rundown: Massive Data Breach at Georgia Tech | Webroot
Moody's Outlook Downgrade of Equifax: A Wake-up ...
Former Student Admits to USB Killer Attack
55% of SMBs Would Pay Up Post-Ransomware Attack
A Cybersecurity Guide for Digital Nomads | Webroot
7 Types of Experiences Every Security Pro Should Have
8 Personality Traits for Cybersecurity
The eight traits the company said are indicative of a successful career in cybersecurity are modesty, altruism, composure, scientific, inquisitive, skeptical, responsive, and diligent.
New Exploits For Old Configuration Issues Heighten ...
WannaCry Lives On in 145K Infected Devices
The Ransomware Dilemma: What if Your Local ...
Open Security Tests Gain Momentum With More Lab ...
GDPR's First-Year Impact By the Numbers
My Ansible Roles | Calvin Bui
RIP BBM: BlackBerry Messenger Shuts Down
Running Systems » Blog Archive » SecureBoot and VirtualBox kernel modules
WebLogic - JAVA_HOME in WebLogic, a nightmare? - Blog dbi services
WebLogic - Upgrade of Java - Blog dbi services
Chris's Wiki :: blog/solaris/ZFSDnodeIdsAllocation
Why Linux RAID-10 sometimes performs worse than RAID-1 – The ongoing struggle
Charlie Munger 2019 Wall Street Journal Interview Transcript — My Money Blog
The Best Time To Plant A Tree Is Now — My Money Blog
Charlie Munger: Financially Independent at Age 38 in 1962 — My Money Blog
Munger’s example reaffirms that if you have a relatively high income, save a high percentage of that income, AND invest that money into productive assets, your net worth will grow quite quickly.
Callan Periodic Table of Investment Returns 2019 — My Money Blog
zerosum0x0: Avoiding the DoS: How BlueKeep Scanners Work
Using osquery for remote forensics | Trail of Bits Blog
Book Review – The Hacker Playbook 3: Practical Guide To Penetration Testing (Red Team Edition) – The Personal Blog of Sean Goodwin
Interacting with FTP/SFTP using Powershell - Syspanda
Benefits of Threat Modeling
List of data breaches and cyber attacks in May 2019 – 1.39 billion records leaked - IT Governance Blog
Equifax Expects U.S., Canada Watchdogs to Press Cases Over 2017 Breach - WSJ
Healthcare reports highest number of data breaches: Study
ONC Information Blocking Rule Raises Privacy and Security Concerns
IT Security Vulnerability Roundup – May 2019
Using Secure Configurations | Standardize Your Security - Linux Academy Blog
As ONC Considers Info Blocking, IoT, Medical Device Guidance Needed
States Imposing New Cybersecurity Requirements on Insurers
cipl_principles_for_a_revised_us_privacy_framework__21_march_2019_.pdf
privacy-framework-workshop-1-pre-read.pdf
Proposed Overhaul of North Carolina Security Breach Notification Law Would Make It One of the Toughest in the Nation - Wyrick Robbins
Global Privacy Push Drives Need for Security, Privacy Alignment
Opinion | Why You Can No Longer Get Lost in the Crowd - The New York Times
HHS Lowers Some HIPAA Fines - GovInfoSecurity
The revised maximum annual penalties violations of HIPAA provisions are: No knowledge - i.e. an entity did not know it was violating a provision - $25,000; Reasonable cause, and not willful neglect - $100,000; Willful neglect, but with timely correction (within 30 days) - $250,000; Willful neglect that is not timely corrected - maximum annual penalty remains at $1.5 million.
Belgian Data Protection Authority Releases 2018 Annual Activity Report | Privacy & Information Security Law Blog
NIST launches development of a privacy framework
New Jersey Amends Data Breach Law to Include Online Account Information | Privacy & Information Security Law Blog
My Takeaways from the 2019 DBIR Report | Daniel Miessler
How to use dnsenum for dns enumeration - Kali Linux
Direct Liability of Business Associates | HHS.gov
Useful links on various AWS topics | Techbrainblog
Pi-Hole problem with dnsmasqd, LXD | Nelson's log
BlueKeep vulnerability: Microsoft warns about a wormable malware epedemia | Born's Tech and Windows World
The Fascinating World Of Solder Alloys And Metallurgy | Hackaday
Staff break IT rules in order to do their jobs with management the worst offenders
Pain Points in Mortgage Lending | Tallan Blog
Home lab setup, part 1 -
China Prepares To Drop Microsoft Windows -- Blames U.S. Hacking Threat | Tux Machines
What I Learned Trying To Secure Congressional Campaigns (Idle Words)
The Coming Cyber War
AND…now comes digital transformation…
NVMe on Linux | Network World
What's new with Red Hat Enterprise Linux 8 and Red Hat Virtualization | Tux Machines
Gigabyte's next-gen SSD shows the incredible potential of PCIe 4.0
Files Exposed Online Hit 2.3 Billion - Server Message Block Worst Culprit
6 Ways to Check Which Versions of .NET Framework Are Installed
How to Debug a Bash Script like a Boss – Linux Hint
Kubernetes Storage on vSphere 101 - The basics: PV, PVC, POD - CormacHogan.com
Our thoughts on the new Java release system
24 Google Docs Templates That Will Make Your Life Easier
Power Outage Corrupted XFS Filesystem | How I Fixed It – CubicleNate's Techpad
Global Privacy Concerns: The Top 5 Cities Using Invasive Tech | Webroot
The 5 keys of an Operator’s Security Plan for a health service - Security Art Work
Zero Day Initiative — The May 2019 Security Update Review
Civil Engineering Explained | Diary of a Network Geek
Errata Security: A lesson in journalism vs. cybersecurity
Errata Security: Your threat model is wrong
Managing Your Security Logs: More than Just Set and Forget - Delta Risk
Zero Day Initiative — CVE-2019-0708: A Comprehensive Analysis of a Remote Desktop Services Vulnerability
Configure Azure Service Endpoints for Web Applications #Azure #ASE #Endpoints #AzureServiceEndpoints #webapp #AzureDevOps | Robert Smit MVP Blog
Go Memory Management - Povilas Versockas
Go Memory Management Part 2 - Povilas Versockas
Go Memory Management Part 3 - Povilas Versockas
List all SPNs in Active Directory | Mohammed Wasay
Linux RAID-10 may not always be the best performer, but I don’t know why – The ongoing struggle
How to Install AzCopy for Azure Storage - Thomas Maurer
Information Security Mental Models – Chris Sanders
Nearly 1 million Windows machines with BlueKeep vulnerability | Born's Tech and Windows World
Update: The “wormable” Win XP/Win7 RDP security hole, BlueKeep, still hasn’t been cracked @ AskWoody
How to control what employees can view and edit in Delve User Profiles - SharePoint Maven
Cloud : Who are the gatekeepers now? | The ORACLE-BASE Blog
The IT world has changed. The traditional power bases are eroding, and you’ve got to adapt to survive. Every time you say “No”, without offering an alternative solution, you’re helping to make yourself redundant. Every time you say, “We will need to investigate it”, as a delaying tactic, you’re helping to make yourself redundant. Every time you ignore new development and delivery pipelines and platforms, you are sending yourself to an early retirement. I’m not saying jump on every bandwagon, but you need to be aware of them, and why they may or may not be useful to you and your company.
IPv6 Support in Microsoft Azure « ipSpace.net blog
Your Guide To A Successful Presentation -
How to deal with a jet lag, a few tips from a frequent traveller. - robbeekmans.net
Rules of a thumb Flying to the US – long day ahead, keep busy until 9-10pm Adjust your sleeping rhythm in the US to as close as possible to your home rhythm Careful with the booze Careful with the calories Sleep when flying home, you have a long day ahead Get up on time, no sleep over the first week Keep busy the first few days, tire your body.. clean the house (help your partner for once ;). ) No coffee after 3pm (before; loads) I noticed by following these rules I still feel the jet lag but sleep soon after going to bed (might take half an hour where otherwise I would sleep seeing the bed).
Jaffar's (Mr RAC) Oracle blog: Network design for Oracle Cloud Infrastructure
Linux Scripting, Part III – DBAKevlar
Failure is Not an Option — It’s a Requirement! | The SSD Guy
Stage 0: “If it ain’t broke, don’t fix it.” This is a reactive solution to issues as they arise, that combines a lack of understanding of the workload with a penchant to purchasing to higher specifications than actually required leading to high costs. Stage 1: “Test in production… and pray!” In this scenario equipment is slowly ramped into production with expansion plans based on vendor specifications. In some cases this results in unexpected failures some months after deployment, with highly-visible disruptions. Stage 2: “Validation with freeware tools.” More sophisticated than the preceding scenarios, this one still has its problems. A mix of tools, including IOMeter, IOZone, Dbench, Fstress, and others, were designed for smaller workloads than GoDaddy’s massive systems. Not only do they fail to resemble the actual load, but they prove cumbersome to use in this magnitude of a system. Stage 3: “Validation with custom tests.” GoDaddy developed a test the company calls “SwiftTest” that has been specially designed for the correct type of validation. The tool validates against full scale operation loads on a realistic emulation of the company’s production workloads. Most importantly, though, is that SwiftTest is ramped up over the course of a few days to find where a new component will predictably fail. By doing causing these failures the storage team at GoDaddy can accurately predict the conditions under which new resources will be required, without guesswork. They don’t over-buy, and they reduce storage system failures. But the key point is that they hammer on a piece of equipment until it breaks, and use that knowledge to plan their resources. The system’s failure is key to this understanding. Failure is a requirement!
Understanding disaster recovery options for SQL Server
Why is HPE 3PAR not moving to NVMe SSDs (yet)? | Architecting IT
Why local governments are a hot target for cyberattacks | CSO Online
ESP8266 Upgrade Gives IKEA LEDs UDP Superpowers | Hackaday
Auction for a laptop full of malware closes at $1.2 million
A threat actor scans Windows systems for BlueKeep vulnerability | Born's Tech and Windows World
SignalsEverywhere: ADS-B Aircraft Tracking with RTL-SDR, dump1090 and Virtual Radar Server
Short Article Explaining DSP Basics Without Math
Assessing your disk performance and your needs: Choosing your Azure storage disks (Part 3) – Dynamics AX in the Field
Walmart's New Way To Cut Health Costs: Better Medical Imaging For Workers : Shots - Health News : NPR
Accountability vs. responsibility | Seth's Blog
PerfView Hard Core CPU Investigations (Using CPU Counters) on Windows 10 – Vance Morrison's Weblog
Office 2016 vs. Office 365: Differences and Licensing | Windows OS Hub
Pragmatic Debian packaging (2019) | Vincent Bernat
Microsoft 365 Licensing Diagrams | Alexander's Blog
Intel Loses 5X More Average Performance Than AMD From Mitigations: Report
UPenn Medicine's AI tool for data analytics is open-source, free to the public
OpenJDK 8 and 11: Still in safe hands - Red Hat Developer Blog
Health Port: Creates Solution for Open Source Electronic Health Records
Bluetooth's Complexity Has Become a Security Risk | WIRED
WannaCry? Hundreds of US schools still haven’t patched servers [Updated] | Ars Technica
How To Enable Or Disable SSH Access For A Particular User Or Group In Linux? | 2daygeek.com
Moody's downgrades Equifax outlook to negative, cites cybersecurity
Lack of Secure Coding Called a National Security Threat
After 2 Years, WannaCry Remains a Threat - BankInfoSecurity
Here's all the important stuff Google announced at I/O 2019
MIT AI model is 'significantly' better at predicting breast cancer
Super Micro will move chip production out of China to avoid spying claims
A ransomware attack is holding Baltimore's networks hostage
A parent's guide to raising a good digital citizen
Hacker Summer Camp 2019 Preview · System Overlord
Windows Incident Response: Lessons From Time In The Industry
Geometry in Image Forensics – We are OSINTCurio.us
Basics of Breach Data – We are OSINTCurio.us
Security of Connected Vehicles - Part IRafeeq Rehman – Personal Blog
Mod Security Web Application Firewall
Scottish Government Security Basics
Cyber Essentials
Continuous Integration. Continuous Delivery. Continuous Security? - via @codeship | via @codeship
Ubiquiti Networks - Training Courses
Healthcare Exchange Standards: FHIR Security & Privacy activities
Singapore eHealth - Innovative Technologies and Security ~ Cyber Thoughts
Introduction to analysing full disk encryption solutions | DiabloHorn
Sunlight for the Ransomware Data Recovery Industry
Sodinokibi Ransomware Poised to Impact Larger Enterprises
DHS-CERT Alert 10KBLAZE | Onapsis
Beyond wealth: What happens AFTER you reach financial independence?
An introduction to square-foot gardening
Episode 19: Democratizing Cybersecurity | Linux Journal
Blindered by the GDPR | Linux Journal
All About ITIL Levels and Their Badges – Running Your Business
Kubernetes security: 4 strategic tips | The Enterprisers Project
WebAuthn Web Authentication with YubiKey 5 | Linux Journal
Java mon amour: good old friend JMeter
Vulnerability Management vendors and Vulnerability Remediation problems | Alexander V. Leonov
Code IB 2019: Vulnerability Management Masterclass | Alexander V. Leonov
First American security flaw leaked 885 million real estate documents
Ransomware attacks in US cities are using a stolen NSA tool
What Is UFS 3.0? — The Powerful Successor To microSD Memory Card
Here Are The Companies Who Have Banned Huawei
Huawei Cannot Use microSD Cards In Its Future Devices
How to Weaponize the Yubikey - Black Hills Information Security
Portable Retro Game Console with 7.9-inch display | Hackaday.io
Sound Card ADCs For Electrocardiograms | Hackaday
A Farmer’s Guide to Technology | Hackaday
Faxsploit – Exploiting A Fax With A Picture | Hackaday
What Happened With Supermicro? | Hackaday
Picking the Right Sensors for Home Automation | Hackaday
Making a Dash Button Update Your To-do List | Hackaday
Forget Artificial Intelligence; Think Artificial Life | Hackaday
Shadowhammer, WPA3, and Alexa is Listening: This Week in Computer Security | Hackaday
Windows Utility Helps ID Serial Ports | Hackaday
Building A Windows 10 1903 (May 2019 Update) Reference Image with MDT – Stick To The Script
Deploying A Windows 10 1903 (May 2019 Update) Reference Image with MDT – Stick To The Script
Configuring Oracle DB data source in JBoss EAP 7.1 - Blog dbi services
Documentum - Delete Remote Docbase - Strange behavior - Blog dbi services
The Smart Conference Badge We Almost Failed Shipping
Everything We Know About SpaceX’s Starlink Network | Hackaday
By The Numbers: Which Rapper’s Rhymes Are The Freshest? | Hackaday
Protecting Information Assets and IT Infrastructure in the Cloud | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
US companies waste over two months a year resetting passwords
.NET Framework is dead -- long live .NET 5
Lack of security and operations basics leave businesses unprepared for breaches
Three options companies should consider for backup & storage in 2019
Reported data breaches up more than 56 percent
Americans are overconfident about cybersecurity
New privacy regulations mean your company needs better data management now
46 percent of organizations consider taking personal data out of the cloud
New tool helps protect sensitive data on Oracle databases
Half of companies missed GDPR compliance deadline
Media server Serviio 2.0 adds multi-user streaming
The changing landscape of cybersecurity
Should I build a new media PC?
Windows 10 V1903: Security Baseline final released | Born's Tech and Windows World
David A. Wheeler's Blog
GDPR one year on -- what have we learned and what happens next?
72 percent of cyber security professionals have considered quitting over lack of resources
Cable Management Tips for Building Your New PC Like a Pro
The 12 Best Search Engines to Explore the Invisible Web
How to Install Windows 10 From a Bootable USB Drive
Providing Healthcare Information Services in Small and Rural Libraries » Public Libraries Online
The Illusion of "Doing Many Things" - briancasel.com
If You Worry About 768K Day, You’re Probably Doing Something Wrong « ipSpace.net blog
Ubiquitous VMware | Architecting IT
Quick post: DISM and Features on Demand (FOD) | >_
Talking to college students about information security · major.io
Video: Finding Performance Bottlenecks of Windows Based Systems with PowerShell – Mike F Robbins
Newbie Guide to Systems Engineering — ThinkCharles.net
New – Opt-in to Default Encryption for New EBS Volumes | AWS News Blog
Master VMware logging with these tools and strategies
The problem with Googling for solutions | The ORACLE-BASE Blog
Dissecting 190416 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
Re-partitioning | Oracle Scratchpad
Storage Executive Software
Some Thoughts on Program-Level College Scorecard Data – Robert Kelchen
Digital Forensics vs. Computer Forensics - Data Narro, LLC
SQL Injection Protection - Data Security and Privacy - Thomas LaRock
Examples of using Machine Learning on Video and Photo in Public « Oralytics
Oracle ACE Program : How you "align" matters! | The ORACLE-BASE Blog
The Hidden Gem that is StorPool | Architecting IT
Some Btrfs vs Ext4 random-read/write performance observations | Ctrl blog
BlueKeep: Windows Remote Desktop Services vulnerability exploits status | Born's Tech and Windows World
Microsoft Azure Networking Slide Deck Is Ready « ipSpace.net blog
Measuring Linux IO read/write mix and size – The ongoing struggle
Connecting Go Lang to Oracle Database « Oralytics
Which JDK should I use now?
Java 8 vs Java 11 - What are the Key Changes?
5 of the Best LaTex Editors for Linux - Make Tech Easier
DevOps salaries: 10 statistics to see | The Enterprisers Project
Open source thermostat runs openHAB on a Raspberry Pi Zero W
Good News! Indian State Saves $428 Million by Choosing Linux
CGroup Interactions | Linux Journal
GitHub - arendst/Sonoff-Tasmota: Provide ESP8266 based itead Sonoff with Web, MQTT and OTA firmware using Arduino IDE or PlatformIO
Red Hat enables Lockheed Martin to deliver F-22 Raptor upgrades - Help Net Security
5 Open Source Wi-Fi Hotspot Solutions - DD-WRT, CoovaAP - Reports - LinuxPlanet - Linux Today Blog
PiShrink - Make Raspberry Pi Images Smaller - OSTechNix
How to Encrypt Linux Partitions with VeraCrypt on Ubuntu
Data in a Flash, Part II: Using NVMe Drives and Creating an NVMe over Fabrics Network | Linux Journal
DLNA server with MiniDLNA under Linux / Raspberry Pi – Unixblogger
Kubernetes - Role Based Access - The IT Hollow
88 Important Truths I’ve Learned About Life
How to Get Longer Life Out of Your Dell Laptop Battery | b3n.org
Activist hacking declined 95 percent since 2015
Activist hacking declined 95 percent since 2015
Career advice I wish I'd been given when I was young - 80,000 Hours
The State of IT Transformation: Legacy Infrastructure Jeopardizes Transformation Initiatives | APMdigest - Application Performance Management
Chris's Wiki :: blog/solaris/OmniOSNo10GCost
Chris's Wiki :: blog/sysadmin/InspectingTLSWithCertigo
Chris's Wiki :: blog/unix/XtermKeybinding
Blockchain for Impact: Blockchain Revolution Global Event Wrap-Up | Beth's Blog
Application-Focused Backups | Architecting IT
0day "In the Wild"
Oracle GoldenGate 19c is available for download for Linux
VDI 3D Graphics and Game Demo - Horizon, GRID, vGPU - The time I've wasted on technology...
Outsourcing my life: Why I pay others to do tasks I could do myself
‘Temporary Insanity’ Returns To Wall Street – The Felder Report
6 Tech Trends Dominating DevOps in 2019 – Running Your Business
4 Reasons Why Using Resumonk Can Help You Land the job You've Always Wanted – Business Ideas
5 Amazing Statistics About Remote Companies – Business Ideas
The Pink Tax: The Hidden Cost Of Being Female | Get Rich Slowly
Should You Care About an Inversion in the Yield Curve? – Business Ideas
Linux Scripting, Part II – DBAKevlar
You Don’t Want To Be A Rock Star | The Networking Nerd
Howto Reinstall WSUS from Scratch - The time I've wasted on technology...
Start with "Why?" | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Droplet Computing: The Drip, Drip Effect – Michelle Laverick…
Mentoring Someone with Imposter Syndrome
[Howto] ara – making Ansible runs easier to read and understand – /home/liquidat
How to configure Windows Sandbox - Thomas Maurer
Best Practices for Signing a Windows PowerShell Script
Benchmarking Competencies for Digital Performance - Part 1 | APMdigest - Application Performance Management
Setup SSH Keys on Ubuntu 18.04 - Low End Box Low End Box
The Mythical Eight Hour Workday – Ethan Banks
Get Shortcut contents in Powershell – Dimitri's Wanderings
Powershell criticism: Part 2 – Dimitri's Wanderings
Powershell criticism part 1 – Dimitri's Wanderings
Start Stop service rights to non administrators – Dimitri's Wanderings
Architecture for the cloud vs. on-premises – Dimitri's Wanderings
Free Disk space on Windows drive – Dimitri's Wanderings
Chris's Wiki :: blog/linux/AlpineOverNFSFix
Chris's Wiki :: blog/linux/Ubuntu1804OddKernelPanic
Data Breach revealed 1.5 Million Freedom Mobile Customers | Born's Tech and Windows World
BitLocker management in enterprise environments | Born's Tech and Windows World
Fifty Questions to Ask a Startup Founder During an Informational Interview — Stephanie Hurlburt
Oracle 18c and 19c on Oracle Linux 8 (beta) | The ORACLE-BASE Blog
Oracle Senior Architect: Web Logic Server 11g
Writing Linux Scripts- Part I – DBAKevlar
Top 10 Oracle E-Business Suite Security Risks | Integrigy
Ethics in the AI, Machine Learning, Data Science, etc Era « Oralytics
Python transforming Categorical to Numeric « Oralytics
Data Sets for Analytics « Oralytics
Guide to using and installing WSUS on Windows Server Core 2019 - The time I've wasted on technology...
Machine Learning Tools and Workbenches « Oralytics
APEX Connect 2019 - Day 3 - Blog dbi services
APEX Connect 2019 - Day 2 - Blog dbi services
APEX Connect 2019 - Day 1 - Blog dbi services
IT And The Exception Mentality | The Networking Nerd
VCP6.7-DCV Objective 7.15 - Utilize VMware vSphere Update Manager (VUM) | ESX Virtualization
Fxmsp Chat Logs Reveal the Hacked Antivirus Vendors, AVs Respond
Data Protection in a Multi-Cloud World | Architecting IT
Making the Case for SAN 2.0 | Architecting IT
QLC NAND - What can we expect from the technology? | Architecting IT
SQL Server 2017 RTM CU14 + GDR Released - Microsoft Tech Community - 566368
OS/2 Museum | OS/2, vintage PC computing, and random musings
VCDX181.com - SAP grants support for SAP HANA 2.0 on VMware...
Run WSUS cleanup and index script on Windows Server Core without SQL Management Studio - The time I've wasted on technology...
VCP6.7-DCV Objective 2.3 - Describe the options for securing a vSphere environment | ESX Virtualization
Apple Patches ZombieLoad Vulnerabilities - TidBITS
Best Creamy Lemon Parmesan Chicken Recipe - How to Make Creamy Lemon Parmesan Chicken
CLI Still Sucks for Automation · Lindsay Hill
Amazon S3 Path Deprecation Plan – The Rest of the Story | AWS News Blog
How to list the naa-numbers of LUNs and VMware VMFSs on a Dell EMC Unity system - 50mu - about storage
Tom's Top Ten Things Executives Should Know About Software - ACM Queue
SAP on AWS Update – Customer Case Studies, Scale-Up, Scale-Out, and More | AWS News Blog
A List Of What Makes WiFi 6 Technically Better ? - EtherealMind
CCNA Training » OSPF Neighbor Sim
Real-Life Data Center Meltdown « ipSpace.net blog
Webcast – Install & Configure SQL Server with PowerShell DSC | SQLvariations: SQL Server, a little PowerShell, maybe some Power BI
Chatterbox is a DIY Kids Smart Speaker that Features Open-Source and Private Voice Assistant, Mycroft - Voicebot
Top list of computer forensics software – Linux Hint
Chris's Wiki :: blog/tech/TLSCertificateIdentity
Turbonomic 2019 State of Multi-Cloud Report – vcdx133.com
Japan Is Developing First Computer Virus To Prevent Cyber Crimes
Adding USB 3.0 Drivers to Windows 7 Install Media | Windows OS Hub
Improving Application Performance with NVMe Storage - Part 1 | APMdigest - Application Performance Management
New Security Baseline for both Windows 10 and Windows Server | KC's Blog
Powershell Backup Script-Sharing Knowledge | Erwin Bierens Blog
CentOS 7 – Windows Active Directory Integration using SSSD | geekdudes
The Idiot made a Smart Mirror – Jon Spraggins
Powershell Enable / Disable / Set / Show Windows Web Proxy-Sharing Knowledge | Erwin Bierens Blog
How to import your existing SSH keys into your GPG key ! even the horse knew
How to manage multiple SSH keys | Opensource.com
Dell Technologies World 2019 – (Fairly) Full Disclosure | PenguinPunk.net
D4stiny (Bill Demirkapi) · GitHub
18 Quick 'lsof' command examples for Linux Geeks
Raspberry Pi Streams Music Using Only the Default Linux Tools | Hackaday
Open source security: The risk issue is unpatched software, not open source use - Help Net Security
How to geotag photos on Linux with Otto | Tōkyō Made
Data in a Flash, Part I: the Evolution of Disk Storage and an Introduction to NVMe | Linux Journal
Routing from a single public IP with Azure Firewall -
dnsperf | DNS-OARC
GitHub - DNS-OARC/flamethrower: a DNS performance and functional testing utility (by @NS1)
New Features Coming to Debian 10 Buster Release - It's FOSS
Dell Technologies World 2019 – Media Session – Architecting Innovation in a Multi-Cloud World – Rough Notes | PenguinPunk.net
Dell Technologies World 2019 – Wednesday General Session – Optimism and Happiness in the Digital Age – Rough Notes | PenguinPunk.net
Dell Technologies World 2019 – Tuesday General Session – Innovation to Unlock Your Digital Future – Rough Notes | PenguinPunk.net
Dell Technologies World 2019 – Monday General Session – The Architects of Innovation – Rough Notes | PenguinPunk.net
Dell EMC Announces Unity XT And More Cloudy Things | PenguinPunk.net
Free Veeam VMCE Study Guide Download | ESX Virtualization
New – Amazon Managed Blockchain – Create & Manage Scalable Blockchain Networks | AWS News Blog
New – Amazon S3 Batch Operations | AWS News Blog
Building Serverless Pipelines with Amazon CloudWatch Events | AWS News Blog
hashing - Is there a built-in checksum utility on Windows 7? - Super User
certUtil -hashfile pathToFileToCheck [HashAlgorithm]
Design BOMs & my vSAN licensing cheat sheet mind map – Elastic Sky
vCenter Server Appliance CLI - JSON Creator · davidstamen.com
Blue circle in the vSphere client after upgrading to vCenter Server 6.7 Update 2 - ivobeerens.nl
Unimus
PCI ASV Partners - Clone Systems, Inc.
AWS re:Inforce 2019 – Security, Identity, and Compliance | AWS News Blog
Network Security right from the Beginning – Introducing DHCP-over-TLS (DoT) •
CISSP certificate - II. Personal experience - Security Art Work
CISSP certificate - I - Security Art Work
Helping CISOs and Board Members Communicate on Risk: A Shared Assessments Summit 2019 Recap | Security Architects Partners
Windows Incident Response: Registry Transaction Logs, pt II
Windows Incident Response: Latest Testing: The Windows Registry, pt I
Windows Incident Response: LNK Files In The Wild
Unhardened Web Servers in Tor Have No Anonymity – We are OSINTCurio.us
Certificates: The OSINT Gift that Keeps on Giving… – We are OSINTCurio.us
Basic OPSEC Tips & Tricks for OSINT researchers – We are OSINTCurio.us
So You Want to Red Team? · System Overlord
The Difference Between Classical Liberalism and Libertarianism | Daniel Miessler
Cybersecurity | Daniel Miessler
The Difference Between Goals, Strategies, Metrics, OKRs, KPIs, and KRIs | Daniel Miessler
Optimizing a Security Assessment Engagement
Django vs. the OWASP Top 10 - Part 1
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 2 - strings and parameters | SANS Institute
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code | SANS Institute
SANS Digital Forensics and Incident Response Blog | A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters | SANS Institute
Robert Penz Blog » Howto install Wireguard in an unprivileged container (Proxmox)
Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903 – Microsoft Security Guidance blog
The Azure Security Model, Part 1 - Access Control Basics
Cyber Security First Step for Industrial IoT - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
SOAR: Doing More with Less
Google Online Security Blog: Gmail making email more secure with MTA-STS standard
Google Online Security Blog: The Android Platform Security Model
Errata Security: Programming languages infosec professionals should learn
USWDS: The United States Web Design System
Throw Away Drives | Diary of a Network Geek
California Assembly’s Privacy Committee Votes to Weaken Landmark Privacy Law | Electronic Frontier Foundation
Hardware Hacking 101 - Lesson 3: Abusing UART (U Are RooT) - The Ethical Hacker Network
The growing demand for managed detection and response (MDR) | CSO Online
Navigating the AI hype in security: 3 dos and 2 don'ts | CSO Online
Why your business continuity and disaster recovery plans should account for EMP attacks and GMD events | CSO Online
GandCrab attackers exploit recently patched Confluence vulnerability | CSO Online
Facebook Setting Aside Up To $5 Billion For Privacy Violations : NPR
Ransom amounts rise 90% in Q1 as Ryuk increases
Guide: Three Pillars of Preventing Business Email Compromise and Wire Fraud
Why Asset Management is so important for Vulnerability Management and Infrastructure Security? | Alexander V. Leonov
After Pentagon Ends Contract, Top-Secret Scientists Group Vows To Carry On : NPR
Cumulative Update #17 for SQL Server 2014 SP2 - Microsoft Tech Community - 462772
Largest Leak in History: Email Data Breach Exposes Over Two Billion Personal Records - CPO Magazine
Multiply time by asking 4 questions about the stuff on your to-do list |
Java mon amour: Jenkins enable project based security
Java mon amour: WebLogic Security documentation
The Wistar network emulator | Open-Source Routing and Network Simulation
3 Flourishing Sales Funnel Examples You Ought to Learn From – Online Businesses
Oracle Security Alert CVE-2019-2725
Intel’s Optane: Two Confusing Modes. Part 3) App Direct Mode | The SSD Guy
Oracle Database 19c (19.3) : Installations, RAC, Data Guard etc. | The ORACLE-BASE Blog
ncubeeight: My 20 years of web
Learn Ansible By Doing With These Courses And Hands-On Labs - Linux Academy
Early warning system | Joinup
blueprint for clinician-led open software design.
iLO recovery broken flash | panticz.de
Set Up ParseDMARC on Ubuntu 18.04, 16.04 Server to Analyze DMARC Reports
VMware ESXi Boot Failure from USB or SD Card with HPe iLO Amplifier and InfoSight - The time I've wasted on technology...
Blue Zones: Financial Lessons From the World’s Oldest People — My Money Blog
Big Data Is Big Business: Here's How to Become a Data Analyst
Market Guide for Cloud Workload Protection Platforms - Virsec Systems
Kanboard 1.2.7 Multiple Vulnerabilities
Threat Modeling Methodology | OCTAVE, STRIDE, PASTA,Trike, VAST
ZeroSec - Adventures In Information Security
ZephrFish (ZephrFish) / Repositories · GitHub
DNS Service Discovery (DNS-SD)
CoreDNS: DNS and Service Discovery
Pragmatic Blog: Denis Rechkunov – Paranoid Habits. Security Tips
Understand Your Sphere of Control | #Resolve2015 | Keri Duce | Gross, Point-Blank
Shadowing RDS 2012 Sessions – Ryan Mangan's IT Blog
GitHub - gabemarshall/eversec_ctf: Public repo for the Eversec CTF.
Correlating build numbers and versions of VMware products (1014508)
MARS_GUUG2016.pdf
Thomas_Schoebel-Theuer_-_MARS_Light__Replicating_Block_Devices_over_Long_Distances.e2308.pdf
The World's Largest Repository of Historical DNS data
Tell it to your Teddy Bear | Talk About Quality
Red Team Toolkit Essentials, Tim Roberts
Introducing: Detection Lab – Chris Long – Medium
Active Directory Visualization for Blue Teams and Threat Hunters
Three ways to pass credentials in a Powershell Script | Energized About PowerShell
Export all windows domain computers to CSV from windows | SvennD
EU law could fine sites for not removing terrorist content within an hour
GitHub - clong/DetectionLab: Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
The Journey to Try Harder: TJnull’s Preparation Guide for PWK/OSCP | NetSec Focus
DNS Ping Scans via Open Resolvers
Cybersecurity Bill Of Materials For Medical Devices: What’s Next
SPNEGO - Wikipedia
IEZoneAnalyzer v3.5 with Zone Map Viewer – Microsoft's USGCB Tech Blog
Slido - Audience Interaction Made Easy
Sidewalk Labs' street signs alert people to data collection in use
CIA claims Huawei is funded by Chinese state security
Chris's Wiki :: blog/links/SystemDashboardDesign
Using SetupDiag.exe to Diagnose Windows 10 Upgrade Errors | Windows OS Hub
Organizations Fail to Test Cybersecurity Incident Response Plans | APMdigest - Application Performance Management
How to Use the Microsoft Anti-Malware Script Interface
Java and Tomcat Updates : Vagrant and Docker | The ORACLE-BASE Blog
Linux Server Hardening Using Idempotency with Ansible: Part 3 | Linux.com | The source for Linux information
Cloud Security » Linux Magazine
WOPR: Security Loses Some of its Obscurity | Hackaday
Transcending the Stack with the Right Network Protocol | Hackaday
The CD Is 40, The CD Is Dead | Hackaday
The fast WekaIO file system saves you money! - FastStorage
Digital Trust & Safety: Go beyond fraud prevention with Sift | Sift
RSS Guard 3.5.7 - Neowin
VSCodium - The advanced editor
Top 25 Best Free Medical Imaging Software for Linux System
Cops Are Increasingly Using Google's Location History Data To Nab Criminals
Driftnet on Debian: Sniffing images within a network – Linux Hint
Data Collection Standards in Privacy Legislation: Proposed Language - Lawfare
Principles of AI Governance and Ethics Should Apply to All Technologies - Lawfare
Estate Planning for Your Digital Assets: Smart Planning for Your Digital Demise | DennisKennedy.Blog
Skills for Tech Pros of Tomorrow - Part 1 | APMdigest - Application Performance Management
Using SSH Keys to connect to your VPS – Low End Box
Linux Blackhole Tutorial – Adding and Removing A Null Route – Low End Box
Create Team and Channels with PowerShell |
Home Lab Information Management – Notes from MWhite
Monoprice Maker Ultimate 3D Printer Review: Part 1 - set up and initial print
Is it Elastalert? No – it’s NiFi!! – David Vassallo's Blog
Consuming Netflow using NiFi – David Vassallo's Blog
Early Retirement Extreme: — a combination of simple living, anticonsumerism, DIY ethics, self-reliance, resilience, and applied capitalism
What is a zombie (comatose) server, and why should I care?
Dread Pirate Roberts 2, the 'guiding mind' of Silk Road 2.0, jailed for over 5 years
Thomas White, the founder of notorious website Silk Road 2.0, has been jailed for five years and four months by a UK court. White, also known as Dread Pirate Roberts 2, was charged with not only running Silk Road 2.0 -- the site through which he earned hundreds of thousands of dollars per day on the dark web Silk Road 2.0 had been set up by White with Blake Benthall (also known as DefCon) from the US after the FBI closed down the original Silk Road marketplace in 2013. White's pseudonym (or one of them, at least), was a nod to Ross Ulbricht, who was arrested for running the first site and used the name Dread Pirate Roberts.
2019 Women in Tech Report - HackerRank
Tax identities up for sale on the dark web
previous year's W-2 forms and 1040 forms available on the dark web at relatively low cost, ranging from $1.04 to $52. Names, social security numbers and birthdates can be obtained for a price ranging from $0.19 to $62. There are also how-to guides on illicitly cashing out tax returns available for as little as $5.
PC-as-a-Service or managed device services? The difference matters
61 percent of CISOs believe employees have leaked data maliciously
79 percent of IT leaders believe that employees have put company data at risk accidentally in the last 12 months, and 61 percent believe they have done so maliciously.
8 out of 10 top vulnerabilities target Microsoft products
Eight out of 10 vulnerabilities exploited via phishing attacks, exploit kits, or RATs were targeting Microsoft products.
802.11ax Is NOT A Wireless Switch | The Networking Nerd
Data center and server room considerations: What you need to know
New VMware Security Advisory VMSA-2019-0006 - VMware Security & Compliance Blog - VMware Blogs
Rubrik Color-Coded VM Backup Reports – Virtually Sober
An Intro to OpenCensus - SFlanders
virt-install + nbdkit live install | Richard WM Jones
The Wide World of Microsoft Windows on AWS | AWS News Blog
Windows 10 1809 and later slow on VMware | blog.erben.sk
The issue is identified to be due to some guest OS behavior change in this version of windows 10, 1809 w.r.t thin provisioned disks and snapshots, this has been confirmed as a bug and will be fixed in the following releases – 6.5 U3 and 6.7U3, which will be released within End of this year (2019).
3-2-1 Backup Best Practices Using the Cloud
3 types of Navigation in SharePoint Online - SharePoint Maven
The world of cybersecurity in numbers
OSINT Framework | KC's Blog
The EU releases guidelines to encourage ethical AI development
Log2Ram: Extending SD Card Lifetime for Raspberry Pi LoRaWAN Gateway | MCU on Eclipse
Under The Stairs: PowerShell 7 - Coming Soon!
Windows hard disk space disappears – Offline files – MILOSZENGEL.com
Lynis Overview & Installation – Low End Box
Protecting the privacy interests of others – Blog FiascoBlog Fiasco
Comparing and Syncing IIS Configurations - Devops Blog
Top Colleges Aren't What You Think : NPR
How To SlipStream Latest VMware ESXi patches into an Installation ESXi ISO File | ESX Virtualization
Artificial Intelligence Could Improve Mammogram Accuracy : Shots - Health News : NPR
Freed from storage failure by FreeNAS - MYstIC G
Vrnetlab: Emulate networks using KVM and Docker | Open-Source Routing and Network Simulation
Screen and Web scraping
Automatic Clean-and-Updated Firewall Ruleset « ipSpace.net blog
First Look: Microsoft Healthcare Bot | Tallan Blog
15 Practical Python Set Examples with a Sample Program
Understanding lifecycle management complexity of datacenter topologies | the morning paper
CephFS: a beginner's guide – Marksei
joeware – never stop exploring… :) » Blog Archive » LDAP Ping and Determining Your Machine’s Site
Cloud computing simplified: a Berkeley view on serverless computing | the morning paper
Let’s talk about trace flags - Microsoft Tech Community - 386061
Cumulative Update #16 for SQL Server 2014 SP2 - Microsoft Tech Community - 391101
What if the Actual Execution Plan was always available for any query? - Microsoft Tech Community - 393387
How To Configure a Shared Mailbox in Office 365. – TDSheridan Lab
An example why NAT is NOT security | Sebastian Neef - 0day.work
Active Directory Audit: Why and How | Security Architects Partners
Ansible Dynamic Inventory for Proxmox | Lisenet.com :: Linux | Security | Networking
Healthcare Exchange Standards: State of Healthcare Provenance today
The 12 Worst Serverless Security Risks
Install OpenVAS (GVM) on Kali 2019
How CISOs should respond to the cybersecurity crisis
The Role of Analytics in Protecting Healthcare Data Privacy and Security
Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging
Trojan Horses for the Mind
Threat Detection for your Network using Kfsensor Honeypot
Comprehensive Guide on Netcat
In its ransomware response, Norsk Hydro is an example for us all
Historical Communications Security | Diary of a Network Geek
The buzz at RSA 2019: Cloud security, network security and more | CSO Online
Under Attack: Over Half of SMBs Breached Last Year
Threat Hunting 101: Not Mission Impossible for the ...
40% of Organizations Not Doing Enough to Protect ...
20 Years of STRIDE: Looking Back, Looking Forward - ...
Adam Shostack
6 Essential Skills Cybersecurity Pros Need to ...
The Matrix at 20: A Metaphor for Today's ...
12 tips for effectively presenting cybersecurity to the board | CSO Online
Windows security updates that require new registry keys | CSO Online
7 keys to a successful IT security career | CSO Online
The 6 biggest ransomware attacks of the last 5 years | CSO Online
Cr1ptT0r Ransomware Targets NAS Devices with Old Firmware
Dharma ransomware recovery rates fall as ransom demands skyrocket
How to rotate your source IP address - Black Hills Information Security
Oracle mail warns about a critical Java 8 update coming | Born's Tech and Windows World
Security: Windows-Spoofing via .reg files | Born's Tech and Windows World
Patch Lady – Domain admins and issues with KB4489878 @ AskWoody
DTrace for Windows available | Born's Tech and Windows World
This free AI reads X-rays as well as doctors
What about a 3D Printed Mini-ITX NAS Case? - briancmoses.com
Treat staff like adults and equals | The IT Skeptic
Invalid State of a Virtual Machine on VMWare ESXi | Windows OS Hub
4 ITSM Priorities for Digital Transformation | APMdigest - Application Performance Management
Under The Stairs: Moving from PowerShell Journeyman to PowerShell Master
How to Fix “Trust relationship has failed” Error
Upgrade Windows Server from Evaluation to Full
Desired State Configuration in PowerShell
Attach a USB Device to a Virtual Machine in VMware
How to Split a Windows Image File (WIM to SVM)
Automating The Installation Of VMware ESXi With PowerCLI
VMware: Change IOPS Limit From 1000 to 1 | PeteNetLive
Quick and Dirty Image Factory with MDT and PowerShell | Keith's Consulting Blog
Do You Need to Update KRBTGT Account Password? | KC's Blog
Chris's Wiki :: blog/tech/NVMeAndTechChange
Chris's Wiki :: blog/sysadmin/OurDNSCircularDependency
Check if Powershell Script is Running as Administrator using Snippet
Product roadmaps are inferior to product forecasts – Blog FiascoBlog Fiasco
Exploiting Poor SMB Configuration – ls /blog
gallery-dl - Download Image Galleries And Collections From The Command Line - Linux Uprising Blog
code integrity vs data security
The impact of the GDPR - privacy matters
openDCIM - Open Source Data Center Infrastructure Management
Security clashes with cloud: Offensive Security CEO talks cultural mindsets, leadership challenges | ZDNet
radare
FinalCrypt - Free One Time Pad Encryption
GitHub - google/grr: GRR Rapid Response: remote live forensics for incident response
MIG: Mozilla InvestiGator
GRR Rapid Response: remote live forensics for incident response - LinuxLinks
IOInsight
As Built Report | Tim Carman
Chinese Woman Carrying Malware Allegedly Got Into Mar-a-Lago
Mar-a-Lago's Security Problems Go Way Beyond a Thumb Drive | WIRED
Latest Ransomware 'Xwo' Attacks PCs With Default Passwords
Xwo
Format your log messages in Python - Blog - syslog-ng Community - syslog-ng Community
Security Researchers say Half Of Industrial Control System Networks Have Faced Cyber Attacks – ls /blog
5 open source tools for teaching young children to read | Opensource.com
USB4: What this future standard means for USB chaos and Thunderbolt 3 | PCWorld
The Best Antivirus Programs for Ubuntu - Make Tech Easier
Different Ways To List Directory Contents Without Using ls Command
Automation Could Help Organizations Manage Risk: Cybersecurity Research
Episode #206 Running Django in Production - [Talk Python To Me Podcast]
Former Senate IT worker pleads guilty to doxxing senators on Wikipedia
Microsoft is shutting down its HealthVault patient record service
US Household Spending Breakdown: Top 20% vs. Bottom 20% — My Money Blog
My life philosophy: 50 lessons from 50 years
The Best Business Books for Students Who Want to Be Financially Literate
UN says US fears over Huawei’s 5G are politically motivated
HCIBench 2.0 is Here! — ThinkCharles.net
Indian health agency exposes details on millions of pregnant women
Oracle 18c/19c and ActiveDirectory – Laurent Schneider
The Renaissance of Data ONTAP | Architecting IT
Windows Server 2019 Licensing Calculator - VirtuallyInclined.com
Windows Server 2019 Comparison | Microsoft
An Intro to Observability - SFlanders
Datera and the Rise of Enterprise Software-Defined Storage | PenguinPunk.net
New Veeam Backup & Replication Community Edition for home labs is free! | TinkerTry IT @ Home
Terence Luk: Using wmic (Windows Management Interface Command) to remotely uninstall applications
VAST Data – No More Tiers Means No More Tears? | PenguinPunk.net
Glenn K. Lockwood: VAST Data's storage system architecture
VAST decouples compute and storage – Blocks and Files
VAST Data's Universal filesystem – Blocks and Files
VAST Data: The first thing we do, let's kill all the hard drives – Blocks and Files
Spectre/Meltdown Performance Impact Across Eight Linux Distributions - Phoronix
Backups | Roadmap to Securing Your Infrastructure - Linux Academy Blog
Wiping harddisks in 2019 - Daniel Lange's blog
Essential System Tools: Firejail - Excellent Security Sandboxing - LinuxLinks
Protection Poker: An agile game for mitigating risk | Opensource.com
Antennas in Linux | Linux Journal
Kali Linux Forensics Tools – Linux Hint
SMB Exploited – ls /blog
Being open builds trust | Joinup
25 Most Common IoT Security Threats in an Increasingly Connected World
Economical append-only offsite backups with restic and Wasabi on Debian 10
AWS Careers: On the Road to All 9 AWS Certifications - Linux Academy Blog
MITRE names The Document Foundation as a CVE Numbering Authority (CNA) - The Document Foundation Blog
How to install the OpenVAS security audit tool on Ubuntu Server 18.04 - TechRepublic
sudo add-apt-repository ppa:mrazavi/openvas sudo apt-get update sudo apt install sqlite3 openvas9 libopenvas9-dev -y sudo greenbone-nvt-syncsudo greenbone-scapdata-sync sudo greenbone-certdata-sync sudo systemctl restart openvas-scanner sudo systemctl restart openvas-manager sudo systemctl restart openvas-gsa sudo systemctl enable openvas-scanner sudo systemctl enable openvas-manager sudo systemctl enable openvas-gsa sudo openvasmd --rebuild --progress --verbose sudo openvas-check-setup --v9
SAP Open Sources Java SCA Tool
Why Trust Is Key for Cyber-Security Risk Management
Open Source Healthcare Visualizations
“Severe” ransomware attack cripples big aluminum producer | Ars Technica
Happy Birthday SAP Linux Lab! | e3zine.com
NetBIOS Auxiliary Modules – ls /blog
HAProxy - a journey into multithreading (and SSL)
10 Excellent Web Project Management Software - LinuxLinks
These are the most insecure programming languages | ZDNet
How Lockergoga took down Hydro — ransomware used in targeted attacks aimed at big business
LockerGoga: The Dangerously Changing Face Of Ransomware
What You Need to Know About the LockerGoga Ransomware - Security News - Trend Micro USA
Configure two node Squid (Proxy Server) Clustering using Pacemaker on CentOS 7 / RHEL 7
The Ingredients of a Successful Digital Transformation Strategy
GitHub - edmunds/shadowreader: Serverless load testing for replaying production traffic. Powered by AWS Lambda.
CopperheadOS' Android Pie update is now available for the Pixel & Pixel 2
CopperheadOS
5 Ceph storage questions answered and explained
Digital transformation, cultural modernization cannot be mutually exclusive - Federal News Network
How to Set Up OpenStreetMap Tile Server on Ubuntu 18.04
DSHR's Blog: Compression vs. Preservation
Key takeaways on upgrading to Java 12
JAVA 12 Series Index
Quick guide to typeperf for Windows performance monitoring | Erik Wramner
Oracle E Business Suite and Java Security What You Need to Know | Integrigy
Oracle RAC vs. SQL Server AG – DBAKevlar
DeployHappiness | Making Life Hard for a Phisher – How to Report a Phishing or Malicious Website
Fast copies with Solaris 11.4 | rootpool
Intel’s Optane: Two Confusing Modes. Part 2) Memory Mode | The SSD Guy
Intel’s Optane: Two Confusing Modes. Part 1) Overview | The SSD Guy
I can't stand world backup day | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
PSA: Isilon L3 cache does not enable with a 1:1 HDD:SSD ratio - FastStorage
How To Install SQL Server 2019 on Linux (CentOS) - Mohammad Darab
DHS issues warning about Medtronic implantable defibrillator flaws
iTWire - Norwegian firm attack likely through Microsoft Active Directory: claim
Norsk Hydro
Benchmarking A 10-Core Tyan/IBM POWER Server For ~$300 USD - Phoronix
Oracle vs. SQL Server Architecture – DBAKevlar
iLO - IPMI on HP servers | panticz.de
40 Linux Server Hardening Security Tips [2019 edition] - nixCraft
Bare-Bones Monitoring with Monit and RRDtool | Linux Journal
There’s Something About Service Accounts – Active Directory Security
What is SNIA’s Persistent Memory Programming Model? | The SSD Guy
Terence Luk: Security tab for Internet Explorer 11 displays a lock key icon for Internet, Local intranet, Trusted sites, and Restricted sites zones
Docker tips and tricks for your Go projects | Marco Franssen
VCP6.7-DCV Objective 1.10 - Describe a virtual machine (VM) file structure | ESX Virtualization
New – Gigabit Connectivity Options for Amazon Direct Connect | AWS News Blog
Azure Blueprints: ISO27001 Shared Services - Eric’s Azure Blog
GitHub - StreisandEffect/streisand: Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
vSphere 6.7 Basics – Part 2 – vCenter Server Appliance Install – vcdx133.com
Migrating DB2 Databases to Azure – DBAKevlar
Nested ESXi Templates - EverythingShouldBeVirtual
Azure Blueprints - Eric’s Azure Blog
Putting AWS security services to work for you | AWS News Blog
Alien Pastures » Explorations into the world of electronic music production
100 Useful Vim Commands That You'll Need Every day
The Quiet Spread of Data Brokers Selling Your Personal Information - TidBITS
Windows Persistence with PowerShell Empire
Businesses Warned of Malware Spread via LinkedIn Job Offers
Thousands of patients impacted by ransomware attack at medical billing company
Episode 008 - What is Software Testing? - The Evil Tester Show - EvilTester.com
Are there any programming Katas related to testing? - EvilTester.com
What is Software Testing And Why Do We Test Software? - EvilTester.com
Massive Database Leak Gives Us a Window into China’s Digital Surveillance State | Electronic Frontier Foundation
Learn about computer security with the Raspberry Pi and Kali Linux | Opensource.com
Powershell – Windows firewall rules with ports – Luka Gros
Defending Against Remote Desktop Protocol Attacks – The Back Room Tech
Powershell and Lotus Notes pt3 – Luka Gros
News about the broken MSComCTL.ocx updates on Office | Born's Tech and Windows World
MSComCTL.ocx
The Anatomy of an AWS Key Leak to a Public Code Repository | Technodrone
A brief history of the admins time | rootpool
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Three - Delta Risk
Opening a New Door of Opportunity | Thom Langford
Axonius' 'Unsexy' Tool Wins RSAC Innovation Sandbox ...
Axonius
It's Time to Rethink Your Vendor Questionnaire
Vulnerability Management at Tinkoff Fintech School | Alexander V. Leonov
An all-in-one cyber toolkit for criminal investigations - Purdue University News
Equifax defends against scathing Senate report
Paravirtualization
Spy Games: the NSA and GCHQ Offer Their Software to the Open Source Community | Linux Journal
GitHub - eerotal/LibreSignage: An open source digital signage solution
13-Yr-Old Girl Arrested In Japan For Posting Infinite Loop Code
Linux In Safety-Critical Systems Is Coming Soon With Project ELISA
ELISA
iGen and Cyber Security Research | Whitepaper | SANS Institute
DIY Portable KVM Crashcart From Recycled Laptop Provides VGA Display and USB Keyboard Touchpad With Optional Raspberry Pi: 14 Steps
As the web turns 30, is it an out-of-control monster? - Japan Today
Assessing your disk performance and your needs: Analyzing collected data (Part 2) – Dynamics AX in the Field
Assessing your disk performance and your needs: Collecting relevant data (Part 1) – Dynamics AX in the Field
SignalsEverywhere Video: SDRAngel How to Receive Basics Tutorial
The Essential Microsoft Excel Formulas and Functions Cheat Sheet
The Problem With ERP - IT Jungle
Who Invented the First Computer and When? We Investigate
Changes to Garbage Collection in Java 12
Java mon amour: Kubernetes cheat sheet 2
Java mon amour: Kubernetes cheat sheet 3
IDEAS IN FOOD: Fried Angel Hair Parm
Here's Why IT Teams Spend Too Much Time on Network Troubleshooting | APMdigest - Application Performance Management
Making A Hammer With Beautiful Engravings | Hackaday
This Cardboard Box Can Tell You What It Sees | Hackaday
U.S. GAO - DOD Training: U.S. Cyber Command and Services Should Take Actions to Maintain a Trained Cyber Mission Force
Remembering Eisenhower’s Middle East Force Resolution - Lawfare
DSHR's Blog: Demand Is Far From Insatiable
Raspberry Pi based indoor air quality monitor « Dangerous Prototypes
DIY NAS: 2019 Edition - briancmoses.com
Pepperdata Releases Free Big Data Cloud Migration Cost Assessment | APMdigest - Application Performance Management
Reinventing ITSM? It's Not Going Away - Part 2 | APMdigest - Application Performance Management
Reinventing ITSM? It's Not Going Away - Part 1 | APMdigest - Application Performance Management
Which Windows Server 2019 Installation Option should I choose? - Thomas Maurer
Chris's Wiki :: blog/sysadmin/ScriptsPromptImprovements
PowerShell Automation Script for IIS installation and more. | Nerd Drivel
Spectre and VMWare – Stuff I'm Up To
Oracle 19c Automatic Indexing — How well it’s understood?
Get All DCs in the Entire Forest | Mohammed Wasay
Stop audio pops on Intel HD Audio · major.io
Downgrade HP TPM From TPM 2.0 to TPM 1.2 - Daniel Classon
Generating Various Types of Group Policy Reports | KC's Blog
Exploiting secondary data with NDAS from NetApp | Architecting IT
Applocker and PowerShell: how do they tightly work together? | >_
Degrading qemu performance in DooM – Virtually Fun
Getting started with Pulumi on Azure - Cloud for the win!
Pulumi
My awesome-podcasts List | Technodrone
Sysadmin Stories: Running Veeam PowerShell Scripts in Non-Interactive Mode - Credentials
End of an era, Linux to Deprecate a.out support – Virtually Fun
BlgNetAutoSol/2_Easy_Wins at master · writememe/BlgNetAutoSol · GitHub
Iranian hackers stole terabytes of data from software giant Citrix
Free Morningstar Premium Mutual Fund Reports via Public Library Card — My Money Blog
Warren Buffett CNBC Interview 2019 Full Video, Full Transcript, and Notes — My Money Blog
Personal Finance on a 3×5 Index Card: Classic and New Young Adult Version — My Money Blog
Big Data Is Big Business: Here's How to Become a Data Analyst
What is money for? An evening with Vicki Robin
Faster and bigger SSDs enable us to talk about something else than IOps - FastStorage
How To Create A Recovery Services Vault In Azure - Blog dbi services
Easter Egg in the Server Config Doc and How to configure Domino to restrict which groups can receive Internet mail | The Notes Guy in Seattle
Mark Zuckerberg outlines a 'privacy-focused' revamp of Facebook
Capsule8 Expands Linux-Based Threat Detection Platform for PCI DSS
How To Create Fillable PDF Forms With LibreOffice Writer - Linux Uprising Blog
SAP builds its own Java distribution | InfoWorld
NIST and DFARS and Cyber Compliance! (oh my) « Virginia PTAP at George Mason University
DFARS & NIST & Incident Reporting - Exostar NIST 800-171 - Exostar Documentation
Compliance with DFARS 252.204-7012 & NIST 800-171; Expect 2019 to be the year of audit and enforcement - CyberSheath
DFARS_final.pdf
a495389.pdf
1018805.pdf
More Than 22,000 Vulns Were Disclosed in 2018, 27% ...
7 cheap or free cyber security training resources | CSO Online
Hack the Box Pentester Academy SANS Cyber Aces OWASP Broken Web Apps Project Offensive Security's free Metasploit course Free book: Mitre's "Ten Strategies of a World-Class Cybersecurity Operations Center"
The cybersecurity legislation agenda: 5 areas to watch | CSO Online
The CSO and CPO role just dramatically expanded overnight | CSO Online
Bare-metal cloud servers vulnerable to Cloudborne flaw | CSO Online
The RDP Through SSH Encyclopedia - Black Hills Information Security
Ransomware attacks hit Florida ISP, Australian cardiology group | CSO Online
Unified Interface: Internet Explorer 11 Browser Update Issue – Dynamics 365 Customer Engagement Team Blog
'Car Talk' Lives On In Medical Education, Teaching Med Students How To Diagnose : Shots - Health News : NPR
5 Strategies For Answering Kids' (Super) Tough Questions : NPR
Java mon amour: Kubernetes cheat sheets
Java mon amour: Excellent Kubernetes Developer Certification training on Udemy
Java mon amour: CKA Certification (Kubernetes Administrator)
How to Sharpen Your Interview Skills With These Soft Skills Questions
How to Record and Stream Live TV With Raspberry Pi
HOWTO: Microsoft Certification Exam Preparation Generator – Please Work
Leigh Johnson’s Guide To Machine Vision On Raspberry Pi | Hackaday
Stethoscopes, Electronics, and Artificial Intelligence | Hackaday
Hack My House: Raspberry Pi as a Touchscreen Thermostat | Hackaday
5 tips to help CIOs overcome patching problems
DSHR's Blog: Economic Models Of Long-Term Storage
Weather Station Project Overview
Gartner: CIOs Will Be as Responsible for Culture Change as Chief HR Officers | APMdigest - Application Performance Management
BitSight: Security Ratings Leader - Cyber Risk Management
Home endpoints twice as likely to be infected as businesses
The Surprising Secret to Improving Employee Engagement | Beth's Blog
Ten things you need to know about Pass-through Authentication - The things that are better left unspoken
Thoughts on VPNs for Road Warriors - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
The Strategy Private School Endowments Love the Most | Institutional Investor
VulnReport Install ·
First look on the new Azure Sentinel cloud-native with Azure Notebooks free service #Jupyter #SIEM #SIEMaaS #Azure #Sentinel | Robert Smit MVP Blog
Learning about containers | Nelson's log
Why I write my resume in LaTeX | Logan Marchione
Security Thoughts: Veeam Backup & Replication leaks Azure Password in log - The things that are better left unspoken
Saving regret — and how to avoid it
The Trouble with Troubleshooting | APMdigest - Application Performance Management
Chris's Wiki :: blog/sysadmin/PrometheusSubqueriesMathOverTime
Diving into Merkle Trees
PureBoot, the High Security Boot Process – Purism
Strategies for securing container deployments | ITProPortal
5 Useful Tips for Better Tmux Terminal Sessions
Reducing security risks with centralized logging | Opensource.com
Full API lifecycle management: A primer - Red Hat Developer Blog
An LA hospital will put Alexa in over 100 patients' rooms
France’s New Offensive Cyber Doctrine - Lawfare
Introduction to spatial joins with QGIS | Opensource.com
Twenty years of U.S. government inflation data
Berkshire Hathaway 2018 Annual Letter by Warren Buffett — My Money Blog
Who Shoulders the Burden of Federal Income Taxes?
You MUST patch 12.1.0.1 and 11.2.0.3 and older before June 2019
The Cloud Migration Journey Series – Ather Beg’s Useful Thoughts
SignalsEverywhere Podcast EP1: Es’hail-2, Favorite RTL-SDR Blog Posts and What SDR Should I Get?
A Sense of Urgency: Money Can’t Buy You More Time — My Money Blog
Internet gatekeeper warns of 'ongoing and significant' DNS attacks
Hacking Amazon dash buttons, the hard way, with OpenWRT – Huan Truong's Pensieve
OSSEC Installation Guide for Ubuntu - < 10 min to Raise the Defences
Wireshark Tutorial and Tactical Cheat Sheet | HackerTarget.com
Tcpdump Examples - 22 Tactical Commands | HackerTarget.com
22 SSH Examples, Practical Tips & Tunnels | HackerTarget.com
Ubuntu, DNS, and sudo | Nelson's log
Adding Cover Art to FLAC file from Command Line and GUI - Life of a Geek Admin
How To Mount and Unmount ISO files using PowerShell - Life of a Geek Admin
Nessus, OpenVAS and Nexpose VS Metasploitable
eurobsdcon_silbersack.pdf
Michael James Silbersack
800 Free eBooks for iPad, Kindle & Other Devices | Open Culture
pki - CAC enable JBoss - Stack Overflow
External and Federal PKI Interoperability
TCP timestamps - ForensicsWiki
Mitigating End of Life Technology by Bill Keyworth: BSMReview.com
Useful WMIC Queries Computer Info | g.fisk
Remote Desktop – Black Screen Of Death | g.fisk
Network performance with VMXNET3 on Windows Server 2016 - Life of a Geek Admin
Disable TCP and ICMP Timestamps - Whonix
Patch Tuesday, February 2019 Edition — Krebs on Security
Replacing default certificates with CA signed SSL certificates in vSphere 6.x (2111219)
Configuring CA signed certificates for ESXi 6.0 hosts (2113926)
Replacing ESXi SSL Certificates and Keys
Sleeping at Night: Cybersecurity, Patient Safety and the Radiology Department
Building A Cybersecurity Team in Radiology | Imaging Technology News
Cybersecurity for Medical Imaging Departments – LINK
Cybersecurity Increasingly Critical for Medical Imaging
How to Choose Between Penetration Tests and Vulnerability Scans | EdTech Magazine
Welcome to MWR Labs - Cyber security research and development
CISSP Exam Changes: Tips and tricks to pass the new CAT format - YouTube
(172) MF Prod - YouTube
(172) Free CISSP Study Questions of the Day from IT Dojo - YouTube
(172) Larry Greenblatt - CISSP 2018 Exam Tips - YouTube
DoD Approved 8570 Baseline Certifications
Major Security Breach Found in Hospital and Supermarket Refrigeration Systems
ONTAP 9 Antivirus Configuration Guide - ECMLP2492609
What is EMC's CAVA / Common Event Enabler? - THE SAN GUY
Anti-virus on VNX CIFS Servers » Cyberfella Ltd
Programming Books You Wish You Read Earlier
2019 Update on frameworks, standards, and regulations for infosec - Security Boulevard
Top 30 Information Assurance Analyst Interview Questions and Answers for 2019
Brain-hacking: Why Social Engineering is so effective - Security Boulevard
CIPHER Selected as Top 10 Best Performing MSSP
When it Comes to NIST 800-171 Compliance – There’s ‘On Time’ and There’s ‘Lombardi Time’ - Security Boulevard
Cyberattacks in a Global Supply Chain: How Compliance Officers Can Mitigate Risk - Security Boulevard
The Complete Application Security Checklist | Synopsys
The Route of a Text Message, a Love Story - Motherboard
DFARS Cybersecurity Audits: What to Expect
Lessons learned from the Microsoft SOC—Part 1: Organization - Microsoft Secure
Toyota Australia driven offline by cyber attack, as heart hospital hit by ransomware
HoneyPy - A Low To Medium Interaction Honeypot - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
OSFClone - Open Source Utility To Create And Clone Forensic Disk Images - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
These Are the Countries With the Best and Worst CybersecuritySecurity Affairs
Best practices for handling gaps in cloud security - TechRepublic
Remember, data privacy is always the end goal of any security measure; don't lose sight of this fact: Protecting information is the top priority.
Free Tool: Honey FeedSecurity Affairs
ATT&CKized Splunk - Threat Hunting with MITRE’s ATT&CK using SplunkSecurity Affairs
Windows® Domain Controller and Zero Trust Security | JumpCloud
Benefits of OpenLDAP™ | JumpCloud
How to Turn a Raspberry Pi Into a VPN-Secured Travel Router
The Rise of Ransomware and the Consequences for SMBs
11 Takeaways: Targeted Ryuk Attacks Pummel Businesses
Healthcare Exchange Standards: Segmenting Sensitive Health Topics
Japan Security Analyst Conference 2019 -Part 2- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Iptables Essentials - Common Firewall Rules And Commands - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Powershell – My Setup at Work as a SysAdmin
SEAL Training | Diary of a Network Geek
Hacking Healthcare Live: Bits and Bytes Meet Flesh and Blood ~ Cyber Thoughts
Ryuk Ransomware, Exploring the Technical and Human Connections
Six tips for securing identity in the cloud – Microsoft Azure Government
The cybersecurity legislation agenda: 5 areas to watch | CSO Online
7 cheap or free cyber security training resources | CSO Online
DIY X-Ray Machine Becomes CT Scanner | Hackaday
The Woeful World of Worldwide E-Waste | Hackaday
Exploration of Cooking
Bullet Journaling for Nonprofit Professionals | Beth's Blog
Industrial Security | Tenable®
Dtex Systems - User Behavior Intelligence
DeployHappiness | A Universal Naming Scheme for Your Devices
83 percent of US organizations have accidentally exposed sensitive data
The five most common technologies that have led to accidental data breaches by employees are external email services like Gmail and Yahoo (51 percent), corporate email (46 percent), file sharing services like FTP sites (40 percent), collaboration tools such as Slack and Dropbox (38 percent), and SMS/Messaging Apps like G-Chat and WhatsApp (35 percent).
Wandera | Mobile Security
Jaffar's (Mr RAC) Oracle blog: What's new in 19c - Part III (Data Guard)
Japan scholar and translator Donald Keene dies at 96 - Japan Today
Comprehensive Guide on Snort (Part 1)
I'm resigning from SANS - Black Hills Information Security
Spectre is here to stay An analysis of side-channels and speculative execution
Data lakes, observability, and making devs awesome - SysAdmin1138 Expounds
SEC575_iOS12_AndroidPie_Handout.pdf
How to make Email Bot service in Python | Alexander V. Leonov
The Average Cost of Fighting a Cyberattack Now Exceeds $1.1M | DEVOPSdigest
$1.1M
Automating snapshots with pyznap on Centos 7 | SvennD
Bureaucracy survival skills – Blog FiascoBlog Fiasco
What happened with Citrix Printing throughout 2018?!
smbclient receiving error message: protocol negotiation failed: NT_STATUS_CONNECTION_DISCONNECTED | setaOffice
Vulnerababe UNACEV2.DLL puts software like WinRAR at risk | Born's Tech and Windows World
7-Zip Version 19.00 released | Born's Tech and Windows World
End of General Support for vSphere 6.0 - Davoud Teimouri
30! TIPS on how to use Amazon Web Services (AWS) more efficiently – multiple cost savers included
Version 2.0 of the Cloud Services Cheat Sheet is now live. Get it here!
New Community (book) project – Byte sized Cloud design principles and architectural recommendations
'Yame-hara' - pressuring resigning workers not to quit - Japan Today
Yame-hara
Oracle Multimedia will be removed in Oracle Database 19c
Oracle 18c Express Edition (XE) for Windows is available
Jaffar's (Mr RAC) Oracle blog: What's new in 19c - Part II (Automatic Storage Management - ASM)
Jaffar's (Mr RAC) Oracle blog: Whats new in 19c - Part I (Grid Infrastructure)
DigitalOcean launches its managed database service | TechCrunch
Re-Imagining Virtualization with Kubernetes and KubeVirt - Part II – Red Hat OpenShift Blog
Monte Carlo Simulation with Python - Practical Business Python
How to Automate FFmpeg and Bento4 With Bash Scripts
CPDP2019 Computers, Privacy and Data Protection conference
7 Key Considerations for Kubernetes in Production - The New Stack
Script to create mount points in LVM - Kernel Talks
How to Create Bootable Ubuntu 18.04 USB Stick on Linux | Linuxize
Implementing Dstat with Performance Co-Pilot
Open Science, Open Source and R | Linux Journal
vCenter 6.5 HA Installation and Configuration - vembu
Configuring vCenter HA - Part 1 - vembu
How To Migrate Shares and Files with ease by using Microsoft Storage Migration Service - Part 2 | ESX Virtualization
NVMe-oF Support is now Released! | Cody Hosterman
NVMe-oF
Upgrading a Basic vCenter 6.5 HA Cluster to vCenter HA 6.7 U1 – The Wifi-Cable
Tips for writing Vester test files, part 2 | Adventures in a Virtual World
This vegetable curry has bold flavors to keep everyone happy - Japan Today
Basics – The FARR Model | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Fault tolerance: This is your baseline protection against individual storage component failure. If a disk (or flash) drive fails, you don’t want to lose your data. While we take fault tolerance for granted as something we can control and see alerts for within an on-premises environment, there’s less visibility and control in public cloud. More so, fault tolerance doesn’t give you protection from anything other than storage unit failure. Availability: “If a tree falls in the forest and no-one hears it, does it really make a noise?” That’s the old philosophical question that availability skirts around: if your data is online and error free, but you can’t access it, is it actually usable? Availability is about making sure you have protection against losing connectivity to the data/workload. For example: if your workload is one presented only back into the business, and the link between the business and the VPC in which it is running is lost, how do you get access to it again? Do you plan for multiple paths for availability, or do you accept a single point of failure on data/workload availability? Redundancy: You’re hosting your service in AWS Sydney, and there’s a fire in the datacentre – what’s your failover strategy? You’ve built a whiz-bang application for your customers that relies on a back-end RDS database, and the region hosting that database starts experiencing RDS services going down. How (and to where) do you failover your database service to allow customers to keep doing what they need to do? Recoverability: Ransomware gets into your VPC and encrypts all the data there. A developer accidentally issues a delete statement on the customer contact table within the production rather than development RDS environment. The CEO accidentally deletes critical O365 email folders. The block storage your service runs on suffers an outage and the cloud provider’s fault tolerance level was insufficient to prevent data corruption. Fault tolerance, availability and redundancy are all about avoiding as much as possible a data loss situation, but recoverability is how you handle the situation when the chips are down. Do you trust to cloud native protection, or use a mix of both? (Increasingly, mix of both is the safest, cheapest and most flexible way to go.)
Easy 1-hour Pro Mini Classroom Datalogger [Build Update: Feb 2019] | Underwater Arduino Data Loggers
Replacing the default (self signed) certificate on a RD Session Host server - Adrian Costea's blog
Automating MDT Windows 10 Image Captures with Packer - WinSysBlog
Replacing Self Signed Remote Desktop Services Certificate on Windows | Knowledge eXchange
How to Modify Default Share Permissions and Other Tweaks • Helge Klein
A little something about Share vs NTFS permissions
Python, Your Friendly OSINT Helper – We are OSINTCurio.us
Tracking All the WiFi Things – We are OSINTCurio.us
Five Things You Can Do To Stay OSINT Curious – We are OSINTCurio.us
Using OSINT for your personal threat model – We are OSINTCurio.us
How to Enable Monitor Mode & Packet Injection on the Raspberry Pi « Null Byte :: WonderHowTo
Tactical Nmap for Beginner Network Reconnaissance « Null Byte :: WonderHowTo
Analyzing the Hacks: The Girl in the Spider's Web Explained « Null Byte :: WonderHowTo
SSD, LVM and you: Zero data loss, LVM caching, and properly configuring your Linux box to get the most out of SSD! | The Doom'd Net
SHA-2 patch for Windows 7 arrives on March 2019 | Born's Tech and Windows World
How to Brute-Force Nearly Any Website Login with Hatch « Null Byte :: WonderHowTo
How to Detect Vulnerabilities in a Web Application with Uniscan « Null Byte :: WonderHowTo
Hubbard on Networking: AutoSSH on Odriod XU4 running Kali Linux 2
Odriod XU4
Hubbard on Networking: Create an HP iLo account when you don't know the Admin Password
Hubbard on Networking: A Simple Python 3 Script for my Favorite nmap Scripts
Hubbard on Networking: Useful Linux commands for troubleshooting WiFi
Hubbard on Networking: Using iPerf3 to Test 2.5Gb/5Gb and 10Gb Links
Hubbard on Networking: Update to testing 10Gb links with iPerf3
Hubbard on Networking: Learning Python 3
Hubbard on Networking: The tools on my Ubuntu 18.04 laptop
Oracle Database Appliance (ODA) Installation, Configuration and Deployment Steps – Talip Hakan Ozturk's ORACLE BLOG
Web and Podcast – We are OSINTCurio.us
opatch lsinventory – Talip Hakan Ozturk's ORACLE BLOG
Top 10 Things to Do After Installing Kali Linux « Null Byte :: WonderHowTo
What’s new in ESXi 6.5 Storage Part I: UNMAP | Cody Hosterman
Hubbard on Networking: Enabling TLS 1.1/1.2 for RDP in Microsoft Server 2008R2/Windows 7 SP1
Setting the Standard for CVE - Lawfare
Cimpanu: The US Govt Accountability Office recommends the US adopt GDPR-like privacy legislation @ AskWoody
AWS Nitro System – Perspectives
Data Breaches: What Do the Numbers Mean?
Windows Firewall Post Exploitation with Netsh
Upgrading / Migrating from vSphere 5.x to 6.x (6.5 , 6.7) best practices & Approach – Siva Sankar Blogs
The Rise of the Corporate Technology Ecosystem (CTE) | Daniel Miessler
DLA_Briefing_Template_as_of_10252017 - C151_CyberSecurity.pdf
Brian Pippert
SSL/TLS: How to choose your cipher suite - AMIS Oracle and Java Blog
https://www.ryanfrantz.com/posts/when-does-an-investigation-end.html
https://www.ryanfrantz.com/posts/architecture-reviews.html
How to read fiction to build a startup | TechCrunch
How to build a WiFi picture frame with a Raspberry Pi | Opensource.com
DCOMrade - Powershell Script For Enumerating Vulnerable DCOM Applications - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
DCOMrade
Lacking Medical Device Security Puts Everyone at Risk - Security Boulevard
Introducing Zombie POODLE and GOLDENDOODLE
Do You Have Security Champions in Your Company? A 6-Step Checklist for a Successful Program
What is Security+ (Plus)? | TechRoots
Federal PKI Security Challenges: Extending IDaaS with Certificate as a Service - Security Boulevard
Beyond Tor: Examining the Uncharted Corners of the Dark Web - Security Boulevard
The Costs of Cyberattacks Are Real | Radware Blog
SSL/TLS Attacks, Part 3: Who’s at Risk from Compromised Digital Certificates? - Security Boulevard
Zero Day Initiative — The February 2019 Security Update Review
Windows Incident Response: Review: Tribe of Hackers
Germany makes its cyber capabilities available for NATO allianceSecurity Affairs
What, No Expense Account? My RSA 2019 Itinerary | Thom Langford
Getting started with Linux Containers on Windows Server 2019 - Ben Thomas' Blog
Update now! Microsoft and Adobe’s February 2019 Patch Tuesday is here – Naked Security
Network Segmentation in the Zero Trust Era | Security Architects Partners
Cyberinsurance and Acts of War - Schneier on Security
The Complicated Economy of Open Source Software
Step 5. Set up mobile device management: top 10 actions to secure your environment - Microsoft Secure
Kaboom - Automatic Pentest - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Inside a GandCrab targeted ransomware attack on a hospital – Naked Security
A comprehensive survey on graph neural networks | the morning paper
Poka Yoke in Manufacturing - The Automation Blog
Notes from OWASP Helsinki chapter meeting 36 – Rule of Tech
The 5 Most Important Typography Terms, Explained
.NET Framework February 2019 Security and Quality Rollup | .NET Blog
HIMSS19: The Cybersecurity Obstacles, Opportunities Ahead
Web Scraping Boilerplate: Everything You Need to Start Your New Python Scraping Project (Batteries Included)
NIST Risk Management Framework Webcast: A Flexible Methodology to Manage Information Security and Privacy Risk | NIST
How to improve your cyber resilience - IT Governance Blog
Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two - Delta Risk
What CEOs Need to Know About the Future of Cybersecurity
Toyota Prepping 'PASTA' for its GitHub Debut
PASTA (Portable Automotive Security Testbed with Adaptability)
Lessons Learned from a Hard-Hitting Security Review
Jaspreet Singh
Securing Clients SAP S4HANA Netweaver ABAP | Onapsis
Getting PowerShell Empire Past Windows Defender - Black Hills Information Security
Microsoft updates its schedule for SHA-2 ‘critical’ Win7 update, now due in March @ AskWoody
ESXi: Slow Disk Performance on HPE Gen8 | Windows OS Hub
AMP RJ-45 vs WE/SS (Regular) RJ-45 Plugs | Matt's Tech Pages
Blockchain and Trust - Schneier on Security
How To Migrate Shares and Files with ease by using Microsoft Storage Migration Service | ESX Virtualization
Top 10 Critical Skills Every vSphere System Administrator Should Know
ipmitool | panticz.de
Load Testing Web Servers with Siege Benchmarking Tool
Three stages of risk-based vulnerability management: Crawl, Walk, Run
OpenJDK projects you should know about - Panama
The Final Version of the EU's Copyright Directive Is the Worst One Yet | Electronic Frontier Foundation
Programming Management & Leadership Books | b3n.org
APM in a Digital World - Part 3 | APMdigest - Application Performance Management
Microsoft Patchday: Other Updates February 12, 2019 | Born's Tech and Windows World
APM in a Digital World - Part 2 | APMdigest - Application Performance Management
APM in a Digital World - Part 1 | APMdigest - Application Performance Management
19c – Laurent Schneider
Jaffar's (Mr RAC) Oracle blog: Oracle 19c and my favorite list
Installing and running Oracle Database 19.2.0.0 on Oracle Linux 7 - DBA - Rodrigo Jorge - Oracle Tips and Guides
It's now 2019, and your Windows DHCP server can be pwned by a packet, IE and Edge by a webpage, and so on • The Register
Performance Tuning Dojo » ADMIN Magazine
Cybersecurity Documentation: The Best Defense Is a Good Offense
The Business of Organised Cybercrime - Security Boulevard
Save and Invest | Investor.gov
Five Convergence Solutions to Help Manufacturing Cross the IT-OT Security Schism
Owning Your Legal Practice's Cybersecurity – MSPs and You
Enhancing cyber threat protection in Microsoft Office 365 - Security Boulevard
Why True End-To-End Encryption is Important for Distributed Apps - Security Boulevard
2019's Hottest, and Most Bankable, Security Certs - Security Boulevard %
Five Major Cloud Security Roadblocks and Their Impact on the Enterprise - Security Boulevard
Introduction to WiFi Security - Security Boulevard
Quickly Gauge Your Serverless Security Readiness With This Short Quiz
The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks - Security Boulevard
Microsoft Patch Tuesday updates for February 2019 fixes IE Zero-DaySecurity Affairs
Cloud, On-Premises, or Hybrid – What Is the Best HSM Solution for You? - Security Boulevard
“It is everyone’s business and responsibility” – 40+ Cybersecurity Professionals Share What They Wish Business Leaders Would Understand in Their Own Words - Security Boulevard
Kubernetes Security Best Practices: From Hosting to Deployment
Health Data Security: The Most Promising Technologies
Ron Mehring
Assessing IoT Risks in Healthcare Environments
Julia Hesse
Solving the TLS 1.0 Problem - Security documentation | Microsoft Docs
Devastating Cyberattack on Email Provider Destroys ...
Microsoft rolls out healthcare-focused chat features and AI assistants | FierceBiotech
HIPAA Enforcement Update: Areas of Focus - HealthcareInfoSecurity
Medical Device Cyber Risk: An Enterprise Problem
CynergisTek
Japan Security Analyst Conference 2019 -Part 1- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
HIMSS19 ~ Cyber Thoughts
Who’s Responsible for Your Cyber-Security?
How to Keep Your Kids Safe on the Internet (10 Actionable Tips)
No left boundary for Vulnerability Detection | Alexander V. Leonov
Use Group Policy To Manage Settings for Store Apps | Alexander's Blog
Unexpected Microphone and Camera Behavior in Windows 10 Settings | Alexander's Blog
Enterprise IT Moving More Workloads to Cloud in 2019 | APMdigest - Application Performance Management
Copying Large Files over an Unreliable Network Using BITS and PowerShell | Windows OS Hub
Integrating Windows Updates into Windows 10 Install Image | Windows OS Hub
Work Optional by Tanja Hester: An honest review
Using Azure Site Recovery for Migrations (Part 2) | PeteNetLive
Using Azure Site Recovery for Migrations | PeteNetLive
Remove unknown VM image from ESXi |
Chris's Wiki :: blog/unix/GrepDevNull
Microsoft analysis: 0-day vulnerabilities the biggest risk | Born's Tech and Windows World
Patchday: Updates for Windows 7/8.1/Server Feb. 12, 2019 | Born's Tech and Windows World
500px reveals 2018 breach that exposed user data
What's the right amount of swap space for a modern Linux system? | Opensource.com
Hacking an Oracle Database and How to Prevent It | Integrigy
oss-sec: CVE-2019-5736: runc container breakout (all versions)
SS7 Cellular Network Flaw Nobody Wants To Fix Now Being Exploited To Drain Bank Accounts | Techdirt
Gain Valuable Kubernetes Skills and Certification with Linux Foundation Training | Linux.com | The source for Linux information
Protecting the Logical Security of a Network Environment - InCyberDefense
Multiple Factors Are Driving Growth at the CNCF
One in six American adults now wear a computer on their wrist
Terence Luk: Using InstallSoftwareRemotely.ps1 to upgrade VMware Horizon View Agent
InstallSoftwareRemotely.ps1
Document: Executive Order on Artificial Intelligence - Lawfare
GDPR: Do your backups spark joy? | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Veterans can access their medical info through Apple's Health Records
Linked - New Research Reveals 6 Ways Leaders May Be Out of Touch With Their Employees
Lawyers and Cybersecurity in 2019: Trends and Tips - MyCase Blog
What Is Web Scraping? How to Collect Data From Websites
Service Fabric Customer Architecture: ZEISS Group – AzureCAT Guidance
SQL Mysteries: SQL Server Login Timeouts – A Debugging Story – SQL Server According to Bob
Five lessons we learnt about GDPR in 2018 - Security Boulevard
A Cybersecurity and Cloud Innovator – and a Great Partner - Security Boulevard
15 Hacker Types – The Good, the Bad and the Ugly
Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features - Security Boulevard
Ohio Senate Bill 220 Incentivizes Businesses to Maintain Higher Levels of Cybersecurity - Security Boulevard
The Perfect Sales Kickoff - Security Boulevard
How Panorays is Different Than Other Third-Party Risk Management Solutions - Security Boulevard
Panorays
The 3 Pillars of the Modern-Day SOC - Security Boulevard
Customers Blame Companies not Hackers for Data Breaches - Security Boulevard
Immunizing Your Healthcare Technology Against Cybersecurity Threats - Security Boulevard
Simplifying Cybersecurity Deployments with Automation - Security Boulevard
B 00 Doesnt It make You WannaCry Mitigating Ransomware on a Windows Network David Branscome - YouTube
The Cybersecurity Skills Gap: The Defining Skills Shortage of Our Age - Security Boulevard
Cloud security infographic: The Facts | Intercity Technology
How to Monitor File Changes across Windows Servers - Security Boulevard
Quick Hit: Speeding Up a Slow/Mundane Task with a Little Rcpp | rud.is
EdGuards - Security for Education
SSL Attacks, Part 2: Where Can Cybercriminals Access Digital Certificates? | Venafi
SSL Attacks, Part 1: Why Do Cybercriminals Abuse Digital Certificates? | Venafi
A Revolutionary Approach to HIPAA Compliance - Security Boulevard
HIMSS 2019 – Champions of Security Unite – Professionally Evil Insights
iOS 12.1.4 Patches Three Major Flaws | Avast - Security Boulevard
Whiskey | Daniel Miessler
To Understand IoT Security: Look to the Clouds - Security Boulevard
nDPI - Open Source Deep Packet Inspection Software Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Microsoft will make Office Pro Plus GDPR compliant | Born's Tech and Windows World
'Grandmother Hypothesis' May Help Explain Why Women Live Past Menopause : Goats and Soda : NPR
SQL Server Worker Thread Default Calculation – SQL Server According to Bob
7 Critical Job Application Mistakes to Avoid (Especially for New Graduates)
The Best Portable Apps That Require No Installation
Demystifying Stripe Width in vSAN — ThinkCharles.net
Tips for writing Vester test files, part 1 | Adventures in a Virtual World
OpenJDK projects you should know about: Valhalla
SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM.Security Affairs
Reverse RDP Attack - Rogue RDP Server can be used to hack RDP clientsSecurity Affairs
Data breaches, GDPR lead 54% of companies to increase IT security spending - TechRepublic
Business continuity in ISMS? - Security Art Work
InfoSec Handlers Diary Blog - Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving
InfoSec Handlers Diary Blog - UAC is not all that bad really
Spy Versus Spy: How a Researcher And a Journalist Unmasked an Undercover Agent - Motherboard
Michael on Security: March Updates on Frameworks & Standards
Ransomware Victims Who Pay Cough Up $6,733 (on Average)
Health Data Breach Tally: What’s New? - HealthcareInfoSecurity
Susan Lucci
Settlement Reached in Community Health Systems Breach Suit
HIMSS19: Cybersecurity in the Spotlight - HealthcareInfoSecurity
EHR Vendor Greenway Gets Hefty Fine for False Claims
Bolstering the Cybersecurity of Medical Devices
Chaitanya Srinivasamurthy
Cottage Health Hit With $3 Million HIPAA Settlement
Securities Fraud Claims Get Boost From EU Data Privacy Rules
Let’s talk about IoT device security | NIST
Wyoming Seeks to Repeal Hospital Privacy Regulation for HIPAA Clarity
Fnord - Pattern Extractor For Obfuscated Code - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Bincat - Binary Code Static Analyser, With IDA Integration - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Small and Medium Business Security Strategies: Part 5 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 4 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 3 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 2 - Black Hills Information Security
Small and Medium Business Security Strategies: Part 1 - Black Hills Information Security
Investigate Suspicious Account Behaviour Using SysmonSearch - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Introducing WMIOps - Christopher Truncer's Website
Make the Time to Fix Your Time Debt | Hackaday
DSHR's Blog: Cloud For Preservation
[career] Navigating Your Career | Don Jones®
Digital Transformation Efforts Hindered by Lack of Collaboration Between IT and Business | APMdigest - Application Performance Management
Essential System Tools: f3 - detect and fix counterfeit flash storage - LinuxLinks
Docker - Basics just for me | itsec.siers.ch
Reusing DHCP config in ISC dhcpd | Lesser-Evil
Kubernetes - Namespaces - The IT Hollow
Firing people is always a last resort. | The IT Skeptic
AD Controls [SHIFT]
Upgrade a Standalone ESXi Host to ESXi 6.7
Taking the Azure Data Box Gateway (preview) out for a spin! – Karim Vaes
30 Things to Get You Started - Black Hills Information Security
EyeWitness and Why It Rocks - Black Hills Information Security
DFIRTrack - The Incident Response Tracking Application - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
GitHub - FortyNorthSecurity/EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
Goscan - Interactive Network Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
RedELK - Easy Deployable Tool For Red Teams Used For Tracking And Alarming About Blue Team Activities As Well As Better Usability In Long Term Operations - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CANalyzat0r - Security Analysis Toolkit For Proprietary Car Protocols - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Volatility Workbench - A GUI For Volatility Memory Forensics - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Everything you need to know about DPOs under the GDPR - IT Governance Blog
Bypass Application Whitelisting using Weak Path Rule
The IT Governance Cyber Resilience Framework: how it works - IT Governance Blog
Transform your security posture with cyber resilience - IT Governance Blog
Google Online Security Blog: Open sourcing ClusterFuzz
New Zombie 'POODLE' Attack Bred From TLS Flaw
Mitigation upgrade to TLS v1.3
Australian Parliament Reports Cyberattack on Its Computer Network - The New York Times
Ransomware Attack Via MSP Locks Customers Out of ...
Cyber risk management: The disconnect between business, security teams | CSO Online
David A. Wheeler's Blog
Certifications Are About Support | The Networking Nerd
Cisco - Linux - Python: MainPage
Design for security [LWN.net]
Dstat - A Resourceful Tool to Monitor Linux Server Performance in Real-Time
Ansible and FreeIPA Part 2 | Adam Young’s Web Log
Ansible and FreeIPA Part-1 | Adam Young’s Web Log
Containers: The Basics - Linux Academy Blog
ZFS Boot Environments Are Helping To Improve The Resilience Of FreeBSD Upgrades - Phoronix
Remote Desktop Protocol Riddled With 16 Major Vulnerabilities
Microsoft and Open Source RDP Clients Are Vulnerable to System Takeover Attacks - WinBuzzer
Top Hex Editors for Linux
Disk Encryption for Low-End Hardware | Linux Journal
A Moment of Truth for Cyber Insurance - Lawfare
The Funniest Incident Postmortem | Gluster
A review of all the calendar options in SharePoint and Office 365 - SharePoint Maven
Successful Founders Share Their Advice for Starting Your Own Business
Asylo
7 Tips For Communicating With the Board
Report: Over 59,000 GDPR data breach notifications, but only 91 fines | CSO Online
Open Source LIDAR Lets You Get Down To The Nitty Gritty | Hackaday
NetLogo for scientific research: Modeling | Opensource.com
Ubiquiti Discovery Service Exposures Allowing DoS Attacks Explained
Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows
Your Money or Your Life - An Interview with Author Vicki Robin | Mad Fientist
Multiple Ways to Exploiting Windows PC using PowerShell Empire
New Vulnerabilities Make RDP Risks Far From Remote
Over 59K Data Breaches Reported in EU Under GDPR
How to Access the Dark Web Safely and Anonymously
Information Security | Daniel Miessler
Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features
GandCrab v5.1
How ADP identifies and reduces third-party risk | CSO Online
Hard days at work - SysAdmin1138 Expounds
Julia Reda – Article 13 is back on – and it got worse, not better
Self-charging pacemakers are powered by patients' heartbeats
‘Achieving and Maintaining Cyberspace Superiority’: A Cyber Command and Interagency Legal Conference - Lawfare
Password Reuse Remains a Barrier to Safer Internet Use, Google Reports
5 reasons why you need to embrace Microsoft Flow - SharePoint Maven
Costs for Windows 7 Extended Security Updates till 2023 | Born's Tech and Windows World
Windows 10: Microcode Updates February 2019 | Born's Tech and Windows World
Planning for the future isn't what it used to be | Opensource.com
UNIX: Building The Most Important OS in the World
The Mayo Clinic created an online tool for predicting kidney stones
Developing an Objective, Repeatable Scoring System for a Vulnerability Equities Process - Lawfare
Big-O Notation Explained | Daniel Miessler
Michael on Security: Security Maturity Models (Part 1 of 2)
Avoid these Common Security Misconfigurations - Security Boulevard
Building a Disk Tower, for all pain and no profit
BestDuplicator
Let's Play with Routing - Part 1
A New Switch for a New Day
Fwknop - Single Packet Authorization & Port Knocking - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
The Mega-Guide to Trends in 2019 – J.D. Meier's Blog
Parsing Text with PowerShell (3/3) | PowerShell Team Blog
oVirt: Open Source Virtualization for the datacenter – Marksei
What Is a VPN Connection and How Does It Work?
Now That’s What I Call Crypto: 10 Years of The Best of Bitcoin | Hackaday
Organize tool box drawers cheap - The Silicon Underground
How bad is MS08-067? - The Silicon Underground
MS08-067
Linux Fu: Easier File Watching | Hackaday
Hack Your File Hierarchy with Johnny Decimal System (Dewey’s Older Brother) | Hackaday
The elements of cybersecurity hygiene and secure networks - Part 3
CISOs must change their outlook or lose their jobs
“AaronLocker” moved to GitHub – Aaron Margosis' Non-Admin, App-Compat and Sysinternals WebLog
The case for building expertise to work on US AI policy, and how to do it - 80,000 Hours
Out-of-Office Messages are a Security Risk - The Lone Sysadmin
Monitoring Citrix - a vendor overview -
Configure SCCM Maintenance Windows based on Patch Tuesday
Automating my TV – Scott Gruby's Blog
Adding Energy Monitoring to Home Assistant – Scott Gruby's Blog
Hyper-V VM configuration version supported features - Thomas Maurer
Cool feature in SMS Trace (Trace32.exe) | 9to5IT
Thoughts on Azure, OMS & SCOM: Digging through log files? SMS Trace is the way to go!
WSUS Windows Update Error 0x80244010: Exceeded max server round trips | Windows OS Hub
0x80244010
Ubuntu 18.10 install notes | Nelson's log
Running Systems » Blog Archive » HA ZFS NFS Storage
Zero Day Initiative — Of ISOs and Attorneys: Legal Action in Vulnerability Disclosure
Windows Incident Response: RegRipper
Building a Cybersecurity Talent Pipeline One Coding Challenge at a Time | Webroot
Compliance Beyond IRS 1075 and CJIS Audits - Blog | Tenable®
IRS1075 CJIS
Cyber (GRU) (II): historical SIGINT - Security Art Work
Great reference list.
Aztarna - the open-source scanning tool for vulnerable robotsSecurity Affairs
Aztarna
Reading the ENISA Threat Landscape Report 2018Security Affairs
Can Enterprises execute a GRC Movement?Security Affairs
Step 4. Set conditional access policies: top 10 actions to secure your environment - Microsoft Secure
Debbie Seres
CISO series: Talking cybersecurity with the board of directors - Microsoft Secure
ADAPT - Tool That Performs Automated Penetration Testing For WebApps - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CIRTKit - Tools For The Computer Incident Response Team - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CIRTKit
Uncle Spufus - A Tool That Automates Mac Address Spoofing - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Pown Recon - A Powerful Target Reconnaissance Framework Powered By Graph Theory - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
LOLBAS - Living Off The Land Binaries And Scripts (LOLBins And LOLScripts) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
LOLBAS
List of data breaches and cyber attacks in January 2019 - 1,769,185,063 records leaked - IT Governance Blog
A 6-step guide to surviving data breaches - IT Governance Blog
Infosecurity.US - Web Log - OWASP Top Ten IoT 2018
OWASP: What Are the Top 10 Threats and Why Does It Matter?
Privacy: Several States Consider New Laws - HealthcareInfoSecurity
Inside Matrix and Emotet: How They Work, and How to Defend
New Medical Device Cybersecurity Framework Unveiled
Kevin McDonald
Government Spending on Cybersecurity: An Analysis
Alia Mendonsa
A CISO on the Value of Endpoint Detection and Response
Larry Whiteside
Jenkins Pentest Lab Setup
xDedic - Marketplace for Hacked RDP Credentials is Taken Down
Vulnerability Life Cycle and Vulnerability Disclosures | Alexander V. Leonov
What’s wrong with the Raspberry Pi – Own your bits
Installing and setting-up JAVA & JBoss 7 Final on CentOS 6 | RoseHosting
Hardening your HTTP response headers
How to Mitigate the Java Deserialization Vulnerability in JBoss Application Servers | Synopsys
The Bash Fingertips: Making Your Own 'Information Centre' | Tux Machines
Java servers like Jetty, GlassFish and Tomcat | NGINX
Using ngnix with WildFly - JBoss
5 Best Python Frameworks for WebView Testing | Codementor
Build a network emulator using Libvirt | Open-Source Routing and Network Simulation
How to Enable Android Enterprise and configure Personal devices with a Work Profile in Microsoft Intune – The ultimate Step-By-Step Guide
How to Use Docker Containers - Make Tech Easier
Cornelius' Blog: Governance on demand
FOSS Project Spotlight: Mender.io, an Open-Source Over-the-Air Software Update Manager for IoT Devices | Linux Journal
SSL and Weblogic - Remote PSAdmin
Product Lifecycle Management in the Medical Device Industry - White Paper - lifecycle-mgmt-medical-device-bwp-070013.pdf
UD_Cybersecurity-Healthcare-2018-conference-agenda.pdf
Open redirects - the vulnerability class no one but attackers cares about - Steve Tabernacle
Advisories | CERT NZ
GitHub - Vulnerator/Vulnerator: The official distribution of the vulnerability parsing utility.
Let’s Encrypt when your server is behind a firewall and you can’t use DNS Challenge – Diary of an Emacs tragic
Should There Be More School Policies on Teachers' Social Media Interaction With Students? - Law and Daily Life
Looking Ahead To 2019 | The Frog Pond of Technology
How long will Oracle Database 12.2 be supported?
Dissecting 190115 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
Azure Automation of A-to-Z, Part I – DBAKevlar
A Collection of Useful Resources for Web Designers and Programmers
Data Privacy Year | Linux Journal
Using EFI/UEFI firmware in a VMware Virtual Mac... |VMware Communities
Dump LAPS passwords with ldapsearch ·
Searching LDAP using Nmap’s ldap-search.nse script | Faded Lab
CA Spectrum Common Access Card Authentication Solution Guide - Spectrum_CAC_Authentication_Guide_ENU.pdf
DoD CAC Reader | Ubuntu, Derivatives and Linux Mint – CubicleNate's Techpad
Local Admin Access and Group Policy Don’t Mix - TrustedSec
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil …
Centrify Now Offers Free US Government PIV and Military CAC Support for the Mac | Secure Thinking by Centrify
CAC Card for DOD/Military : Fedora
The Risky Business of Cybersecurity
Connectivity Problems Caused by Issues in SQL Server – SQL Meditation
Up, up and to the Clouds: Cloud Computing 101 - Security Boulevard
Parsing Text with PowerShell (2/3) | PowerShell Team Blog
Parsing Text with PowerShell (1/3) | PowerShell Team Blog
Migrate a VM from vCenter to Azure | PeteNetLive
Programming paradigms for dummies: what every programmer should know | the morning paper
Top 30 Data Recovery Interview Questions and Answers for 2019
Demystifying the Indian Data Protection Bill, 2018: Part 2 of 3 - Gemalto blog
Demystifying the India Data Protection Bill, 2018: Part 1 of 3 - Gemalto blog
New Phobos Ransomware Using Same Ransom Note as Dharma - Security Boulevard
What Are Common Certificate Validation Flaws? - Security Boulevard
CVSS: Characterizing and Scoring Vulnerabilities - Security Boulevard
Benefits of SSH Key Management - Security Boulevard
Open Source Licenses Explained - Security Boulevard
The Evolution of Darknets - Security Boulevard
Healthcare: A Cloud Security Investigation (CSI) - Security Boulevard
CISO Intro by Jeremiah Grossman - Security Boulevard
“Cyber Smart” Interview with Bart McDonough - Security Boulevard
Continuous Monitoring 101
How To Install and Use RetroArch on Linux - LinuxConfig.org
Roles and Responsibilities of the Information Security Manager - Security Boulevard
Windows Registry & Osquery: The Easy Way to Ensure Users are Secured - Security Boulevard
Serverless And The Evolution In Cloud Security, How FaaS Differs From IaaS - Security Boulevard
SAP Security Notes 2018: Lessons Learned and a Look to What's Ahead in 2019 - Security Boulevard
FTW - Framework For Testing WAFs - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Build Cheat Sheets and Share Your Favourites! - Cheatography.com: Cheat Sheets For Every Occasion
10 YouTube URL Tricks You Should Know About
Howto: Docker, Databases, and Dashboards to Deal with Your Data | Hackaday
Container Jungle: where do I start? Docker, Kubernetes – Marksei
Ansible, ARA and MariaDB (or MySQL) – The ongoing struggle
Illinois biometric privacy law passes a key court test
VIRTIO 1.1 Standard Moving Closer To Release With GPU Device, Better Performance - Phoronix
DeployHappiness | Master of Science in IT: 1 Year, $5200
Benchmarking The Current Spectre + Meltdown Performance Overhead For 10 GbE Networking - Phoronix
Consumer threats down as cybercriminals target business
Poor integration costs businesses $500,000 a year
Chris's Wiki :: blog/linux/ServerRebootOnPanics
Getting Started with Kubernetes - The IT Hollow
Office 365 down (January 24, 2019)? | Born's Tech and Windows World
Planner Notifications for Teams – All About I.T.
Digital IDs said to boost economies, but privacy is at risk - Japan Today
Prudent Security Admin: Has a New Data Breach Precedent Been Created? - Security Boulevard
How to Become a Chief Information Security Officer — CyberSpeak Podcast - Security Boulevard
Study: Hospitals dramatically increase ad spend following data breaches - Security Boulevard
5 Ways a CISO Can Tackle the CyberSecurity Skills Shortage Now - Security Boulevard
1. Lower the Skill Level 2. Spread the Load For Your Security Professionals 3. Raise Awareness About Cyber Attacks 4. Increase Network Visibility 5. Plan for Tomorrow
NBlog - the NoticeBored blog: NBlog Jan 23 - infosec policies rarer than breaches
NBlog - the NoticeBored blog: NBlog Jan 25 - cyber risks in context
State agency exposes 3TB of data, including FBI info and remote logins – Naked Security
2 distinct campaigns delivered GandCrab ransomware and Ursnif TrojanSecurity Affairs
Collection #1 Data Breach Analysis – Part 2 - by Marco RamilliSecurity Affairs
“Collection #I” Data Breach Analysis – Part 1 – Marco Ramilli Web Corner
Jok3R - Network And Web Pentest Framework - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees - Microsoft Secure
Conpot - An Open Industrial Control Honeypot - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Beebug - A Tool For Checking Exploitability - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Fighting Emotet: lessons from the front line – Naked Security
The Application Security Team's Framework For Upgrading Legacy Applications
Sh00T - A Testing Environment for Manual Security Testers - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
What is an ISMS and 8 reasons why you should implement one - IT Governance Blog
The PCI SSC’s new software security standards – what you need to know - IT Governance Blog
PCI SSC
On the 'structural shortcomings' of the GDPR
Study: Companies with GDPR investments conduct business faster
Girl Scouts announce new cybersecurity patch
5 Malware Trends: Emotet Is Hot, Cryptominers Decline
Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics - The Ethical Hacker Network
Government Shutdown: Impact on Health Data Security, Privacy
Colorado police encrypt *all* their radio communications, frustrating journalists
Life Under GDPR: Data Breach Cost Unknown - HealthcareInfoSecurity
Dharma Gang Pushes Phobos Crypto-Locking Ransomware
Coveware's 2018 Q4 Ransomware Marketplace Report
Google Hit With $57 Million GDPR Fine in France
National Data Privacy Day Is Wishful Thinking
Center for Internet Security releases Microsoft 365 benchmarks | CSO Online
Looping sssd_nss - Blog dbi services
VMware Snapshots: Securing Windows RDP Connections with a Signed SSL Certificate
Landscaping a Secure/Closed Loop Infrastructure in Azure with Terraform & Azure Devops – Karim Vaes
New – TLS Termination for Network Load Balancers | AWS News Blog
Home - Freeplane - free mind mapping and knowledge management software
Top 11 Free Linux DICOM Viewers for Doctors
Understanding Bash fork() Bomb :(){ :|:& };: code - nixCraft
GandCrab ransomware and Ursnif virus spreading via MS Word macros
GandCrab
Debian GNU/Linux 9.7 "Stretch" Released with Patched APT Package Manager
Gulp - A Toolkit for Automating Painful Tasks in Development
Top 5 Vulnerability Scanning Tools – Linux Hint
Best 10 Free and Open Source Lab Management Systems
Get started with LogicalDOC, an open source document management system | Opensource.com
Beware! This Malicious Ransomware Hides As Free Games & Software
Forget No-Carb. Embrace Slow Carb : The Salt : NPR
Buddha Bowl - Make Your Own Bowl for any Phase - Chef Dawn Ludwig
KookBook 0.2.0 available – now manage your cooking recipes better – Blog :: Sune Vuorela
To upgrade or not to upgrade? That's the question! | The ORACLE-BASE Blog
Vulnerabilities Found in Highly Popular Firmware for WiFi Chips
New Android Malware Uses Motion Sensors To Stay Hidden
The 7 Habits of Highly Effective IT Leaders – J.D. Meier's Blog
Corporate Best Practices in Security Awareness and Training Programs
Dan Lohrmann
The Start of the RHCA Journey | Lisenet.com :: Linux | Security | Networking
Guinness World Records bets on Office 365 and AWS to boost business expansion
“It is the IT department’s job to make sure we can respond to the ever-growing changes within our business model, so we can take up new opportunities and move into new markets,” says Rob Howe, IT director at Guinness World Records.
How to inject custom drivers into an ESXi 4.1 image using vibddi?
An AnandTech Exclusive: The Jim Keller Interview
SC Cyber
8 Awesome InfoSec and Cybersecurity Blogs of 2018 -
GitHub - paralax/awesome-cybersecurity-internships: a list of cybersecurity internships
GitHub - jivoi/awesome-ml-for-cybersecurity: Machine Learning for Cyber Security
Greek Gluten Free Meatloaf Muffins | Healthy & Easy Freezer Meals
nVisium
xsstrike.tk
GitHub - s0md3v/XSStrike: Most advanced XSS detection suite.
GitHub - l0ss/Grouper: A PowerShell script for helping to find vulnerable settings in AD Group Policy.
GitHub - minimaxir/big-list-of-naughty-strings: The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Introducing Metta: Uber’s Open Source Tool for Adversarial Simulation
Xeneta | Ocean Freight Rate Benchmarking Platform
The State of AI for Sales Enablement, and the Evolution of the CRM | Emerj - Artificial Intelligence Research and Insight
How To - Use VMware vSphere PowerCLI to patch hosts | 9to5IT
How to Install latest ESXi VMware Patch - [Guide] | ESX Virtualization
How to Write a Business Case ― 4 Steps to a Perfect Business Case Template | Workfront
Security-related Rules
New cybersecurity guidelines for medical devices | Vantage Asia
How to Justify a Software Purchase — Step by Step
SupplyChainBrain - The world's most comprehensive supply chain management information resource.
Troubleshooting remote syslog reachability · Papertrail log management
GitHub - trimstray/test-your-sysadmin-skills: A collection of *nix Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
Solaris : How to start syslogd in debug mode – The Geek Diary
Topic: Cybersecurity - ABA Journal
How To Centralize Logs with Rsyslog, Logstash, and Elasticsearch on Ubuntu 14.04 | DigitalOcean
Centralised logging with Rsyslog and Microsoft Azure - Part 1
x265 transcoding | Nelson's log
So You Automated Your Coworkers Out of a Job
OSINT Resources for 2019 – Steve Micallef – Medium
A Review of my Bug Hunting Journey - My Learning Journey
HOWTO: Build a Temperature Alert System using a Raspberry Pi – Please Work
What version of SQL Server do I have? | Mohammed Wasay
List Domain Admins & Enterprise Admins in a domain | Mohammed Wasay
Get the list of domain admins and check if they are enabled. Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled 1 Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled Get the list of enterprise admins and check if they are enabled. Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled 1 Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
Create incremental OVA images using Packer
Peter Gutmann's Home Page
Peter Gutmann
Blue Team Architecture and Analysis - Part 3, Coverage Assessment Map by J Geno - tool, knowledge, procedures
Blue Team Architecture and Analysis - Part 2, Guide to the Part 1 Document by J Geno - engineering, management, data breaches
Blue Team Architecture and Analysis - Part 1 by J Geno - time, business, goals
PowerPoint Creating Conference Posters.pdf - Course_Book_Ppt_TIUD_Conference_Posters10.pdf
All of Windows Cipher Suites | Mohammed Wasay
Windows (10 & 2016) Build 1709 & 1803 cannot connect to SMB Shares | Mohammed Wasay
Oracle to charge for Java Updates & how you can disable them | Mohammed Wasay
Convert a Dynamic IP to Static | Mohammed Wasay
Expedition ML4SEC Part - 1: Introduction to machine learning for security professionals - payatu
Presentations: Billboard science : Naturejobs
Turning your BMC into a revolving door - zeronights_2018_turning_your_bmc_into_a_revolving_door.pdf
IoT Security – Part 4 (Bluetooth Low Energy - 101) - payatu
IoT Security – Part 3 (101 - IoT Top Ten Vulnerabilities) - payatu
Blog Archives - Page 3 of 4 - payatu
IoT Security – Part 2 (101 - IoT Attack surface) - payatu
IoT Security – Part 1 (101 - IoT Introduction and Architecture) - payatu
RedTeaming from Zero to One - Part 2 - payatu
RedTeaming from Zero to One - Part 1 - payatu
Don’t Become a Ransomware Target
Using Packer to Automate vSphere Template Builds
Exploiting JNDI Injections in Java | Veracode blog
vCloudNotes : Information Sharing: How to capture memory dump of a VM from snapshot or suspended state file
Trusted Ransomware Removal And Data Recovery Experts
Security Checklist
North Korean hackers infiltrate Chile's ATM network after Skype job interview | ZDNet
vCloudNotes : Information Sharing: Intel / AMD processor vulnerability: Meltdown-Spectre and VMware Esxi
vCloudNotes : Information Sharing: How to reset iLO login password from within ESXi Shell
Installing the Home Lab – Installing vCenter 5.5 on Windows 2012R2 – Everything-Virtual
vCloudNotes : Information Sharing: How to Check, Start, Stop or Restart Windows version of vCenter 6.x Services
HxD - Freeware Hex Editor and Disk Editor | mh-nexus
Check with Powershell for Meltdown and Spectre #exploit critical vulnerabilities Protection #Meltdown #Spectre #KB4056892 | Robert Smit MVP Blog
DevopsWiki/README.md at master · Leo-G/DevopsWiki · GitHub
GitHub - ANSSI-FR/audit-radius: A RADIUS authentication server audit tool
How to choose the correct Garbage Collector? Java Generational Heap and Garbage Collection explained - Karunsubramanian.com
What you didn't know about java.lang.OutOfMemory Error! - Karunsubramanian.com
Why is there a discrepancy between Windows Task manager Memory and Java Heap ? - Karunsubramanian.com
Building vSphere Templates From Scratch Using Packer and the vSphere API – Green Reed Technology
Windows 10 and reserved storage | Storage at Microsoft
History · bibanon/bibanon Wiki · GitHub
A huge list of Windows log file Event IDs for detecting lateral movement by S. Delano - development, python, script
Detecting Lateral Movement through Tracking Event Logs
Raspberrypi as poor man's hardware hacking tool - payatu
Linux Security Hardening with OpenSCAP and Ansible – clasohm.com
Splunk vs ELK - Karunsubramanian.com
What is Docker? An absolute beginner's guide - Karunsubramanian.com
Unable to Connect RDP: CredSSP Encryption Oracle Remediation | Windows OS Hub
What is SYN_SENT socket status? - Karunsubramanian.com
Windows XP Can’t RDP to Windows 10 / Server 2012R2/2016 RDS | Windows OS Hub
Get Reverse-shell via Windows one-liner
“Collection #1” Data Breach Analysis – Part 1 - Security AffairsSecurity Affairs
How running websites has changed in the last two decades (for an Ars IT guru) | Ars Technica
Fecebook Could Be Slapped With 'Record-Setting' Fine By FTC
7 Common Email Security Protocols Explained
Facebook violated tough new cybersecurity law, says Vietnam – Naked Security
DevOps and Culture, part 2 – Premier Developer
DevOps and Culture, part 1 – Premier Developer
UPnP, Vulnerability As A Feature That Just Won’t Die | Hackaday
Serious Security: What 2000 years of cryptography can teach us – Naked Security
Serverless computing: one step forward, two steps back | the morning paper
The AI cybersecurity impact for IoT - Microsoft Secure
Nine 2019 Cybersecurity PredictionsSecurity Affairs
6 Reasons We Need to Boost Cybersecurity Focus in 2019Security Affairs
​4 ways to prepare for GDPR and similar privacy regulations - TechRepublic
Chris's Wiki :: blog/linux/ZFSLicenseTwoViews
Chris's Wiki :: blog/linux/CPUNumbersNotContiguous
NFS. Not… Dead… Yet… - krypted.com
Julia Reda – Designing the future of cybersecurity in Europe
The challenges of adopting a consistent cybersecurity framework in the insurance industry - Microsoft Secure
Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges - Microsoft Secure
RHEL 6 server receiving error mounting CIFS (Windows) share – mount error(112): Host is down | setaOffice
Running Home Assistant in a Docker container with a Z-Wave USB stick · major.io
All In with Home Assistant – Scott Gruby's Blog
2019 Cloud Predictions - Part 3 | APMdigest - Application Performance Management
2019 Cloud Predictions - Part 2 | APMdigest - Application Performance Management
2019 Cloud Predictions - Part 1 | APMdigest - Application Performance Management
Virtual Machines do not boot after moving from Windows Server 2012 R2 to Windows Server 2019 - American Boffin
Security in Windows Server 2019 - Security Art Work
Data Security is a Global Economic Imperative - Blog | Tenable®
Sitadel - Web Application Security Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Snyk - CLI And Build-Time Tool To Find & Fix Known Vulnerabilities In Open-Source Dependencies - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Snyk
Shed - .NET Runtime Inspector - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Faraday v3.5 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
dnSpy - .NET Debugger And Assembly Editor - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Estimating SOC BudgetRafeeq Rehman – Personal Blog
Robert Penz Blog » Howto install Bitwarden in a LXC container (e.g. Proxmox)
The Evil-Twin Framework: A tool for improving WiFi security | Opensource.com
Behind the Scenes & Under the Carpet – The CenturyLink Network that Powered AWS re:Invent 2018 | AWS News Blog
Learn Windows PowerShell in a Month of Lunches, Third Edition #BookReview #Powershell #PowerCLI #Scripting #vExpert -
Terence Luk: Citrix NetScaler CLI command cheat sheet
Emotet Malware Returns to Work After Holiday Break
Triton/Trisis Attack Was More Widespread Than ...
'We Want IoT Security Regulation,' Say 95% of IT ...
The Rx for HIPAA Compliance in the Cloud
PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
2018's Most Common Vulnerabilities Include Issues ...
EU copyright laws face uncertain fate after 11 countries reject proposal
Oracle 19c Released : How does that make you feel? | The ORACLE-BASE Blog
GDPR Compliance and the Oracle E-Business Suite Revisited | Integrigy
Winds of change? Winds of mediocrity.
Vulnerabilities in building access system used by schools, governments | CSO Online
Summary: The Dichotomy of Leadership | Daniel Miessler
Kubernetes: List of ports Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
iPhone 11 Plus Wi-Fi 6 Equals Undefined? | The Networking Nerd
iTWire - Cyber security threats will keep getting worse in 2019: claim
Home Automation I | Zamir's Board
CNC milling with open source software | Opensource.com
Kubernetes security: 4 tips to manage risks | The Enterprisers Project
Kali Linux 2018 for testing and maintaining Windows security - Wolf Halton and Bo Weaver [Interview] | Packt Hub
How to Setup DRBD to Replicate Storage on Two CentOS 7 Servers
Oracle Patches 284 Vulnerabilities in January Critical Patch Update
AdoptOpenJDK - Open source, prebuilt OpenJDK binaries
Thank You, John C. Bogle — My Money Blog
Collection 1 data breach covers more than 772 million email addresses
Cloud Computing TECHREPORT - 2018 ABA Survey Results | DennisKennedy.Blog
Introduction to Ubuntu's LXD Containers - Make Tech Easier
Chart: Stock Market Declines Are More Common Than You Think — My Money Blog
Ryuk ransomware banks $3.7 million in five months
Is GDPR Compliance Tougher Than HIPAA Compliance?
Lessons From Report on Massive Singapore Healthcare Hack
Government Shutdown: Experts Fear Deep Cybersecurity Impact
Tom Kellermann
Patch Tuesday, January 2019 Edition — Krebs on Security
Ransomware Attacks: The Data Integrity Issues
The 2019 Health Data Privacy Regulatory Outlook
Cyber resilience and the GDPR - IT Governance Blog
ITIL 4: What you need to know about the 2019 ITIL update - IT Governance Blog
2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2) 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2)
SMB Penetration Testing (Port 445)
Windows Applocker Policy - A Beginner’s Guide
How To Change E1000 into VMXNET3 without changing a MAC address | ESX Virtualization
From Encrypting the Web to Encrypting the Net: A Technical Deep Dive on Using Certbot to Secure your Mailserver | Electronic Frontier Foundation
OpenMediaVault – Good Times With mdadm | PenguinPunk.net
January 2019 patchday issues | Born's Tech and Windows World
Humana Breaches Reflect Chronic Credential Theft in ...
Who Takes Responsibility for Cyberattacks in the Cloud?
What’s wrong with patch-based Vulnerability Management checks? | Alexander V. Leonov
Blowing the Dust off of an IBM AS/400 Server | Hackaday
Resolving Microsoft SQL Server Error 4064 with PowerShell – Mike F Robbins
The Biggest Storage Trends of 2019 | Architecting IT
What Makes IoT A Security Risk? | The Networking Nerd
Configuring TACACS+ Server on Ubuntu 14.04LTS – Keeran's Blog
CLOS Topology
Firewall Ruleset Automation with CI Pipeline « ipSpace.net blog
How to configure Windows 10 in Kiosk Single App, full-screen mode
Just one more esxi-guy: The D.C.L.I. (Datacenter CLI)
Stanford uploads 111 lectures by Donald Knuth. – Virtually Fun
Taking a look at AutoDeploy in vSphere 6.5
Tiger - The Unix Security Audit and Intrusion Detection Tool
Tiger - The UNIX Security audit and intrusion detection tool
How to Set Up a Local DNS Resolver on Ubuntu 18.04, 16.04 with BIND9 - LinuxBabe
Am I financially independent? (And does it matter?)
CVE Vulnerabilities: All You Ever Wanted to Know About
Top Ways to Get ROI From Your AppSec Program - Security Boulevard
Kubernetes: Master Post Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
Top 5 things SMBs should consider when evaluating a cybersecurity strategy | Webroot
All About the Hotspot Honeypots - Security Boulevard
How to data breaches happen - Security Boulevard
Sometimes A Vulnerability Isn’t So Vulnerable
pfSense VLANs on Proxmox - Linux Included
SSHGuard settings on pfSense - Linux Included
Healthcare Continues to Be Prime Target for Cyber Attacks
SlackPirate - The Slack Enumeration and Extraction Tool - emtunc's Blog
Using Ansible to bring up a three node Patroni cluster in minutes - Blog dbi services
GitHub - danluu/post-mortems: A collection of postmortems. Sorry for the delay in merging PRs!
Reading postmortems
Verizon FiOS – ICMP Traceroute Issues
Too much disk IO on sda in RAID10 setup | blog.windfluechter.net
How to be More Productive by Using the “Eisenhower Box”
GDPR Myth #1: Fine of 4% of global turnover for your first GDPR offence | VinciWorks Blog
Senators Demand Voting Machine Vendor Explain Why It Dismisses Researchers Prodding Its Devices
Displaying IP Info on Console with Netplan – Fixing IT
Julia Reda – In January, the EU starts running Bug Bounties on Free and Open Source Software
TheHive Project – Open Source, Free and Scalable Cyber Threat Intelligence & Security Incident Response Solutions
Tesla Model 3 known good accessories | TinkerTry IT @ Home
PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Tesla Model 3 replacing my 13 year old Honda Civic Hybrid, let's see how that goes. So far, so good! | TinkerTry IT @ Home
7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions - Data Security Blog | Thales eSecurity
Docker Security Tips & Best Practices – Threat Stack
Healthcare IT Continues to Struggle with Backup Strategies - Security Boulevard
9 Benefits of ISO 27001 Certification (Some You Know, Some You Probably Don’t) | Pivot Point Security
Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack — Krebs on Security
MISP - Malware Information Sharing Platform and Threat Sharing - The Open Source Threat Intelligence Platform
The Docker Bench For Security - A Script That Checks For Dozens Of Common Best-Practices Around Deploying Docker Containers In Production - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
XSRFProbe - The Prime Cross Site Request Forgery Audit And Exploitation Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
The 4 stages of cyber resilience - IT Governance Blog
The End (of 2018) Is Near: Looking Back for Optimism
New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
New cybersecurity rules take effect in South Carolina
Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients - HICP-Main-508.pdf
Analyzing the Portuguese DPA's first GDPR fine
Marriott Provides Update on Starwood Database Security Incident
25 Years Later: Looking Back at the First Great ...
2018 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
Do not look for Cheap Black Friday Deal​ Testing - EvilTester.com
The Difference Between Security and Privacy | Daniel Miessler
Major US newspapers crippled by Ryuk ransomware attack | CSO Online
Japan seeks cyberattacks to be in scope of security treaty with U.S. - Japan Today
Why Automation Matters : Consistent Test Environments | The ORACLE-BASE Blog
Easy PXE boot testing with only HTTP using iPXE and libvirt
10 ways to use OneNote for Project Management - SharePoint Maven
Extend the evaluation period of Windows Server 2012/2016 and 2019 - ivobeerens.nl
Recognizing Vendor Risks to National Security in the CFIUS Process - Lawfare
How the Boston Children’s Hospital Is Innovating on Top of an Open Cloud
7 Nginx Rewrite Rule Examples with Reg-Ex and Flags
The Developer Coefficient
Yammer Seen Counts for Conversations – All About I.T.
The two most important ways to defend against security threats | CSO Online
Introduction to Cryptography Basic Principles
weblogic - how to change listen port from default 7001 to something different? - Stack Overflow
How to change the default port of weblogic (7001) (BEA/Weblogic forum at Coderanch)
10 Google Docs Tips That Take Seconds and Save You Time
Launching Rational Cybersecurity for the Business | Security Architects Partners Dan Blum
Erman Arslan's Oracle Blog: RDBMS -- TLS 1.2 support and issues ORA-29263: HTTP protocol error & ORA-29024: Certificate validation failure
Erman Arslan's Oracle Blog: Oracle Seminar -- Oracle Technologies and Oracle Products + Oracle Job roles
Erman Arslan's Oracle Blog: Exadata -- Exadata X3 reimaging problem -- biosbootorder
Erman Arslan's Oracle Blog: Weblogic -- Performance problem - Forms & Reports environment -- Unable to load performance pack / libmuxer.so
Change the Listen Port for Weblogic AdminServer #Oracle #IDM #Identity - TUMY | TECH
Erman Arslan's Oracle Blog: Weblogic -- HACMP Configuration, IP Address Change
The Finnish Hyperion Guy: Tidy Up WebLogic Server After EPM System Installation
Vulnerability Management Part 1 I Pivot Point Security
Yes: Your Law Firm Needs to Do a Business Impact Analysis | Pivot Point Security
WebLogic AdminServer Port Conflict Remote Running on PC
Java mon amour: Installing JIRA
Java mon amour: Jboss CLI, change individual attributes of a security domain without having to remove and add the domain from scratch
Java mon amour: java showSettings
Default Port Numbers You Need to Know as an Administrator
Why Tenable/NESSUS requires full level 15 access for Cisco devices? Don’t need it.
Security/TLS Configurations - MozillaWiki
Security/Server Side TLS - MozillaWiki
Transport Layer Protection Cheat Sheet - OWASP
Oracle – Got minus one from a read call – How to tackle? | {"code":"java"}
Come Across: Presenting : Explore and Implement SharePoint Security: Permissions, Identities, and Objects @ NCS SharePoint CoP Group
Security Update Guide
CyGraph: Cybersecurity Situational Awareness That’s More Scalable, Flexible & Comprehensive - Neo4j Graph Database Platform
TDS Endpoints: SQL Server's "Listener" | ColleenMorrow.com
Private Investigator - Stillinger investigations
How a U.S. Health Care System Uses 15-Minute Huddles to Keep 23 Hospitals Aligned
Automotive Cybersecurity
CDRH’s Medical Device Safety Action Plan – An Aspirational Blueprint for Addressing Medical Device Safety | Health Law | STAT
Thora A. Johnson
Active Directory® 101 - JumpCloud
How to check if your processor supports Virtualization Technology on Ubuntu
Chris's Wiki :: blog/linux/ZFSFileserverSameness
Malwarebytes IT Security Predictions 2019 | Born's Tech and Windows World
Serverless OpenLDAP™ - Security Boulevard
The Best of Shape Security 2018 - Security Boulevard
OPTPOLINES - Formerly Relpolines, Lower Overhead To Retpolines For Spectre Mitigation - Phoronix
Local stratum-1 NTP server
Ubiquiti Unifi setup
Touchless health monitoring module works with Raspberry Pi
Home - ROI-NJ
MacOS Security Baseline Script – JerryGamblin.com
Favorite Security Books Of 2018 – JerryGamblin.com
Welcome to ServerlessSecurity.org! | ServerlessSecurity.org
Host Websites On Github – JerryGamblin.com
SQL Server 2014 Service Pack 3 is now Available!!! | SQL Server Release Services
Adam Shostack's personal homepage
The Hard Truth About G2A, Kinguin and Grey Market Keys – Locke's Journey
Understanding the unique Israeli concept of Rosh Gadol (ראש גדול)-updated | Allon Shevat
News – Joel on Software
GitHub - cybermaggedon/cyberprobe: Capturing, analysing and responding to cyber attacks
What Are Cipher Suites? - Security Boulevard
Jacek Kowalczyk / my-debian · GitLab
Looking Back at the Top Cyber-Securities Issues of 2018
Cyber and Technology Resilience: Themes from cross-sector survey 2017 - 2018 - technology-cyber-resilience-questionnaire-cross-sector-report.pdf
The Life of Kenneth: FCIX - State of the Exchange
On Thinking About Infrastructure as Code - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Hilbert’s list | Seth's Blog
1. High efficiency, sustainable method for growing sufficient food, including market-shifting replacements for animals as food 2. High efficiency, renewable energy sources and useful batteries (cost, weight, efficiency) 3. Effective approaches to human trafficking 4. Carbon sequestration at scale 5. Breakthrough form for democracy in a digital age 6. Scalable, profitable, sustainable methods for small-scale creators of intellectual property 7. Replacement for the University 8. Useful methods for enhancing, scaling or replacing primary education, particularly literacy 9. Beneficial man/machine interface (post Xerox Parc) 10. Cost efficient housing at scale 11. Useful response to urban congestion 12. Gene therapies for obesity, cancer and chronic degenerative diseases 13. Dramatic leaps of AI interactions with humans 14. Alternatives to paid labor for most humans 15. Successful interactions with intelligent species off Earth 16. Self-cloning of organs for replacement 17. Cultural and nation-state conflict resolution and de-escalation 18. Dramatically new artistic methods for expression 19. Useful enhancements to intellect and mind for individuals 20. Shift in approach to end-of-life suffering and solutions for pain 21. Enhanced peer-to-peer communication technologies approaching the feeling of telepathy 22. Transmutation of matter to different elements and structures 23. Off-planet outposts It’s going to get interesting. Especially if we can imagine it.
Cybersecurity and Insurance | Hackaday
Patch Lady – vendors start to shut the doors on Windows 7 @ AskWoody
Find Windows 10 Upgrade Blockers with PowerShell – smsagent
FYI: End of Support for Windows 7, SQL-Server 2008 and more | Born's Tech and Windows World
Effective Mental Models for Code and Systems – Cindy Sridharan – Medium
The Art of Vacuum Tube Fabrication | Hackaday
configuring_ssl_for_oracle_client_with_cac_using_mcs_3.pdf
GitHub - pmdba/plsql-pii-scanner: An example of a method for scanning the Oracle data dictionary for potential PII data and automating specific responses, such as encrypting of columns or alerting the DBA, when new data is found.
Finding And Fixing Node.js Memory Leaks: A Practical Guide | eknori.de
Firejail - Securely Run Untrusted Applications in Linux
I Hunt Sys Admins - The Intercept
How China’s Elite APT10 Hackers Stole the World’s Secrets | WIRED
How To Organize Your Income And Expenses
How VMware Certifications changed my life -
Getting started with chaos engineering | Opensource.com
Chris's Wiki :: blog/linux/ZFSFileserverSetupIII
Creating a useful spec | Seth's Blog
NASA Astronomer Nancy Grace Roman, 'Mother' Of Hubble Space Telescope, Is Dead : NPR
PostgreSQL-Diagnostic-Queries – DB-Tune
Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers - Latest Hacking News
EU offers bounties to help find security flaws in open source tools
Malware stalls delivery of LA Times and other major US newspapers
Linux ip Command Examples - nixCraft
Azure in the Government of Canada - Eric’s Azure Blog
Penetration Testing on Group Policy Preferences
From Encrypting the Web to Encrypting the Net: 2018 Year in Review | Electronic Frontier Foundation
Side-Channel Vulnerability Variants 3a and 4 - Spectre and Meltdown - blackMORE Ops
Building a PowerShell Process Memory Tool • The Lonely Administrator
How to add network driver to Windows 10 PE | Marco Franssen
Put your ssh experience in Windows on Steroids | Marco Franssen
DSHR's Blog: Securing The Hardware Supply Chain
Top 5 Cybersecurity Priorities for 2019: Ponemon Study - Blog | Tenable®
Healthcare Data Breaches Associated with 64% Increase in Advertising Expenditures - Security Boulevard
Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018
Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018 - Security Boulevard
Healthcare Cybersecurity in 2019: The Time is Now - Security Boulevard
Top 20 Most Popular Hacking Tools in 2018 - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Improving DNS logging, dnstap on Ubuntu - Koen Van Impe - vanimpe.eu
Data Sanitization 5.3 release | OPSWAT
The Year of the GDPR: 2018’s Most Famous Privacy Regulation in Review | Electronic Frontier Foundation
Blog Exploits on the Rise | Onapsis
Selenium IDE Tactical or Strategic? - Evil Tester - Technical Testing with Skill, Attitude and Pragmatism
Looking Back: 2018 Project Report Card - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
An Internet Outage Could Kick In WannaCry Ransomware Again
The elements of cybersecurity hygiene and secure networks -- Part 2
The elements of cybersecurity hygiene and secure networks -- Part 1
Cuckoo – Sandboxed Malware Analysis – ls /blog
Chris's Wiki :: blog/sysadmin/MetricsAndUnderstandingMore
The Best Maker YouTube Channels | Cool Tools
Intel 5500 chipset heatsink tuning
Smokeping – network latency monitor with Raspberry Pi – Alexander's Blog
Context: Your Super-Weapon in Vulnerability Management? - Security Boulevard
Industrial Control Systems Healthcheck | Mandiant | FireEye
PCI Pal and Verizon White Paper Examines PCI Security Compliance in Contact Centre Environments - Security Boulevard
Apache Struts Vulnerabilities vs Spring Vulnerabilities — One of these popular open source projects might be riskier than the other - Security Boulevard
Defense in Depth: 4 Essential Layers of ICS Security
AWS Lambda Security Quick-Start Guide
Secure & Compliant Payment Solutions for Contact Centres | PCI Pal
OWASP Top 10 Security Risks – Part II - Security Boulevard
Software Monitoring for NERC CIP Compliance: Part 1
Continuous Monitoring : Academic Paper - Security Boulevard
OWASP Top 10 Vulnerabilities List — You’re Probably Using It Wrong
A Brief Introduction to the OpenVAS Vulnerability Scanner
Tis the Season to Check your SSL/TLS Cipher List Thrice (RCurl/curl/openssl) - Security Boulevard
Cybersecurity is Increasingly Important for M&A Dealmakers - Security Boulevard
PIPEDA & MDR: Breaches, Reporting and Advice
Shared responsibility model: Who owns cloud security? - Security Boulevard
RACI matrix in ISO 27001 implementation – How to use it?
Negative Impact of Incorrect CSP Implementations - Security Boulevard
Future Crimes by Marc Goodman (Book Summary) - Security Boulevard
37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says - Security Boulevard
PIPEDA Best Practices Achieved with MDR - Part 2 - Security Boulevard
PIPEDA Best Practices Achieved with MDR - Security Boulevard
Achieve CIS Compliance in Cloud, Container and DevOps Environments
FreeRADIUS for MSPs - Security Boulevard
Ten Ways Your Healthcare Org May Be Violating HIPAA - Security Boulevard
36 Best Business Books that Changed Microsoft Leaders’ Lives – J.D. Meier's Blog
How I Became A Believer In Consuming IT Security As A Service - Security Boulevard
5 lessons public wi-fi can teach us about cybersecurity - Security Boulevard
Apache Struts Vulnerabilities Burden Us With a ‘Stay or Go’ Deliberation - Security Boulevard
A Little Guide to SMB Enumeration
NHS is still assessing the cost of WannaCry one year laterSecurity Affairs
CompTIA A+ Renewal Process - Security Boulevard
Security Vulnerability in Internet-Connected Construction Cranes - Schneier on Security
How to Enable HTTP/2 in Nginx
Spectre mitigation guts Linux 4.20 performance – Naked Security
InfoSec Handlers Diary Blog - Restricting PowerShell Capabilities with NetSh
Pedagogic-cybersecurity-framework.pdf
6 years of Raspberry Pi in video | Opensource.com
stoQ - An Open Source Framework For Enterprise Level Automated Analysis - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
6 Ways to Anger Attackers on Your Network
Reddit helps admin solve mystery of rogue Raspberry Pi – Naked Security
Why a Helium Leak Disabled Every iPhone in a Medical Facility - Motherboard
ꓘamerka — Build interactive map of cameras from Shodan
Here's How Easy It Is to Make Your Own IMSI-Catcher
Libvirt Fencing on a Physical KVM Host | Lisenet.com :: Linux | Security | Networking
Yubico Security Key Review (The complete edition)
SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Understanding the 7 different types of data breaches - Security Boulevard
Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge - Security Boulevard
Star WannaCry victim NHS to ban fax machines by 2020 - Security Boulevard
New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
Notes on Build Hardening - Security Boulevard
5 Key Components Every Company Should Have in Their Privacy Policy - Security Boulevard
The Top 5 Third-Party Cyber Gaps of 2018 - Security Boulevard
Ahead of the Curve: University Incident Response Plans and Communications - Security Boulevard
OWASP 'ServerlessGoat': A Vulnerable Demo Serverless Application - Security Boulevard
The Year Ahead: Cybersecurity Trends To Look Out for In 2019 - Security Boulevard
What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3? - Security Boulevard
Why TLS 1.3 is a Huge Improvement - Security Boulevard
Strategic Ways to Add Value to Your IT Consulting Business
Beyond Scanning: Don’t Let AppSec Ignorance Become Negligence - Security Boulevard
GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019 - Security Boulevard
Want Your R&D Team to Rock? 7 Tips to Help Your Developers Perform Like a Supergroup - Security Boulevard
Top 30 Supervisory Control and Data Acquisition (SCADA) Technician Interview Questions and Answers for 2019 - Security Boulevard
3 Reasons Osquery Should Be On Every Incident Responders Christmas List - Security Boulevard
Healthcare Cybersecurity in Intensive Care - Security Boulevard
Flaws and Vulnerabilities and Exploits – Oh My! - Security Boulevard
5 tips to secure your supply chain from cyberattacks - TechRepublic
We Asked 105 Experts What Worries Them Most About the Future - Motherboard
testssl.sh - Testing TLS/SSL Encryption Anywhere On Any Port - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
XSStrike v3.0 - Most Advanced XSS Detection Suite - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Lynis 2.7.0 - Security Auditing Tool for Unix/Linux Systems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CAINE 10.0 - GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
CRS - OWASP ModSecurity Core Rule Set - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
The 4 phases of a business continuity plan - IT Governance Blog
List of data breaches and cyber attacks in November 2018 - 251,286,753 records leaked - IT Governance Blog
How to create a business continuity plan – with free template - IT Governance Blog
How to build a cyber incident response team - IT Governance Blog
7 of the most common cyber attacks you need to prepare for - IT Governance Blog
Your checklist for responding to and reporting data breaches - IT Governance Blog
10 things you must do to become cyber secure - IT Governance Blog
Your DPO questions answered in an interview with information security experts - IT Governance Blog
Phishing, Ransomware Attacks Continue to Menace Healthcare
Why NIST is so popular in Japan
7 CI/CD tools for sysadmins | Opensource.com
Australia's new 'decryption' law and its effect on tech companies worldwide
HOWTO: Calculate Elapsed Business Hours Using PowerShell – Please Work
Network UPS Tools | Calvin Bui
VMware vSphere Security - Getting Started Hands-on Lab
People First – The Frequently Overlooked Importance of Culture Change in DevOps Journeys – Premier Developer
Colorado Embraces New IT Security Philosophy
Zero Trust part 1: Identity and access management - Microsoft Secure
StarWind rPerf free tool • Nolabnoparty
HTTP vs HTTPS – lakkireddymadhu
How protected are you against cyber-attacks? – lakkireddymadhu
All major browsers drop TLS 1.0 and 1.1 in 2020 – lakkireddymadhu
How To Set Up Nginx with HTTP/2 Support on Ubuntu 16.04 | DigitalOcean
HTTP/2 – lakkireddymadhu
World Computer Security Day – lakkireddymadhu
How to Find Hidden & Saved Passwords in Windows 10 – lakkireddymadhu
How to Be Invisible Online (Without Going off the Grid) – lakkireddymadhu
Visibility vs Results | The ORACLE-BASE Blog
10 Cybersecurity Myths – lakkireddymadhu
Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition) – David Vassallo's Blog
Find email addresses in seconds • Hunter (Email Hunter)
HTTP/3 – lakkireddymadhu
HHS Deputy Secretary Eric Hargan Describes Cyber Initiative
Analysis: Did Anthem’s Security ‘Certification’ Have Value?
Health Data Breach Tally: Analyzing the Latest Trends
Getting Started with Desired State Configuration Resources for VMware - VMware PowerCLI Blog - VMware Blogs
Medical Devices: The Long Road to Security - HealthcareInfoSecurity
5 – 15s DNS lookups on Kubernetes? – Quentin
Marriott: Data on 500 Million Guests Stolen in 4-Year Breach — Krebs on Security
Installing metasploitable with vagrant
What the Marriott Breach Says About Security — Krebs on Security
HHS Seeks Feedback on Potential HIPAA Changes
Incident Response: Why a Tabletop Exercise Is Essential
SlithIR · trailofbits/slither Wiki · GitHub
Slither – a Solidity static analysis framework | Trail of Bits Blog
Cybersecurity Trends to Watch Out for in 2019 | Webroot
Windows Incident Response: Veteran Skillz
GDPR Compliance: The Role of Vendor Risk Management
Does HIPAA Need to Be ‘Modernized’? - HealthcareInfoSecurity
What is a VMware VIB file?
How to Patch vCenter Server Appliance (VCSA) - [Guide] | ESX Virtualization
I just setup WireGuard, and I’ll never go back to OpenVPN | Logan Marchione
Windows Incident Response: Basic Skillz, pt II
Windows Incident Response: Basic Skillz
Though 2018 Will Likely Not Surpass 2017 Numbers – Still Significant Year For Breach Activity
On Pace To Break 20k Mark For Disclosed Vulnerabilities
Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
Visualise Event Logs to Identify Compromised Accounts - LogonTracer - - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
What Is the OBD-II Port and What Is It Used For?
5 Cybersecurity Predictions for 2019
Cyber Security Lessons from Abroad – Australia’s Essential Eight
Addressing the CISO’s Key Challenges in 2018 and Beyond with Endpoint Detection and Response
Multiple Ways To Exploiting HTTP Authentication
ODA : Free up space on local filesystems - Blog dbi services
2018 in cybersecurity: Regrets, we have a few
How To Install OpenLDAP Server for Centralized Authentication
Listen to the radio at the Linux terminal | Opensource.com
Web Proxy Penetration Lab Setup Testing using Squid
Hack the Box: Jerry Walkthrough
Comprehensive Guide on Dirbuster Tool
HTTP Banner Grabbing Beyond The Root - DigiNinja
Nessus Through SOCKS Through Meterpreter - DigiNinja
Blog, Integrating GNS3 and VirtualBox - DigiNinja
Wifi Honey - DigiNinja
Multiple Ways to Exploit Tomcat Manager
Thanos: long-term storage for your Prometheus Metrics on OpenShift – Red Hat OpenShift Blog
FAIRCON Showcases Quantitative Risk Analysis on the Cusp of Adoption | Security Architects Partners
How to Establish a Security Culture | Security Architects Partners
Securezoo Articles
Routes-apply.sh - Safely apply routes and revert on error | Sebastian Neef - 0day.work
Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough
Here are the most common cyber security threats that occur in the healthcare sector
2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 1)
7 Ways an Old Tool Still Teaches New Lessons About ...
9 Traits of A Strong Infosec Resume
7 Free (or Cheap) Ways to Increase Your ...
6 Python and containers videos worth watching | Opensource.com
Patching the vCenter Server Appliance (VCSA) using the REST API
Dream of augmented humans endures, despite skeptics - Japan Today
How To Install IIS In Windows Server 2019 - RootUsers
How To Enable Remote Desktop In Windows Server 2019 - RootUsers
U.S. GAO - Information Security: Significant Progress Made, but CDC Needs to Take Further Action to Resolve Control Deficiencies and Improve Its Program
DSHR's Blog: Securing The Software Supply Chain
U.S. GAO - Federal Building Security: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control
U.S. GAO - Information Security: Agencies Need to Improve Implementation of Federal Approach to Securing Systems and Protecting against Intrusions
SQL Server Linux: fsync and Buffered I/O – SQL Server According to Bob
SQL Server On Linux: Forced Unit Access (Fua) Internals – SQL Server According to Bob
How to become an AWS expert | AWS News Blog
Serverless and startups, the beginning of a beautiful friendship | AWS News Blog
ESXi 6.5.0 fails to boot with Error loading /a.b00 – Virtually Sober
How to Enable TLS 1.3 in Nginx
Security operations activities to watch in 2019 | CSO Online
The Difference Between a Penetration Test and a Red Team Engagement | Daniel Miessler
Automating a DevOps-Friendly Security Policy
A Container Hacker’s Guide to Living Off of the Land – Professionally Evil Insights
Measuring container security [LWN.net]
Security Considerations for Container Runtimes - RHD Blog
Deploying SQL Server on K8s with Helm charts
Virtual Patching or Good Security Design instead?
A checklist for overcoming life and career setbacks - 80,000 Hours
A year's worth of education for under a dollar and other 'best buys' in development, from the UK aid agency's Chief Economist - 80,000 Hours
Response: A Chief Security Concern for Executive Teams - EtherealMind
Zen of Routing Protocols « ipSpace.net blog
Red Hat Global Customer Tech Outlook 2019: Automation, cloud, & security lead funding priorities
A Chief Security Concern for Executive Teams — Krebs on Security
5 Dedicated Server Security Vulnerabilities and How to Troubleshoot Them – ThisHosting.Rocks
HardenedBSD 12 Released With Jailed Bhyve, Disables SMT By Default - Phoronix
Closing the Global Cyber Enforcement Gap - Lawfare
NASA discloses October security breach
The US ballistic missile system is a cybersecurity nightmare
Errata Security: Masscan as a lesson in TCP/IP
Scalable Log Collection as Foundation of SOCRafeeq Rehman – Personal Blog
New Report Highlights Biggest Risks to Endpoint Security
2018's Most Active Ransomware: The Ongoing Evolution of GandCrab
Errata Security: Some notes about HTTP/3
Some of My Favorite Shell Aliases From Over the Years | Daniel Miessler
bus.gif (GIF Image, 450 × 300 pixels)
Microsoft Teams Licensing Guide |
DSCR for VMware and you! - LucD notes
MPECS Inc. Blog: OS Guide: Slipstream Updates Using DISM and OSCDImg *Updated
2019 Application Performance Management Predictions - Part 3 | APMdigest - Application Performance Management
2019 Application Performance Management Predictions - Part 2 | APMdigest - Application Performance Management
2019 Application Performance Management Predictions - Part 1 | APMdigest - Application Performance Management
AWS Security Hub - The IT Hollow
Troubleshooting Query timeouts in SQL Server – Don Castelino
How to stress and measure the Garbage Collector – Calvin Hsia's WebLog
Azure Database for PostgreSQL performance Quick Tips – Azure SQL Database Support
Announcing .NET Framework 4.8 Early Access build 3673 | .NET Blog
LUIS: Notes from the Field of Natural Language Processing – Actual Intelligence
Release: SQL Server Migration Assistant (SSMA) v7.11 – Microsoft Data Migration Blog
How to Encrypt SQL communication on the wire – The dot before the Net
Ten Immutable Laws Of Security (Version 2.0) – Roger's Security Blog
Dubious security vulnerability: A program that adds a user to the Administrators group in the usual way – The Old New Thing
The AI Journey | Steve "Guggs" Guggenheimer's Blog
Enforcing TLS 1.2 use with Azure Service Bus – Service Bus
Azure Data Architecture Guide – Blog #6: Business intelligence – AzureCAT Guidance
Azure Data Architecture Guide – Blog #5: Clickstream analysis – AzureCAT Guidance
Azure Data Architecture Guide – Blog #4: Hybrid data architecture – AzureCAT Guidance
Azure Data Architecture Guide – Blog #3: Advanced analytics and deep learning – AzureCAT Guidance
Azure Data Architecture Guide – Blog #2: On-demand big data analytics – AzureCAT Guidance
Azure Data Architecture Guide – Blog #1: Introduction – AzureCAT Guidance
DSC Resource Kit Release November 2018 | PowerShell Team Blog
Is there a marketing person leading the IT team? – Blog FiascoBlog Fiasco
Windows Server 2019 and Containers – Azure Development Community
Azure DevTest Labs: CIS Windows Server 2016 Benchmark L2 available in your lab – Azure DevTest Labs Team Blog
Meetup replay: Women Leading Government Cybersecurity – Microsoft Azure Government
Exclusions antivirus pour IIS / Antivirus exclusions for IIS – Laurent VAN ACKER's Blog : IIS, PowerShell, ASP.Net …
Free Azure Subscription–no credit card needed | Wriju's BLOG
Clean up after yourself Docker, your mom isn’t here! – Freddys Blog
Ultimate: The Ultimate Image Browser.
Remote Use of Local Accounts: LAPS Changes Everything – Microsoft Security Guidance blog
The Most Important Thinking Habit Nobody Taught You
InfoSec | Daniel Miessler
2018: The rise of Cryptominers | CyberWatch
10 top security enhancements in Windows Server 2019 | CSO Online
An Epidemic of Healthcare Breaches | CyberWatch
A Bevy of Botnets | CyberWatch
2018.11.06.VA.HIMSS.Staynings - 2018.11.06.VA.HIMSS.Staynings.pdf
7 unexpected ways GDPR and other privacy regulations make security harder | CSO Online
Dark web websites: 10 things you should know | CSO Online
9 cyber security predictions for 2019 | CSO Online
How to set up a successful digital forensics program | CSO Online
The state of ICS and IIoT security in 2019 | CSO Online
Experience an RDP attack? It’s your fault, not Microsoft’s | CSO Online
A Layered Approach to Cybersecurity: People, Processes, and Technology | CSO Online
Who is responsible for IoT security in healthcare? | CSO Online
12.07.18-Cybersecurity-Strategy-Report.pdf
Finally, a meaningful congressional report on stemming cybersecurity attacks | CSO Online
Response: Australian Encryption Laws Explained - EtherealMind
Secure Your Computer by Modifying the Default RDP Port Number | Alexander's Blog
System Requirements for Microsoft Exchange Server 2019 | Alexander's Blog
The Endless Cycle of ERP Security | Onapsis
Blog Cybersecurity for SAP Customers | Onapsis
Python Backup Cleaner Script | Calvin Bui
Errata Security: Notes on Build Hardening
Adding NVMe to Server | blog.windfluechter.net
Global Entry Program - Ultimate 2018 Guide [Map of Locations & Kiosks]
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 6 - Loading the example HR Schema - mwpreston.net
Creating Colorful HTML Disk Reports with PowerShell • The Lonely Administrator
Feature Releases are the Future and They Require CI, CD and Feature Flags - via @codeship | via @codeship
Free Online Learning at GCFGlobal
Weak passwords banned in California from 2020 - BBC News
People do not quit companies, managers, or leaders – they quit organizational cultures. Here’s why. | Christie Lindor :: Management Consultant :: Blogger :: Author
How to install Redis on a Raspberry Pi using Docker | thisDaveJ
180+ Benchmarks On Debian GNU/Linux 9.6 Against Debian Buster Testing - Phoronix
Where are the Linchpin jobs? | Seth's Blog
Electronics 101.1: Electricity basics - Raspberry Pi
Back Issues & books - The MagPi MagazineThe MagPi Magazine
American Fascism 2– Is the United States Fascist? – Michael O. Church
American Fascism 1– What Is Fascism, and How Did It Get Here? – Michael O. Church
13 Legal Online Sources to Download Free Christmas Music
How to Solve Blue Screen Errors Using WinDbg and BlueScreenView
What Is Wi-Fi 6 and Do You Need a New Router?
James Gosling's Surprise Announcement at Devoxx: Amazon Corretto
Is the new Java release cycle an improvement?
The BNC Connector and How It Got That Way | Hackaday
Hack My House: Opening Raspberry Pi to the Internet, but Not the Whole World | Hackaday
Hack My House: ZoneMinder’s Keeping an Eye on the Place | Hackaday
Hack My House: Running Raspberry Pi Without an SD Card | Hackaday
DeployHappiness | Don’t Fail to Plan – Create or Update Your DR Plan Now!
Repurpose Optical Drive With RPi : 6 Steps (with Pictures)
Daphne Oram and the Birth of Electronic Music | Hackaday
Building Your Own Virtual Lab « ipSpace.net blog
Liveblog: Hardening Kubernetes Setups - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Research: The Guidelines On Cyber Security Onboard Ships - EtherealMind
Windows 10 Sends Your Activity History to Microsoft, Even if You Tell It Not To
How to plan your smart home - and weigh privacy risks - Japan Today
The Permanent Gift Guide 2018 – Buy Stuff That Lasts Forever — My Money Blog
Maria Butina: Cybersecurity charlatan, spy
Maria Butina
5 things you won't learn from The Open Organization Leaders Manual
Transparent Data Encryption - Certificate in master database: is it really a good practice? - Blog dbi services
Real-Time Incident Response and Forensics Capabilities Debut in Twistlock 2.5
How To Benchmark Linux Commands And Programs From Commandline
McFly - A Replacement To 'Ctrl+R' Bash History Search Feature
Essential System Tools: Timeshift - Reliable system restore tool for Linux - LinuxLinks
Litigating Data Sovereignty - Lawfare
Fixed vs. Growth: The Two Basic Mindsets That Shape Our Lives - Brain Pickings - Pocket
How to install VeraCrypt on Kali Linux - LinuxConfig.org
5 Ways To Check Laptop Battery Status And Level From Linux Terminal | 2daygeek.com
Testing Your Code with Python's pytest, Part II | Linux Journal
50 years ago, 'the mother of all demos' foretold our tech future
Which matters more for building wealth: your saving rate or your investment returns?
U.S. GAO - Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities
Migrating SQL Server Reporting Services (SSRS) | Tallan's Blog
The Life of Kenneth: Inspiration for Date Nights
Ransomware at the Library: Time to Boost Your Cybersecurity » Public Libraries Online
Lotus Bloody Notes/Domino Sold - EtherealMind
How to Build an Automated Culture in Your Company
DSHR's Blog: John Wharton RIP
Project PITA: Build a Mini Mass Deauther Using Bettercap and a Raspberry Pi Zero W
Z-Wave : Lessons Learned – Python OpenZwave – David Vassallo's Blog
Creating the next generation of cybersecurity leaders
Open Source Security and License Management | WhiteSource
The Five Ways of Devops | The IT Skeptic
ML engineering for AI safety & robustness: a Google Brain engineer's guide to entering the field - 80,000 Hours
Retrofitting Apps for Cloud Storage with Zero Code Changes - mtlynch.io
Cloud Vampires - Thomas LaRock
MPECS Inc. Blog: New PowerShell Guides and DISM Slipstream Process Updated
Non-secure network connections in Carnival Cruise’s app – Scott Gruby's Blog
My macOS Mojave / Proxmox setup – Nicholas Sherlock
Proxmox storage tips/HDD pass through – it's notes
Troubleshooting CyberPower PowerPanel issues in Linux · major.io
SQL SERVER – Unable to Start SQL When Service Account is Removed From Local Administrators Group. Why? – it's notes
Using DISM to Create a Repeatable IIS Installation - Devops Blog
Wireshark Week - Troubleshooting Performance in the Cloud (by Paul Offord)
Keeping Your House In Order (by Tony Fortunato)
Installing Second Domain Controller using Ansible | geekdudes
Install first domain controller (AD Forest) using Ansible | geekdudes
Instaling Ansible on CentOS 7 and adding Windows node | geekdudes
Installing Chocolatey server using Ansible | geekdudes
Microsoft Security Compliance Toolkit 1.0 available | Born's Tech and Windows World
Microsoft has updated the Meltdown/Spectre information page | Born's Tech and Windows World
Chris's Wiki :: blog/linux/DiskIOStatsIII
Cyber attack from russion ‘Snake’ group on German und US government agency and military | Born's Tech and Windows World
Harden Windows networks with AD option against NotPetya | Born's Tech and Windows World
New SplitSpectre-Attack; Windows Retpoline Spectre Mitigation | Born's Tech and Windows World
AWS re:Invent 2018: Enterprise Governance: Build Your AWS Landing Zone - ENT351 - WoodITWork.com
AWS re:Invent 2018: Werner Vogels Keynote Thoughts - WoodITWork.com
German District Hospital: IT systems grounded by a virus | Born's Tech and Windows World
Pure Storage - Seeding the NVMe Market | Architecting IT
vSphere 6.7 Update 1 Upgrade - VirtuallyInclined.com
vSAN Encryption Mind Map – Data at rest – Elastic Sky
VMware Network Port Diagram v6.x
How to open the firewall port for SQL Server on Windows Server 2008 – Cloud & Virtualization Complete Guide Donations Are Welcome Please Send money to this below bank account. Account Name – Sheik Ahmed SM Bank name – hdfc Account No – 50100110300427 IFSC Code – HDFC0000004 Chennai India
netboot.xyz :: netboot.xyz
Why BSD/OS is the best candidate for being the only tested legally open UNIX. – Virtually Fun
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 5 - Connecting to Oracle Databases with SQL Developer - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 4 - Creating Databases - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 3 - Installing Oracle Database 12C Software - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 2 - Oracle Database Prerequisites - mwpreston.net
Setting up an Oracle 12c R2 Lab for the Administration Certified Associate Certification - Part 1 - Oracle Linux Install - mwpreston.net
KVM networking: a simple way to manage port forwards and configuration - SUSE Communities
New – Automatic Cost Optimization for Amazon S3 via Intelligent Tiering | AWS News Blog
Firecracker – Lightweight Virtualization for Serverless Computing | AWS News Blog
IBM selling Lotus Notes/Domino business to HCL for $1.8B | TechCrunch
New – Amazon FSx for Windows File Server – Fast, Fully Managed, and Secure | AWS News Blog
AWS Cloud Map: Easily create and maintain custom maps of your applications | AWS News Blog
New – AWS Well-Architected Tool – Review Workloads Against Best Practices | AWS News Blog
25 Log Files That Will Transform Your vSphere Troubleshooting
About Configuration Drift, Pester and Vester | Adventures in a Virtual World
Why flat SharePoint Site Architecture makes total sense - SharePoint Maven
Why Automation Matters : Keep Your Auditors Happy | The ORACLE-BASE Blog
Autonomous Database : "Hand-tuning doesn't scale" | The ORACLE-BASE Blog
Even ACEs Make Mistakes : You never forget the first time you drop the production database! | The ORACLE-BASE Blog
Why Automation Matters : Technical Debt | The ORACLE-BASE Blog
Why Automation Matters : The Series | The ORACLE-BASE Blog
Why Automation Matters : Continuous Improvement and Buying Time For Yourself | The ORACLE-BASE Blog
Why Automation Matters : Can't the cloud do it for you? | The ORACLE-BASE Blog
Why Automation Matters : Unplanned Work and Death of Productivity! | The ORACLE-BASE Blog
Why Release Update Revisions (RUR) are tricky - and why RUs are better
All of the Tuning Features in SQL Developer (2018) | ThatJeffSmith
PeopleSoft Top 10 Security Risks | Integrigy
How to fix OUI-10022 error on an ODA - Blog dbi services
OUI-10022
opatch investigations | Frits Hoogland Weblog
opatch versions | Frits Hoogland Weblog
Oracle Open World 2018 D1: Larry Ellison keynote Cloud Gen2 - Blog dbi services
Oracle OpenWorld 2018: Day 3 - Blog dbi services
HHS OIG Launches Cybersecurity Webpage to Raise Awareness and Boost Cybersecurity Best Practices - Lexology
HHS OIG explains that it currently uses a three-pronged approach to safeguard data and the systems on which its data is stored: IT security controls, risk management, and resiliency
House Energy and Commerce Committee unveils cyber plan - POLITICO
Deploy DC/OS using Ansible (Part 2) - Playbooks - Blog dbi services
Deploy DC/OS using Ansible (Part 1) - Getting Started - Blog dbi services
Happy Birthday Notes and Domino ... and now for something completely different
Cybersecurity | Featured Topics | Reports & Publications | Office of Inspector General | U.S. Department of Health and Human Services
5 Ways to Check Available Memory in Ubuntu
Adobe FlashPlayer Emergency Group Policy | >_
The internet war on sex is here
Canada and France will explore AI ethics with an international panel
Reimaging an old X3-2/X4-2 ODA - Blog dbi services
Recovering from failed patch on virtualized ODA - Blog dbi services
5 mistakes you should avoid with Oracle Database Appliance - Blog dbi services
Patching a virtualized ODA to patch 12.2.1.4.0 - Blog dbi services
ODA and CIS / GDPR features - Blog dbi services
Oooooops or how to undelete a file on an ext4 filesystem - Blog dbi services
Red Hat’s David Egts: Agencies Should Screen Open Source Code for Cyber Risks | ExecutiveBiz
10 books to make you a stronger leader | The Enterprisers Project
Blueprint for a team with a DevOps mindset | Opensource.com
Home - OpenChain
2018-12: LXD, SSH Foo | KWLUG - Kitchener-Waterloo Linux User Group
IT Security Lessons from the Marriott Data Breach
Red Hat’s Enterprise Linux 7.5 Earns FIPS 140-2 Certification Renewal; Paul Smith Quoted – GovCon Wire
Teaching Cybersecurity Law and Policy: My Revised 62-Page Syllabus/Primer - Lawfare
Robert Chesney
Avoiding A World War Web: The Paris Call for Trust and Security in Cyberspace - Lawfare
Geoeconomics: the Chinese Strategy of Technological Advancement and Cybersecurity - Lawfare
AT&T is the first major US carrier to support eSIM on iPhone
Debugging MSSQL Connections from Ububtu | Connor Johnson
The perfect gift is cheap and easy ~ Get Rich Slowly
South Carolina: A Road Map For Tax Reform | Tax Foundation
Agile and Scrum Training: Gain Skill in Agile and Scrum Methodologies
Dependent Care FSA: Save on Daycare, Preschool, Summer Camps, After-School, and Elder Care — My Money Blog
DOAG 2018: OVM or KVM on ODA? - Blog dbi services
AWS re:invent 2018 – Day 3 - Blog dbi services
AWS re:Invent 2018 – Latest Announcements – Part II – Ather Beg’s Useful Thoughts
AWS re:Invent 2018 – Latest Announcements – Part I – Ather Beg’s Useful Thoughts
The Magic of the CCIE | The Networking Nerd
Dmitri Popov / momo · GitLab
Analyzing and reducing SystemTap's startup cost for scripts - RHD Blog
How to Set Up SSH Two Factor Authentication on Ubuntu 18.04, 18.10 Server
A Simple Way to Map Out Your Career Ambitions
Podman: A more secure way to run containers | Opensource.com
How to involve others in your professional goal setting | Opensource.com
Cacher - A Code Snippet Organizer for Pro Developers
Zim - a desktop wiki
Serverless Roadmap: Hosted and Installable Platforms - The New Stack
What 9 Cybersecurity Research Reports Show About the State of Risk
OpenBSD on a Laptop
Email Security & Privacy – Python Tips
How to Set up a Firewall for Redis using ufw | thisDaveJ
Get AD Schema Attribute Names | Alan's Blog
The Anniversary of the Monroe Doctrine - Lawfare
How to Access a Remote Server Using a Jump Host
Flush Wall-Mounted Raspberry Pi Touchscreen: 8 Steps (with Pictures)
Technology Radar | Emerging Tech Trends for 2018 | ThoughtWorks
Getting a list of all sites served by IIS > 40Fingers Websolutions
The Definitive T430 Modding Guide – George Kushnir (http://n4ru.it) – Medium
Latest Software Maintenance Script: Making WSUS Suck Slightly Less – Dam Good Admin
Huygens’ Ruler – Drawing Interference Patterns | Tinkerings
The Tax Benefits of Forming an S Corporation | Mad Fientist
Essential System Tools: Neofetch - System Information Tool written in Bash - LinuxLinks
Pandas Read CSV Tutorial
Neopythonic: What to do with your computer science career
Continuous Integration with Python: An Introduction – Real Python
Kubernetes for Python Developers: Part 1 | Celery how-tos and tutorials
Cybersecurity Threats Keep Evolving, Research Shows
Arch-Audit : A Tool To Check Vulnerable Packages In Arch Linux | 2daygeek.com
Everything You Need to Know about Containers, Part III: Orchestration with Kubernetes | Linux Journal
Google Faces GDPR Violation Complaints For Location Tracking
How to test your network with PerfSONAR | Opensource.com
A federal privacy draft bill could arrive in early 2019
US charges Iranian hackers over $30 million ransomware spree
Financial Freedom Is About Resilience to Outside Shocks — My Money Blog
Amazon’s next healthcare move is software that can mine medical records
Uber fined £385,000 in the UK for 2016 cyber-attack
Why Everyone Should Have Their Own Business (and How to Guarantee Success) | Mad Fientist
Why you should care about RISC-V - RHD Blog
The Morris Worm Turns 30
Home Assistant
Oracle Exploring DTrace With eBPF - Phoronix
How I uncovered my inner geek | Opensource.com
“That’s the open source way!” The Red Hat Sydney Forum Keynote - IT Brief Australia
DoS Vulnerabilities Found in Linux Kernel, Unpatched
Potentially disastrous Rowhammer bitflips can bypass ECC protections | Ars Technica
ECCploit
Vulnerability Mapping with Kali Linux
How to future-proof your IT job in the age of AI | The Enterprisers Project
Gaining eBPF vision: A new way to trace Linux filesystem disk requests
Pioneers in Open Source--Eren Niazi, Part II: the Untold Story | Linux Journal
Eren Niazi
Software Deployment Models - SFlanders
Installing & using Python virtualenv - OzNetNerd
From Physical To Virtual To Containers - SFlanders
VCDX – Defending a Bad Idea – vcdx133.com
VCDX – Levels and Focus – vcdx133.com
vSphere 6.7 Update Manager Tip #1 - VirtuallyInclined.com
Running VMware ESX Server 2.5 – Virtually Fun
My Markdown Journey – Network Inferno
Permissions and Vagrant VMware Utility – Network Inferno
Traffic Light Protocol alike Security Reference Architecture for Azure – Karim Vaes
Using Ansible to Run Powershell Scripts
Using Vagrant to Deploy an Ubuntu Server running KVM
Installing Host VIB's Using PowerCLI
Using Powershell to Create Windows SMB Shares
L1 Terminal Fault (L1TF) Patching Considerations
What's New in vSphere Virtual Hardware Version 14
Coming Soon – Snowball Edge with More Compute Power and a GPU | AWS News Blog
Reformat an Isilon node and try again! - FastStorage
How to expand a LUN on VNX using the CLI - 50mu - about storage
HOWTO: Force (really) WSUS Clients to Check in on Demand – Please Work
vuLnDAP - DigiNinja
SC - Threat Vulnerability Management Policy
Episode 115 - Discussion with Brian Hajost from SteelCloud
What are U.S. DoD 8140, 8570 and 8570.01-M and What Do They Mean for Your Career?
briantist (Brian Scholer) · GitHub
Install an SSL Certificate on a Ubiquiti EdgeMAX EdgeRouter
List installed Windows Updates using WMIC – Pario TechnoBlob
SIGHTINGS
SCCM Client Logs for Software Update Troubleshooting « The Tech L33T
Windows Server 2008 R2 Core: Introducing SCONFIG. | Virtualization Blog
SCCM 2012 R2: Where is the SMSTS.log located?
Top 10 Secure Coding Practices - CERT Secure Coding - Confluence
OSINT Tool Comparison Table - Google Sheets
Top 10 Web Hacking Techniques of 2017 | Blog
SYN Shop | 1075 American Pacific, Suite C, Henderson, NV 89074 | Monday - Friday 6pm - 10pm | Saturday 3pm - 10pm
PowerPoint Presentation - 76_1.pdf
Microsoft Word - MDIC CybersecurityReport.docx - MDIC-CybersecurityReport.pdf
PowerPoint Presentation - nist-cyber-security.pdf
Managing Medical Device Cybersecurity Vulnerabilities - HIMSS18_Managing-Medical-Device-Cybersecurity-Vulnerabilities.pdf
How to disable obsolete SSH cipher/ MAC algorithms - Airheads Community
The Shadowserver Foundation: NTP Version (Mode 6) Scanning Project
How to Make Lasagna-Stuffed Spaghetti Squash - Best Lasagna-Stuffed Spaghetti Squash -WomansDay.com
Behind the scenes with Linux containers | Opensource.com
My Experience Upgrading vCenter to 5.5 Update 3b – The Lowercase w
Unblock your downloaded files with a right-click and PowerShell - Syst & Deploy
Disk I/O | Performance Tuning on Linux
TeXConf 2018 – the meeting of the Japanese TeX Users – There and back again
PCI Compliance – Your First Three Steps to Compliance
Project Jupyter | Home
Flash HP 649281-B21 656089-001 to Mellanox Firmware | ServeTheHome and ServeThe.Biz Forums
GitHub - bbbrumley/portsmash
ERC Grant received by Billy Brumley – Warmest congratulations! | TUT Pervasive Computing Blog
Digital DASH – ICTC - Focus on Information Technology (FIT)
Configuration Manager 2012 Client Command List
Install 11g RAC on Linux -- PreInstallation tasks
SCCM Updates and Powershell - PerlStalker’s SysAdmin Notes
Run Notepad as Administrator to Avoid Access is Denied
Install and Configure Squid3 Caching Proxy on Debian Wheezy | LuvUnix
GS1 UK | Product identifiers
GS1 identification keys - Standards | GS1
Top 10 reasons why your Enterprise Java Application is slow - Karunsubramanian.com
Beat the Auditors, Be One Step Ahead with PowerShell – Hey, Scripting Guy! Blog
Ultimate Library of ICS Cyber Security Resources - SCADAhacker
OpenVAS | Eikonal Blog
Georgia Agencies Covered by Cyber Insurance | Annual State IT Report
toolswatch (NJ. Ouchn) · GitHub
Passwords & Yubikey
ISM - Information Security Manual - Australian Cyber Security Centre (ACSC)
SecPod SCAP Repo, a repository of SCAP Content (CVE, CCE, CPE, CWE, OVAL and XCCDF)
SetUserFTA: UserChoice Hash defeated – Set File Type Associations per User or Group on Windows 8/10 and 2012/2016/2019 – the kolbicz blog
Firmware Security – Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Thoughts On The NTIA Software Component Transparency Meeting
Cybersecurity and Healthcare – Controls, Plans, and Board Preparation - YouTube
Cybersecurity and Healthcare – Trends, Challenges, and Evolving Threats - YouTube
(115) Cybersecurity and Healthcare – Terminologies, Breaches, and Threats - YouTube
On Cross-Site Scripting and Content Security Policy
quentinhardy (bobsecq) · GitHub
eDEX-UI: A Fully Functioning Sci-Fi Computer Interface Inspired By TRON Legacy - Linux Uprising Blog
eDEX-UI
Deploying a Honeypot on AWS – Steve Gathof – Medium
Introduction to T-Pot - The all in one honeypot
Communities of practice - The_Open_Source_Way
Communities of Practice (Lave and Wenger) - Learning Theories
Introduction to communities of practice | Wenger-Trayner
CHAP12HOADLEY.pdf
Errata Security: Masscan as a lesson in TCP/IP
The Illustrated TLS 1.3 Connection: Every Byte Explained
Security Database
GitHub - BrianWGray/nexpose: generic scripts for managing nexpose
shouldersofinfosec [licensed for non-commercial use only] / The Shoulders of InfoSec Project
Groups - MITRE ATT&CK™
Incident Management
1 - Incident_Management Document - Version 1.pdf
Incident Management and Response
Telecom incident management controls by COBIT 5
Identity 3.0 - Principles - Identity_3.0_Principles_v1.1.pdf
Jericho Forum - Wikipedia
How to Download and Install RHEL8 Beta For Free (Red Hat Enterprise Linux)
The SEC and Cybersecurity Regulation - Lawfare
Four Short Links - O'Reilly Media
Ευάγγελος Μπαλάσκας - Cloud-init with CentOS 7 » Evaggelos Balaskas - System Engineer
Strange interstellar object 'Oumuamua is tiny and very reflective
'Oumuamua
15 Best Security Tools You Should Have on Linux
Sam Altman - Startup Investor School Day Notes - NevBlog
How to retire early ~ Get Rich Slowly
Fiology: The online encyclopedia of financial independence
Diagnosing a Mac which can’t complete booting – The Eclectic Light Company
Why endpoint management is critical to your enterprise security strategy
Could your brain be a target for hackers?
Cybersecurity Threat Intelligence, Phishing Protection, Alerts
Boards have wider cyber security awareness but still struggle to manage risks
Misconfigurations put enterprise cloud data at risk
Cloudflare + Terraform DNS Records – Geek and I
Enterprises face more than 100 critical vulnerabilities per day
Enterprises identify 870 unique vulnerabilities on their systems every day, on average. Of those, more than 100 are rated as critical on the common vulnerability scoring system (CVSS) according to a new report.
95 percent of IT security professionals underestimate phishing risks
Phishing is at the start of 90% of successful breaches
Vulnerability Intelligence Report | Tenable®
Organizations find cloud costs higher than anticipated
Automatic Ripping Machine | Headless | Blu-Ray/DVD/CD | b3n.org
“AaronLocker” update (v0.91) — and see “AaronLocker” in action on Channel 9! – Aaron Margosis' Non-Admin, App-Compat and Sysinternals WebLog
Extracting SQL Queries from .NET Apps with WinDbg | chentiangemalc
Windows Server DHCP Failover | PeteNetLive
This is Not Fine! - The IT Hollow
Transition to a big tech company. Part 2 (Lessons Learned) - The Matrix has you...
How to Prepare for Your Next Network War Room Debate - Part 2 | APMdigest - Application Performance Management
How to Prepare for Your Next Network War Room Debate - Part 1 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 5 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 4 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 3 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 2 | APMdigest - Application Performance Management
What You Should Be Monitoring to Ensure Digital Performance - Part 1 | APMdigest - Application Performance Management
Agile Procurement | The IT Skeptic
Microsoft Teams PowerShell: Getting All Teams, Changing Team Settings and Adding and Removing Users from Teams - Tom Talks
Quality Checking Infrastructure-as-Code - The IT Hollow
This is Not Fine! - The IT Hollow
Everything You Need to Know To Understand AI - Kossboss
ESXi 6.0 to 6.5 Upgrade – Stuff I'm Up To
Surviving a layoff with a generative culture - SysAdmin1138 Expounds
LINUX - How to clone a disk with ddrescue - gnu ddrescue also known as gddrescue - the better ddrescue tool - Kossboss
Bob Kahn Net Worth and Wiki - Kossboss
How to block executables from APPDATA – MILOSZENGEL.com
Deploy an Enterprise Grade Network in the Home for Less than $500 – Mike F Robbins
Use PowerShell to Monitor IIS Websites and Application Pools – Mike F Robbins
Building a Golden Image Pipeline
Chris's Wiki :: blog/spam/DKIMIncomingMailStats-2018-10
PowerShell Tip: Parse a date inside a string - LazyWinAdmin
Windows 7: CBS.log bug can fill your system drive | Born's Tech and Windows World
Windows Defender Is The First Antivirus To Run Inside Sandbox: Here's How To Enable It
Automate a web browser with Selenium - Fedora Magazine
My Favorites |
2018-11: Website Security | KWLUG - Kitchener-Waterloo Linux User Group
Episode 6: Conferences and Community | Linux Journal
The Death of Cyber Utopia - Lawfare
How to Install TIG Stack (Telegraf, InfluxDB, and Grafana) on Ubuntu 18.04 LTS
A Simple Linux KVM Backup Framework using NetWorker – Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
Worth Reading: Notes on Distributed Systems « ipSpace.net blog
Notes on Distributed Systems for Young Bloods – Something Similar
FAA Part 107 Certification - Mostly NetworksMostly Networks
Upgrade ESXi To The Latest Version Without Any Software Download | ESX Virtualization
Extract DNS Records to CSV with PowerShell | chentiangemalc
Export OU Structure To Image with PowerShell | chentiangemalc
Cisco CyberOps CCNA #CyberOps #CCNA #Security #CyberSecurity -
Will We Ever Talk Openly About Income and Money? — My Money Blog
Best Practices for Running SQL Server on vSphere
AWS Serverless Application Model (SAM) Command Line Interface – Build, Test, and Debug Serverless Apps Locally | AWS News Blog
CLTC Launches Cybersecurity “Citizen Clinic” - CLTC
10 Useful LibreOffice Tips to Boost Your Productivity
How to properly deactivate a user in Office 365 and SharePoint - SharePoint Maven
TrueCrypt is dead, long live VeraCrypt
Monitoring database health and behavior: Which metrics matter? | Opensource.com
Your First Java Program in the Ubuntu Terminal
How to install and run the Maltrail detection system on Ubuntu Server 18.04 - TechRepublic
HiDPI on dual 4K monitors with Linux | Vincent Bernat
Oracle Moves to Gen 2 Cloud, Promising More Automation and Security
Bridging State-level Cybersecurity Resources - Lawfare
A Deepening U.S.-China Cybersecurity Dilemma - Lawfare
City lights - Japan Today
Why Do Some Schools Ban Halloween? - Law and Daily Life
Over the rainbow - Japan Today
How to Prepare Your Money for the Coming Economic Slowdown
How to configure PXE network booting for Kali Linux | Sebastian Neef - 0day.work
Press Announcements > Statement from FDA Commissioner Scott Gottlieb, M.D. on FDA’s efforts to strengthen the agency’s medical device cybersecurity program as part of its mission to protect patients
New libssh Vulnerability – No Logo But Plenty Of Attention
Automatically splitting, cropping and rotating multiple photos from a combined scan | stewart a.
My Money Blog Portfolio Income – October 2018 — My Money Blog
Michael Pollan says that you can sum up his eating advice as “Eat food, not too much, mostly plants.” You can sum up my thoughts on portfolio income as “Spend mostly dividends and interest. Don’t eat too much principal.”
NBlog - the NoticeBored blog: NBlog Oct 13 - little boxes, little boxes
NBlog - the NoticeBored blog: NBlog Oct 9 - ten top infosec books
Supply Chain Security 101: An Expert’s View — Krebs on Security
How Office 365 learned to reel in phish - Microsoft Secure
CISO series: Building a security-minded culture starts with talking to business managers - Microsoft Secure
Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File - KitPloit - PenTest Tools for your Security Arsenal ☣
CT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs - KitPloit - PenTest Tools for your Security Arsenal ☣
Survey: 75 percent of US employees display insufficient cyber knowledge
Perspective: The periodic table of data privacy
Sen. Warner discusses America's failure to lead in cybersecurity
UK Cyberattack Investigations: An Analysis - HealthcareInfoSecurity
Meterpreter File System Commands Cheatsheet
HHS Updates Security Risk Assessment Tool - HealthcareInfoSecurity
From Canada to Argentina, Security Researchers Have Rights—Our New Report | Electronic Frontier Foundation
Google Online Security Blog: Modernizing Transport Security
Errata Security: Notes on the UK IoT cybersec "Code of Practice"
Maintaining a Pulse: Ransomware in the Healthcare Sector - The Ethical Hacker Network
FICO & US Chamber of Commerce Score Cyber-Risk ...
SEC Warns Public Companies on Accounting Control Use
The Cybersecurity Hiring Gap is Due to The Lack of Entry-level Positions - Daniel Miessler
6 Reasons Why Employees Violate Security Policies
Medical Device Security and CIO Insomnia ~ Cyber Thoughts
Ransomware attack hit North Carolina water utility following hurricane | CSO Online
The Cybersecurity Culture Gap
ERP Applications Under Fire Report | Onapsis
NVMe: A cheat sheet - TechRepublic
Open Source Healthcare | opensourcehealthcare
Raspberry Pi based garden monitoring system supplies five sensors
Microsoft browsers will disable 20-year-old security protocol
MIT's AI can identify breast cancer risk as reliably as a radiologist
Proposal for a Cyber-International Committee of the Red Cross - Lawfare
Summary: GAO Report on Weapons System Cybersecurity - Lawfare
Free NFR Keys for KMS from Hytrust for all VMware vExperts | ESX Virtualization
VMware vSphere 6.5 - VM Encryption Details | ESX Virtualization
draft-ietf-opsec-v6-13 - Operational Security Considerations for IPv6 Networks
CCNA Training » AAA TACACS+ and RADIUS Tutorial
To which release should you upgrade to? Plus: Extended Support?
Yes, SQL*Loader is Faster at Loading Records | ThatJeffSmith
Modeling JSON in Oracle Database Tables, Part 2 | ThatJeffSmith
New – Managed Databases for Amazon Lightsail | AWS News Blog
My Top 10 PowerShell Tips & Tricks – Virtually Sober
Free Tool - HammerDB Benchmark Tool New Release | ESX Virtualization
IAM Identities Basics and Best Practices
AWS IAM Policy Explained
Amazon S3 Security Part 1: S3 Access Control Tools
Getting started with Red Hat Satellite – Initial configuration - Blog dbi services
Google AI can spot advanced breast cancer more effectively than humans
FOSS LinuxBoot replaces UEFI on servers | Born's Tech and Windows World
WannaCry Ransomware attack costs £92 million - IT Governance Blog
The most recent Servicing Stack Updates @ AskWoody
Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc - KitPloit - PenTest Tools for your Security Arsenal ☣
Report: Remote Access Is No. 1 Healthcare Tech Hazard
Live Webinar: Five Steps to Masterminding an Effective Security Awareness ProgramWebinar.
US Senators ask India's PM to rethink strict data localization plans
VCDX - Mock Design - How to attack it?! -
Medtronic Cardiac Devices Recalled Due to Cyber Concerns
The Feet of the Masters: Lessons on Irregular Cyber Warfare | Small Wars Journal
Getting started with Red Hat Satellite - Installation - Blog dbi services
How to do great work ~ Get Rich Slowly
Security Is Bananas | The Networking Nerd
Getting started with Minikube: Kubernetes on your laptop | Opensource.com
Doc Searls Weblog · Toward no longer running naked through the digital world
What is the latest version of Wi-Fi? – lakkireddymadhu
The cost of a data breach - IT Governance Blog
How Cyber Essentials can help secure your devices and software - IT Governance Blog
5 alerting and visualization tools for sysadmins | Opensource.com
From DNSAdmins to Domain Admin, When DNSAdmins is More than Just DNS Administration – Active Directory Security
HHS OIG Launches Cybersecurity Web Page - HealthcareInfoSecurity
Hardware, firmware and drivers | Adventures in a Virtual World
Life is dirty. So is your data. Get used to it. - Thomas LaRock
Ransomware: Keep Safe and Stay Safe
Understanding the privacy paradox
NIST and the Small Business: Addressing Cyber Insecurity
Top cybersecurity facts, figures and statistics for 2018 | CSO Online
CCNA Training » OSI TCP/IP Model Questions
Counterintelligence Implications of Artificial Intelligence—Part III - Lawfare
Artificial Intelligence – A Counterintelligence Perspective: Part I - Lawfare
(My) BruCON 2018 Notes – Adventures in the programming jungle
CCNA Training » Basic MPLS Tutorial
PiCluster 2.4 is out! | Linux-toys.com
Linus' Behavior and the Kernel Development Community | Linux Journal
Sell Me on Oracle SQLcl in 50 Seconds | ThatJeffSmith
Report: US weapons systems are highly vulnerable to cyber attacks
CTIA - Wireless Industry Announces New Cybersecurity Certification Program for Cellular-Connected IoT Devices
Apache Struts v3 - Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts - KitPloit - PenTest Tools for your Security Arsenal ☣
Crypton - Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms - KitPloit - PenTest Tools for your Security Arsenal ☣
Laforge - Security Competition Infrastructure Automation Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
How to Protect Against Software Supply Chain Attacks | OPSWAT
The Why of Security | The Networking Nerd
Mail Security Tester - A Testing Framework For Mail Security And Filtering Solutions - KitPloit - PenTest Tools for your Security Arsenal ☣
NTT Data plans to develop AI-backed diagnosis service globally - Japan Today
How to Change/Spoof a MAC Address in Ubuntu
20 Red Hat Clustering (Pacemaker) Interview Questions and Answers
Starting Points & Ideas for your Arduino STEM Curriculum | Underwater Arduino Data Loggers
USBHarpoon a look-like charging cable that can hack into your computerSecurity Affairs
USBHarpoon
Colection of Opensource Project – it…'s Notes
50 Funny Wi-Fi Names for Your Router's Network SSID
How to report a data breach to the ICO - IT Governance Blog
Vizio to pay $17M to settle privacy class-action
GAO Report shed the lights on the failures behind the Equifax hackSecurity Affairs
Embracing Cybersecurity Best Practices, No Matter Where You Are
7 Steps to Start Your Risk Assessment
(My) BruCON 2018 Notes (Retro Day) – Adventures in the programming jungle
6 ways your organisation can suffer a data breach – IT Governance Blog
Zero Trust Security Architectures - Akamai's Approach - Security Boulevard
Seven Signs of a Strong Security Culture - Security Boulevard
From my Gartner Blog - Endpoint Has Won, Why Bother With NTA? - Security Boulevard
The Origin of Ransomware and Its Impact on Businesses | Radware Blog
Vulnerability Scanning vs. Penetration Testing: What's the Difference?
OWASP Top 10 Security Risks – Part I - Security Boulevard
Health Data Breach Victim Tally for 2018 Soars
6 Ways to Use CloudTrail to Improve AWS Security
Active Directory Security Risk Factors and What to Do About Them (Part 2) | Security Architects Partners
Active Directory Security Risk Factors and What to Do About Them (Part 1) | Security Architects Partners
Open FAIR Complements Risk Management Programs | Security Architects Partners
Equifax Breach: Key Lessons Learned - HealthcareInfoSecurity
Breach Notification: Canada Prepares for Nov. 1
The FDA’s New Digital Health Cyber Unit: What Would It Do?
Facebook Submits GDPR Breach Notification to Irish Watchdog
FDA Reveals Steps to Bolster Medical Device Cybersecurity
Critical Elements of a Solid Cybersecurity Program
Responding to Ransomware Attacks: Critical Elements
The SQL Server Defensive Dozen Part 1 – Hardening SQL Network Components – SQL Server Cybersecurity
The SQL Server Defensive Dozen – Part 3: Authentication and Authorization in SQL Server – SQL Server Cybersecurity
Measuring Model Goodness – Part 1 | Developing Analytics Solutions with the Data & AI Global Practice
Add a Staff Notebook to Microsoft Teams – SharePoint Steve
Long Before Facebook, The KGB Spread Fake News About AIDS : NPR
Reality Winner Sentenced To 5 Years, 3 Months For Leaking Classified Info : NPR
Getting Over Your Ex: Can Brain Science Help Heartbreak? : Shots - Health News : NPR
USB threats from malware to miners - Securelist
DeepSec 2018 Talk: Uncovering Vulnerabilities in Secure Coding Guidelines - Fernando Arnaboldi •
ABC Film Crews Leave Hospitals on the Hook for HIPAA Fines
Unsecure RDP Connections are a Widespread Security Failure | Webroot
Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV - Microsoft Secure
GDPR Report Card: Some Early Gains but More Work Ahead
Securing connected medical devices: Will categorizing them as ICS help? | CSO Online
Mobile CI/CD 101 – Visual Studio App Center Blog
2018 State of DevOps Report
U.S. Air Force awards $30M+ Enterprise IT-as-a-Service contract to Microsoft – Microsoft Azure Government
Design considerations for hybrid applications – Security – AzureCAT Guidance
Microsoft Security Code Analysis (Private Preview) – Microsoft Faculty Connection
Secure development on Azure Government – Part 1 – Microsoft Azure Government
Real-time performance monitoring for Azure SQL Database Managed Instance | SQL Server Customer Advisory Team
Sans Forgetica: the font that could help you remember
Why You Shouldn't Discount Discount Cloud Services Part 2 | Tallan's Blog
SNIP 5 - HIPAA External Code Set Testing | Tallan's Blog
All sorts of bad things happen when we disable the Task Scheduler service, is that bad? – The Old New Thing
What Is "Five Eyes" Surveillance? VPN Users, Beware!
How one student’s open source journey lead her to help create ChRIS
Why TENS is the secure bootable Linux you need - TechRepublic
Key Takeaways from Business of Software USA 2018
China reportedly carried out a 'hardware hack' on Apple and Amazon
Publish or Perish: The Sad Genius of Ignaz Semmelweis | Hackaday
Ignaz Semmelweis
How to monitor your data center Linux server with osquery - TechRepublic
How to measure DevOps success | Opensource.com
Intro to Docker: Why and How to Use Containers on Any System | Hackaday
The DIN Rail and How It Got That Way | Hackaday
DSHR's Blog: Brief Talk At Internet Archive Event
Low-cost USB Rubber Ducky pen-test tool for $3 using Digispark and Duck2Spark
Exploring an Abandoned Toys “R” Us | Hackaday
Hack My House: Raspberry Pi as Infrastructure | Hackaday
Sea of red - Japan Today
Terence Luk: Attempting to boot a VMware vSphere virtual machine fails with the error status: 0xc0000017
0xc0000017
Leaf-and-Spine Fabric Myths (Part 1) « ipSpace.net blog
Passed Microsoft Certified: Azure Administrator - Thomas Maurer
How Etsy Handles Peeking in A/B Testing - Code as Craft
Why privacy compliance matters to a company’s valuation
What might a GDPR cease-processing order look like?
Under GDPR, large-scale data processing is considered ‘high risk’
Drafting a GDPR-compliant retention policy
Spain's decree-law temporarily adapting legislation to GDPR
Italy's GDPR implementation law goes into effect today
What could Canada learn from the GDPR?
How local laws helped a company prepare for GDPR
A practitioner's look at Belgium's GDPR implementation law
CNIL looks at GDPR four months later
Security incident involved in SingHealth data breach never reported
Study: Health care data breaches rising yearly
Medical Device Cybersecurity: Regional Incident Preparedness and Response Playbook - pr-18-1550-Medical-Device-Cybersecurity-Playbook.pdf
Alabama Gov. Kay Ivey announces state's first security operations center
Calif. signs first IoT security bill into law
AT&T CEO calls for federal US privacy law
Victory! California Passes Net Neutrality Bill | Electronic Frontier Foundation
8 Attack Vectors Puncturing Cloud Environments
Vermont’s New Data Privacy Law | Electronic Frontier Foundation
Owning Security in the Industrial Internet of Things
The Cyber Kill Chain Gets a Makeover
6 Security Training Hacks to Increase Cyber IQ Org-Wide
Troy Hunt: New Pluralsight Course: Adapting to the New Normal: Embracing a Security Culture of Continual Change
Managing Data the Way We Manage Money
4 Traits of a Cyber-Resilient Culture
CISOs: How to Answer the 5 Questions Boards Will ...
New Book: The Culture of Learning | Don Jones
DSHR's Blog: Vint Cerf on Traceability
Robert Milkowski's blog: Solaris: Spectre v2 & Meltdown fixes
History of Lisp | Lambda the Ultimate
AMA: How can I start using .NET Framework in PowerShell? | Don Jones
Upcoming Webinar: A Farewell to LUNs – Discover how VVols forever changes storage in vSphere » Welcome to vSphere-land!
CVE Funding and Process | Emergent Chaos
Ease Me Into Cryptography Part 1: Buzzwords and Hash Function - The Ethical Hacker Network
Container Security Part 3 – Kubernetes Cheat Sheet - The Ethical Hacker Network
DoD RMF Part 1: How We Got to the RMF - The Ethical Hacker Network
Panaceas, Shiny Objects and the Importance of Managing Risk in a Healthcare Environment – Part 2 ~ Cyber Thoughts
Patient Safety and Cyber Risk ~ Cyber Thoughts
Preparing to Release the OWASP IoT Top 10 2018 - Daniel Miessler
The Sony hacker indictment: 5 lessons for IT security | CSO Online
Facebook security and privacy issues revealed | CSO Online
The best password advice right now | CSO Online
Basic Cyber Hygiene Practices That Go a Long Way | CSO Online
Gwinnett Medical Center investigating possible data breach | CSO Online
David Chung's SDDC in a box uses 4 Xeon D nodes for vSAN, is relatively quiet, and fits in carry-on! | TinkerTry IT @ Home
Violin Systems Announces Violin XVS 8 | PenguinPunk.net
Ansible - Don't be Afraid of a Little Python · Lindsay Hill
Testing Performance on vSAN — ThinkCharles.net
Now Available – Amazon EC2 High Memory Instances with 6, 9, and 12 TB of Memory, Perfect for SAP HANA | AWS News Blog
New Oracle Database Upgrade Lab for Oracle 18.3.0
Swap space on Linux systems: A primer | Opensource.com
iTWire - Equifax penalised $3.5m for consumer law breaches
What's Your System's Uptime? | Linux Journal
Computer Science (CS) and Information Technology (IT): Part 2 | APMdigest - Application Performance Management
Computer Science (CS) and Information Technology (IT): Part 1 | APMdigest - Application Performance Management
Four best practices that can ensure application health in an Hybrid IT environment! (by Will Moonen)
Windows Server 2019 Windows Defender Advanced Threat Protection - Thomas Maurer
GitHub - carlbuchmann/iac-dev: Infrastructure as Code development Workstation: RedHat/Centos or Debian/Ubuntu
The 2018 DOD Cyber Strategy: Understanding 'Defense Forward' in Light of the NDAA and PPD-20 Changes - Lawfare
Windows ALPC vulnerability (CVE-2018-8440) used in Exploit Kit | Born's Tech and Windows World
16 iptables tips and tricks for sysadmins | Opensource.com
Patch Lady – 31 days of paranoia – day 1 @ AskWoody
October the 1st, a historic day | Born's Tech and Windows World
Windows Server 2019 Evaluation and Security Baseline Draft | Born's Tech and Windows World
A new triple constraint – Blog FiascoBlog Fiasco
Essential System Tools: ps_mem - accurately report memory usage of programs - LinuxLinks
Open-source alt-droid wants to know if it's still leaking data to Google • The Register
Download our GIMP cheat sheet | Opensource.com
Siemens Issues An Oktoberfest Release Of Jailhouse 0.10 Hypervisor - Phoronix
A Fond Farewell and Tribute to Former Low End Mac Writer Charles W. Moore | Low End Mac
Announcing Oracle Solaris 11.4 SRU1 | Oracle Solaris Blog
3 open source distributed tracing tools | Opensource.com
Low cost and open source Serial to Ethernet WIZ750SR, WIZ752SR Series | Elektor Magazine
Why Nerds Use Linux - LinuxAndUbuntu - Linux News | FOSS Reviews | Linux Tutorials HowTo
Aging like milk, not wine: The realities of container security
What containers can teach us about DevOps | Opensource.com
DHS Awards GrammaTech $3.5M to Modernize Open-Source Software Analysis Tools
The rise of open source use across state and local government -- GCN
Open Source Software & Usability: Open source tools I used to write my latest book
webhint: a hinting engine for the web – webhint – Medium
Cybersecurity Remains an Uphill Battle, New Research Shows
The 10,000 Hour Rule Is Wrong. How to Really Master a Skill
Millions of unfixed security flaws is a lie – Open Source Security
How to install SOPlanning on Ubuntu 18.04 LTS
Understanding Bash: Elements of Programming | Linux Journal
How Azure Sphere ensures IoT security within a 4MB Linux stack
Weekend Reading: Containers | Linux Journal
Taskbook - Command Line-Based Tasks, Boards, and Notes
French cybersecurity agency open sources security hardened CLIP OS - Help Net Security
How to Test Network Throughput Using iperf3 Tool in Linux
Oracle Launches Java 11, Adding Security Features
List of 80,000 Hours content from the last 4 months, summary of which were most popular, and plans for future releases. - 80,000 Hours
10 handy Bash aliases for Linux | Opensource.com
10 Body Language Mistakes That Sabotage Job Interviews
Infographic: Average Auto Insurance Premiums For All 50 States — My Money Blog
The history of VMware vSphere | VM Spot
Security Features Check – AMTSO
EICAR – The Most Common False Positive in the World | Webroot
Credit Freezes are Free: Let the Ice Age Begin — Krebs on Security
From Kekeo to Rubeus – harmj0y
CVE-2018-5240 – Symantec Management Agent (Altiris) Privilege Escalation
Multiple Ways to Secure SSH Port
JPCERT/CC Blog: Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch-
How to Install and Configure Apache Tomcat 9 in CentOS
Evil Tester: What If Courage was Contagious?
My Experience with the DoD Version of the RMF - The Ethical Hacker Network
Hunting for Suspicious Processes with OSSEC - SANS Internet Storm Center
ModSecurity and nginx | Linux Journal
Security Flaw Found In Microsoft JET Database Engine by ZDE - Patch Expected In Windows October Update - Appuals.com
Configuring Name Protection on a DHCP Server to Prevent Name Squatting | Alexander's Blog
6 steps for building a robust incident response plan | CSO Online
5 cyber security basics you can't afford to ignore | CSO Online
Panaceas, Shiny Objects and the Importance of Managing Risk in a Healthcare Environment – Part 1 ~ Cyber Thoughts
(My) OWASP Belgium Chapter meeting notes – Adventures in the programming jungle
New – Parallel Query for Amazon Aurora | AWS News Blog
Postman is Awesome – Stuff I'm Up To
The Cause of Every Deadlock in SQL Server - Thomas LaRock
Apache NiFi: From Syslog to Elasticsearch – David Vassallo's Blog
The top cybersecurity concerns for IT and business
Cisco Firewall Port Forwarding | PeteNetLive
Four Things to Consider Before You Move Everything to the Cloud (by Keith Bromley)
Kubernetes Network Policies Using Cilium - Controlling Ingress/Egress from Namespaces — Cilium
Identity Management for Systems in a DMZ
Linking Docker containers | geekdudes
Equifax One Year Later: What Lessons Have Been Learned?
GAO-18-559, DATA PROTECTION: Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach - 694158.pdf
How to Create Python Virtual Environments on Ubuntu 18.04 | Linuxize
State Department Still Sucks At Basic Cybersecurity And Senators Want To Know Why | Techdirt
Writing More Compact Bash Code | Linux Journal
Distributed tracing in a microservices world | Opensource.com
Linux firewalls: What you need to know about iptables and firewalld | Opensource.com
16 Useful Bandwidth Monitoring Tools to Analyze Network Usage in Linux
Oracle 12.2 : Windows Virtual Account - Blog dbi services
Weekend Reading: Scary Tales from the Server Room | Linux Journal
How To Enable TLS 1.3 in Nginx on Ubuntu 18.04 and 16.04 - LinuxBabe
A Detailed Look at RFC 8446 (a.k.a. TLS 1.3)
New Xbash Malware Is A Deadly Combo Of Ransomware, Botnet, Cryptominer
Creating a custom Windows image for MaaS – Azure Field Notes Blog
Openshift 3.5 installation headaches (and where to find the aspirin) – Azure Field Notes Blog
National Cyber Strategy
The Pentagon’s New Cyber Strategy: Defend Forward - Lawfare
How to Use Get-Log for Parsing Logs
Not all PowerShell shells are equals | >_
New – AWS Storage Gateway Hardware Appliance | AWS News Blog
The Economics of Stock Buybacks | Tax Foundation
EternalBlue Infections Persist
EternalBlue
The 7 Habits of Highly Effective Security Teams
New GandCrab ransomware variant hammers Florida school district | CSO Online
GandCrab
5 steps to create a zero trust security model | CSO Online
Hardening Windows – Stuff I'm Up To
Offline Update Page Details (Nessus)
Wholesale domain names, SSL Certificates, Hosted Email - OpenSRS
Have Microsoft patches reached a painful tipping point?
Blog, Hacking NASL Scripts- DigiNinja
GitHub - tenable/notepadpp-nasl
GitHub - tenable/nasldoc: A documentation generator for NASL.
Fast comparison of Nessus and OpenVAS knowledge bases | Alexander V. Leonov
PCI DSS: Lessons to learn from recent payment card breaches – IT Governance Blog
Errata Security: Provisioning a headless Raspberry Pi
Errata Security: California's bad IoT law
Installing OpenVAS on CentOS 7 - Linux Included
Experts Urge Rapid Patching of ‘Struts’ Bug — Krebs on Security
An Open Letter To Ransomware Authors - Linux Included
Presentation - HL7 Insecurities - Linux Included
Container Security Part 2 - Benchmarks to the Rescue - The Ethical Hacker Network
Automating DAST Scans with Jenkins, Arachni & ThreadFix - Sustainable Application SecuritySustainable Application Security
Globbing and Regex: So Similar, So Different | Linux Journal
WPScan - A Black Box WordPress Vulnerability Scanner
Lync Troubleshooting: There was a problem acquiring a personal certificate required to sign in. If the problem continues, please contact your support team. - TechNet Articles - United States (English) - TechNet Wiki
Rediscovering F-Droid – Exotic Security
What is DNS and how it works – lakkireddymadhu
DNS Terminology – lakkireddymadhu
Developing Cyber Security Incident Response Plans for Industrial Control Systems - Delta Risk
How Technology Increases Production Without the Need for Humans - Daniel Miessler
Stop Trying to Violently Separate Privacy and Security - Daniel Miessler
Stop Unwanted and Annoying Phone Calls | Verizon Phone Support
Habits of a Successful Business Executive that You Must Know
How I Reduced My Spam Phone Calls by 90% - Daniel Miessler
7 Trends in Docker Container Monitoring | APMdigest - Application Performance Management
The One Thing Destroying Office 365 Deployments - and How to Fix It - Part 2 | APMdigest - Application Performance Management
The One Thing Destroying Office 365 Deployments - and How to Fix It - Part 1 | APMdigest - Application Performance Management
I Lost 50 pounds in 5 Months, Here’s How - Thomas LaRock
FAQs for VeriSM | Purple Griffon
10 reasons to take your ITIL training now rather | Purple Gr...
ITIL4® - what’s happening, what’s new and what w | Purple Gr...
The No Budget Admin: De-Mystifying and Installing Orace Java for Linux
How I Tricked Myself into Shipping Too Late - mtlynch.io
Keeping a particular version of a package in Red Hat Enterprise Linux | setaOffice
MPECS Inc. Blog: Security: RBC Royal Bank: Best laid plans of mice and men
MPECS Inc. Blog: Legacy Windows XP for Industrial Machine Access and Management and Accounting Apps
List Global Assembly Cache using PowerShell – PowerShell, Programming and DevOps
2018 DerbyCon Hiring List ·
Powershell and Lotus Notes pt2 – Luka Gros
Mapping Network Security Resilience To The NIST Cybersecurity Framework (by Keith Bromley)
Startup Dreams (by Paul W. Smith)
“passionate stranger who hallucinates the future for them.”
Troubleshooting a Spotty/Bad Internet Connection (by Chris Greer)
PingPlotter
Need to document your environment? Check out “As Built Report” | JonKensy.com
Create Haskintos USB – it…'s Notes
Using VDO on CentOS/RHEL7 for Storage Efficiency | hobo.house
Bristol Airport affected by ransomware | Born's Tech and Windows World
Chris's Wiki :: blog/solaris/ZFSSendRecvVsRsync
Chris's Wiki :: blog/sysadmin/ProcmailWhatNext
The History of a Security Hole | OS/2 Museum
insignary
The new Windows lifecycle fact sheet @ AskWoody
Cross-Cloud Snapshot Management – Data Protection Hub
California Eyes Questionable Legislation In Bid To Fix The Internet Of Broken Things | Techdirt
The Enemy Gets a Vote - Lawfare
A Matter of Perspective | The Networking Nerd
Agile project management: A comprehensive guide | CIO
The principles of agile There are 12 key principles that still guide agile project management today. Customer satisfaction is always the highest priority and is achieved through rapid and continuous delivery. Changing environments are embraced at any stage of the process to provide the customer with a competitive advantage. A product or service is delivered with higher frequency. Stakeholders and developers collaborate closely on a daily basis. All stakeholders and team members remain motivated for optimal project outcomes, while teams are provided with all the necessary tools and support, and are trusted to accomplish project goals. Face-to-face meetings are deemed the most efficient and effective format for project success. A final working product is the ultimate measure of success. Sustainable development is accomplished through agile processes whereby development teams and stakeholders are able to maintain a constant and ongoing pace. Agility is enhanced through a continuous focus on technical excellence and proper design. Simplicity is an essential element. Self-organizing teams are most likely to develop the best architectures and designs and to meet requirements. Regular intervals are used by teams to improve efficiency through fine-tuning behaviors.
Text-editor-like weekly planner - Coypu
Oracle Core Audit - Do you Audit your Core database engine for breach?
Jaffar's (Mr RAC) Oracle blog: All about 'Autonomous Transaction Processing' - Part I
A Review of Ubiquiti Wireless | The Networking Nerd
Open-source software may aid brain imaging to find disease treatments | Health Data Management
Injecting chaos experiments into security log pipelines | Opensource.com
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
Encrypt A Drive With VeraCrypt in Linux - LinuxConfig.org
Top 8 YUM ThirdParty Repositories for CentOS and RHEL
Useful Tips to Improve Emulation Performance in RetroPie - Make Tech Easier
RetroPie
A day in the life of a log message | Opensource.com
the xonsh shell — xonsh 0.7.8 documentation
Tanium - Endpoint Security and Systems Management
How a Unique Business Model and Hiring Strategy Brought the Garrett Companies to $82 Million in Just 3 Years | Inc.com
Linux namei Command Tutorial for Beginners (5 Examples)
Introduction to python web scraping and the Beautiful Soup library - LinuxConfig.org
Know Your Storage: Block, File & Object | Linux.com | The source for Linux information
2 Ways to Re-run Last Executed Commands in Linux
DSHR's Blog: What Does Data "Durability" Mean
Slideshows - Dark Reading
Randomize your MAC address using NetworkManager - Fedora Magazine
Doing One Thing, Well: The UNIX Philosophy | Hackaday
Stop Killing Your Cattle: Server Infrastructure Advice | Linux Journal
12 Practical Ping Command Examples for Linux Users
The Cyberlaw Podcast: Click Here to Kill Everybody - Lawfare
Introduction to VistA | OSEHRA
Restoring 1000’s of SQL Server Databases Using PowerShell | Simon Osborne's SQL Blog
Deploy vCenter Server using Ansible - Virtual Elephant
How to Setup File Integrity Monitoring (FIM) using osquery on Linux
10 Must-See Museums in the U.S.
CYBER CENTER: Cybersecurity Legal Task Force Vendor Contracting Project: Cybersecurity Checklist | Business Law Section
5 Unforgettable Train Trips Across the U.S.
Oracle Database 18c "Hands-Off" Data Guard Build Using VirtualBox and Vagrant | The ORACLE-BASE Blog
5 Things You Didn't Know You Could do with Nmap - Daniel Miessler
Beyond the Firewall - Different Rules for East-West Traffic | CSO Online
Chris's Wiki :: blog/python/DjangoWeNeedTests
Chris's Wiki :: blog/solaris/ZFSAndDirectoryDType
Chris's Wiki :: blog/sysadmin/ManyFilesBackupProblem
Chris's Wiki :: blog/sysadmin/QuietConfigurationDrift
Patch Lady – Microcode confusion @ AskWoody
Mind boggled: The Meltdown/Spectre microcode patches @ AskWoody
Identify an AD object from the SID | Alan's Blog
Listing (and running) OS Shell Commands with PowerShell | Alan's Blog
Create a Hash Table with AD Domain DNS Root and NetBIOS Names | Alan's Blog
Remove a DSC config | >_
How do I install Guest Additions in a VirtualBox VM? - Ask Ubuntu
About the Turkish-I Problem | >_
Security 101 Series volume 1 -
VMware OS Optimization Tool
We are changing the way we name VMware certifications. The Year Makes It Clear. - VMware Education Services
Home Lab Power Automation – Part 3 – vswitchzero
Ansible Roles for VMware SDDC Deployments - Virtual Elephant
Technical notes, my online memory: Scrub GPS location from JPEG EXIF data
Trying out the Azure Firewall in a Hub & Spoke deployment model – Karim Vaes
IRC turns 30! – Virtually Fun
Backup Best Practices with Unsupported Databases
Hard Drive Breakthrough in 2019? Technology Clash: HAMR vs MAMR
Proper TempDB creation for Configuration Manager | Steve Thompson [MVP]
Azure Site Recovery – From Start to Finish – Anthony on Azure
Python: seven simple things network engineers need to know | Open-Source Routing and Network Simulation
Interview: Benefits of Network Automation (Part 2) « ipSpace.net blog
Interview: Benefits of Network Automation (Part 1) « ipSpace.net blog
Deploy WebLogic docker images using Docker Toolbox and Virtual Box on Windows - Blog dbi services
RV Life and Working Remote – DBA Kevlar
Restoring a database without having any controlfile backup - Blog dbi services
VMworld 2018 US: vSphere Platinum and other vSphere Updates – Ather Beg’s Useful Thoughts
Cohesity – Harnessing the Power of Data – Ather Beg’s Useful Thoughts
The Performance Hit For A Xeon-Backed Ubuntu Linux VM With L1TF / Foreshadow Patches - Phoronix
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED
Trump’s Secret Order on Pulling the Cyber Trigger - Lawfare
Artificial Intelligence – A Counterintelligence Perspective: Part II - Lawfare
Heterogeneous Memory Management Still Being Worked On For Nouveau / Radeon / Intel - Phoronix
12 of the Best Free Linux Chess Apps (Updated 2018) - LinuxLinks
FOSS: passive consumerism kills our community | Carl Chenet's Blog
Partitioning a 7 exabyte disk | Richard WM Jones
Kubernetes is the new operating environment (Part 1) - RHD Blog
This Is Your Solution For Open Source Motion Tracking | Hackaday
A sysadmin's guide to containers | Opensource.com
4 Ansible playbooks you should try | Opensource.com
6 open source tools for making your own VPN | Opensource.com
How to use KA Lite to serve up educational content | Opensource.com
Essential LaTeX Tools - typeset beautifully (Updated 2018) - LinuxLinks
VMware Goes Platinum for vSphere Virtual Server Deployments
StingRay - simple chess graphical user interface - LinuxLinks
Everything You Need to Know about Linux Containers, Part II: Working with Linux Containers (LXC) | Linux Journal
12 Best Hacking Tools Of 2018 For Windows, Linux, And OS X
Getting started with Sensu monitoring | Opensource.com
12 Easy Steps to Speed Up Ubuntu Linux
Joplin: Encrypted Open Source Note Taking And To-Do Application - Linux Uprising Blog
Monitoring OpenVPN ports and the ways of Open Source – /home/liquidat
Federated CI
How to Travel Across the U.S. on a Budget
Post-Wayfair Options for States | South Dakota v. Wayfair | Tax Foundation
Lo Mein Noodle Salad Recipe -- Gluten Free, Vegan, Delicious, and Easy | Penniless Parenting
Pennsylvania: A 21st Century Tax Code | Tax Foundation
The Importance of a Well-Organized Kitchen | Penniless Parenting
Warren Buffett Old Interview - NevBlog
Warren Buffett on Reaching Stock Market Highs — My Money Blog
How to get rich and stay rich ~ Get Rich Slowly
How to Restore Files from Backblaze - TidBITS
How a 1998 meeting with Steve Jobs gave birth to Wi-Fi | Wi-Fi NOW Events
Lego's new toy train is a STEM tool for preschoolers
What early retirement was like in 1957 ~ Get Rich Slowly
All of the money books I've reviewed during the past twelve years
My digital shadow looks nothing like me
'Disable SMT/Hyperthreading in all Intel BIOSes' - MARC
Foundries.io promises standardized open source IoT device security | TechCrunch
5 open source tools for container security | Opensource.com
9 flowchart and diagramming tools for Linux | Opensource.com
Aqua Security Releases Kube-Hunter Container Penetration Testing Tool
Keeping patient data safe with open source tools | Opensource.com
How to Make Your Ubuntu PC a Wireless Access Point
Windows Server 2019 - What is coming Next - Thomas Maurer
Configure Fine-Grained Password Policies for Specific Users in Active Directory
Designing a Database: 7 Things You don't Want To Do
Powershell and Lotus Notes – Luka Gros
Sharkfest 2018 - TCP Fundamentals Part 1 (by Chris Greer)
Everything You Need to Know about Linux Containers, Part I: Linux Control Groups and Process Isolation | Linux Journal
Proving ROI: How a Security Road Map Can Sway the ...
Why you should be skeptical of financial blogs ~ Get Rich Slowly
A Convenient Guide to Project Management Courses
Updating SSL Certificates on vCenter and Platform Services Controllers
MikroTik Automated MPLS L3VPN Lab – neckercube.com
The Cybersecurity Regulations Healthcare, Financial Services, and Retail Industries Must Know About | CSO Online
Homemade Gluten Free Vegan Thin Mints or Mint Chocolate Wafer Cookies Recipe -- Frugal and Easy | Penniless Parenting
Messy Insider Breach Impacts 258,000 Over Five Year Span
Augusta University Health Reports Major Data Breach
Troubleshooting TLS Certificates - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Add AWS Web Application Firewall to Protect your Apps - The IT Hollow
The Dangers in the Trump-Brennan Confrontation - Lawfare
The Forgotten Art of Riveted Structures | Hackaday
vCenter Server Appliance (vCSA) automated/unattended deployment - IVOBEERENS.nl
HostsSources · AdAway/AdAway Wiki · GitHub
Configuration Management for Windows - Stack Overflow
DSC + Ansible – Trond's Working!
Updated: Lanmanserver and Lanmanworkstation Tuning
Configuration in a DevOps world – Windows PowerShell Desired State Configuration | PowerShell Team Blog
Introducing PowerShell Desired State Configuration (DSC) | Building Clouds
Under The Stairs: Events in the Security Event Log
Vulnerability Disclosure Policy Basics: 5 Critical Components | HackerOne
Updating CTL's in disconnected environments in Windows - ITS ALL ABOUT MICROSOFT WINDOWS CLIENT, SERVERS AND MUCH MORE
Using Wasabi S3 Object Storage with containers
Otter | Provision your Servers and Manage Configuration | Inedo
OpenControl
Cloud-A - True Canadian Cloud for Development TeamsCanadian Cloud Infrastructure | True Cloud
US bans government personnel from using Huawei and ZTE devices
Keiretsu Safe Haven Fading For Mitsubishi Heavy Industries (TSE: 7011) - Kenkyo Investing
The Benefits of Automating Web Application Vulnerability Scanning | Netsparker
røøtz Asylum
nikon photography
Servers for Hackers
So You Got Yourself a Loadbalancer | Servers for Hackers
1. OWASP_develope_secure_software_with_OWASP20180621 - 1. OWASP_develope_secure_software_with_OWASP20180621.pdf
OWASP Defect Dojo
Health care industry is king of the malicious insider threat
Reinforcement Learning and AI - Data Science Central
What's hot in AI: Deep reinforcement learning | VentureBeat
Understanding Get-SpeculationControlSettings PowerShell script output
Heads Up: Enabling Speculative Store Bypass Disable will make your Windows installation unable to boot if you have old enough cpu microcode : sysadmin
SANS Top 25 Procurement Language and the OWASP Secure Software Contract Annex | tssci security
IEC 80001 - An Introduction | Medical Connectivity
SSD Form Factors Proliferate At Flash Memory Summit 2018
OpenVAS 8.0 Vulnerability Scanning | Kali Linux
iTWire - Red Hat's Jim Whitehurst on strategy and culture
WAF Buster - Disrupt WAF By Abusing SSL/TLS Ciphers - KitPloit - PenTest Tools for your Security Arsenal ☣
WAF_buster
Windows Privilege Escalation (AlwaysInstallElevated)
A Clear Guide to L1TF and Foreshadow, the Latest Intel CPU Flaws
How to Document Security Incidents for Compliance in 10 Steps - Security Boulevard
VERIS INCIDENT FRAMEWORK - Security Boulevard
NBlog - the NoticeBored blog: NBlog August 17 - risk terms and concepts
‘Foreshadow’ flaw found in Intel CPUs – what to do – Naked Security
A.I. in diabetes care: Can we trust it if we don’t know how it works?
Phishing Attack Last Year Exposed Health Data on 417,000
Windows Privilege Escalation (Unquoted Path Service)
Three-quarters of corporate network breaches are via web applications
Balancing cybersecurity and regulatory compliance | CSO Online
Turning Cheap WiFi Modules Into Cheap WiFi Swiss Army Knives | Hackaday
The Wonderful World of USB Type-C | Hackaday
Active Directory: LDAP Syntax Filters - TechNet Articles - United States (English) - TechNet Wiki
PowerShell Script Module Design: Public/Private versus Functions/Internal folders for Functions – Mike F Robbins
The 10/10/10 Rule For Tough Decisions
Visualizing a DevOps mindset | Opensource.com
Oracle Database causing Linux auditd logs to grow fast - DBA - Rodrigo Jorge - Oracle Tips and Guides
IXP Graphs are an Eyesore · Lindsay Hill
20 Random Facts About Traveling In Airplanes | foXnoMad
How to Write a Winning Proposal for Your Doctoral Dissertation
How Agile helps non-technical teams get things done | Opensource.com
How the L1 Terminal Fault vulnerability affects Linux systems | Network World
Cyber Warnings About Certain Philips Medical Devices
How to Comply with HIPAA Regulations – 10 Steps
RDP not working for my cloud service – Demystify
Top 5 Mobile App Security Failures and How To Prevent Them – Visual Studio App Center Blog
Azure 101: Governance – Cloud Solution Architect
Brian's Home Theater PC: The Hardware - briancmoses.com
IDEAS IN FOOD: Beignets
Dawn of the First Digital Camera | Hackaday
What Is Foreshadow? How This Intel CPU Vulnerability Might Affect You
A Beginner's Guide to Understanding White Balance
5 Reasons to Update Your Raspberry Pi and Raspbian Regularly
The 7 Best Text-to-Speech Apps for Android
7 Cool Bluetooth DIY Projects That'll Upgrade Your Old Gadgets
Offensive Cyber Operations and the Interagency Process: What’s at Stake With the New Trump Policy - Lawfare
How to Install FreeRADIUS on Ubuntu
52% of businesses have weak cybersecurity vulnerability assessment strategies - TechRepublic
Here is the maturity level each VA style represents: Diligent: High maturity level Investigative: Medium to high maturity level Surveying: Low to medium maturity level Minimalist: Low maturity level Only 5% of enterprises have a Diligent style, which means those companies have frequent vulnerability assessments and customized assessments for different business units and groups, said the post. However, 33% of enterprises had a Minimalist VA style, conducting few assessments, according to Tenable. Most companies still have a lot of work to do to protect themselves in the event of a cyberattack. "The ultimate objective - regardless of which style most closely aligns to your own - is to always keep evolving toward a higher level of maturity," Tenable said in the blog post. Check out TechRepublic's article for recommended approaches to preventing an attack.
ICS Security: The European Perspective - Security Boulevard
When It Comes to Data Breaches, Healthcare Businesses Stand to Lose Most - Security Boulevard
Android Man-in-the-Disk Attack Can Expose Apps & User Data
The Ultimate Guide to DoD 8570 - Security Boulevard
DeepLocker: new breed of malware that uses AI to fly under the radar - Security Boulevard
What is DoD 8570? - Security Boulevard
How to Achieve DoD 8570 IAT Level I Compliance - Security Boulevard
How to Achieve DoD 8570 IAT Level I Compliance - Security Boulevard
Zombies: Top 5 Open Source Vulnerabilities That Refuse To Die
6 most common cyber attacks - Security Boulevard
Cloud Security Myth vs. Fact #2: Is Encryption the Best Security for Data at Risk?
What CEOs and CFOs Should Know: The 7 Costs of SaaS Data Loss - Security Boulevard
Your Infosec Supply List - Black Hills Information Security
Fact vs. Myth: A Protegrity Cloud Solutions Blog Series | Protegrity
KeyPass ransomware - Securelist
PCI DSS & GDPR: The Similarities & Differences - Semafone
Over 2,300 Data Breaches Disclosed So Far In 2018, Exposing Over 2.6 Billion Records
More Than 10,000 Vulnerabilities Disclosed So Far In 2018 – Over 3,000 You May Not Know About
Managing risk in the modern world - Red Hat Customer Portal
Is it Legal To Use a VPN Service? (Depends on Where You Live)
Jolly Roger Telephone | Revenge Has Never Been So Sweet
The Black Vault Home Page - The Black Vault
Cybersecurity Experiences at Small Organizations | CSO Online
The state of cybersecurity at small organizations | CSO Online
Video Shows Hotel Security at DEF CON Joking About Posting Photos of Guests' Belongings to Snapchat - Motherboard
A White Paper About Security White Papers That Looks Like a Security Article
Cybersecurity threats: How to discover, remediate, and mitigate – Microsoft Secure
How Microsoft 365 Security integrates with your broader IT ecosystem—part 3 – Microsoft Secure
DependencyCheck v3.3.1 - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies - KitPloit - PenTest Tools for your Security Arsenal ☣
BlackEye - The Most Complete Phishing Tool, With 32 Templates +1 Customizable - KitPloit - PenTest Tools for your Security Arsenal ☣
MPs concerned about the UK’s cyber security – IT Governance Blog
12 Things Mentally Strong People Do That Nobody Else Does
How to leverage GDPR compliance for increased consumer trust
Are Legacy Medical Device Security Flaws Going Unfixed?
Should Staff Ever Use Personal Devices to Access Patient Data?
HHS OIG Finds Security Flaws in Maryland’s Medicaid System
Healthcare Exchange Standards: Healthcare use of Blockchain on FHIR
Hacking pacemakers, insulin pumps and patients' vital signs in real time | CSO Online
Take-aways from Black Hat USA 2018 | CSO Online
The unintended consequences of GDPR | CSO Online
Vegas hotel room checks raise concerns at Def Con, Black Hat | CSO Online
Debian Turns 25! Here are Some Interesting Facts About Debian Linux | It's FOSS
Oracle open sources Graphpipe to standardize machine learning model deployment | TechCrunch
Testing web applications with Selenium [LWN.net]
L1TF/Foreshadow News and Benchmarks | Tux Machines
Automating backups on a Raspberry Pi NAS | Opensource.com
Asia Pacific Consumers Prioritize Security Over Convenience in the App Experience | APMdigest - Application Performance Management
Why IT Support Needs Professionalism | Purple Griffon
Create Disk Usage Reports with PowerShell and WizTree – smsagent
Adding Another Disk to the RAID 10 on My KVM Server - Patshead.com Blog
Layer 1 Troubleshooting Scenario (by Tony Fortunato)
Infrastructure TAP's and the need for a comprehensive network visibility system! (by Gabriel Guriencu)
Chris's Wiki :: blog/spam/ZipAttachmentWithEverything
Chris's Wiki :: blog/sysadmin/AccountCreationScriptEvolution
Foreshadow (L1TF) Intel CPU vulnerabilities | Born's Tech and Windows World
Microsoft Security Advisory Notification (August 14, 2018) | Born's Tech and Windows World
Why luck might be subjective and not part of the world | Aeon Essays
Tsutomu Yamaguchi
Everyone Worries About Money, Even The Wealthy — My Money Blog
How to easily update your VMware ESXi Hypervisor to the latest version with one ESXCLI command | TinkerTry IT @ Home
Understanding L1 Terminal Fault Mitigation | TinkerTry IT @ Home
What Is the Real Value of $100 in Your State? | 2018 | Tax Foundation
Homemade Gluten Free Vegan Falafel Recipe -- Grain Free, Delicious, and Easy | Penniless Parenting
inanzzz | Some useful notes about HAProxy, load balancing, Keepalived and security
OZON innovates by integrating ModSecurity with HAProxy - Ozon Cybersecurity Blog
Scalable WAF protection with HAProxy and Apache with modsecurity - HAProxy Technologies
Using vRealize Suite LifeCycle Manager to deploy an Enterprise Distributed vRealize Automation environment. | JohannStander
Vulnerability in Java VM Component of Oracle Database allows for Whole System Compromise - Appuals.com
Git Basics - Git Series Part 1
Vocal - a modern Vala podcast player - LinuxLinks
Microsoft Patch Tuesday 17134.228 Enhances Battery Performance and Mitigates L1TF Vulnerability - Appuals.com
ClickUp - An Awesome Project Management and Productivity App
Encrypting NFSv4 with Stunnel TLS | Linux Journal
Ubuntu updates for L1 Terminal Fault vulnerabilities | Ubuntu blog
L1 Terminal Fault - The Latest Speculative Execution Side Channel Attack - Phoronix
A sysadmin’s handy cheat sheet for SELinux | Opensource.com
No communication skills? Tech is not for you! | The ORACLE-BASE Blog
ODA database been stuck in deleting status - Blog dbi services
Intel discloses another set of processor vulnerabilities
VMware Security Advisory VMSA-2018-0020 and VMSA-2018-0021 - L1 Terminal Fault (L1TF): CVE-2018-3646, CVE-2018-3620, and CVE-2018-3615 - VMware Security & Compliance Blog - VMware Blogs
Comparison between Ansible and Puppet – Codingbee
BGP for Beginners
Beginner's Guide to Understanding BGP
Five Wishes: A Living Will That Goes Beyond Just Prolong / Do Not Prolong Life — My Money Blog
Wish 1: The Person I Want to Make Care Decisions for Me When I Can’t. Wish 2: The Kind of Medical Treatment I Want or Don’t Want. Wish 3: How Comfortable I Want to Be. Wish 4: How I Want People to Treat Me. Wish 5: What I Want My Loved Ones to Know.
Vulnerability Scanning vs. Penetration Testing: What is the difference, and what is right for me? – The Personal Blog of Sean Goodwin
How Mature Are Your Cyber Defender Strategies? - Blog | Tenable™
Must-Know Ransomware Statistics 2018
Cyber Attacks Make July a Painful Month for Healthcare
Open FAIR Complements Risk Management Programs | Security Architects Partners
IT threat evolution Q2 2018 - Securelist
NBlog - the NoticeBored blog: NBlog August 9 - cyberterms
Black Hat USA 2018: SamSam has yielded $6M for creators
TIDoS Framework - The Offensive Web Application Penetration Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
TIDoS
The only free ISO 27001 resources you will ever need – IT Governance Blog
Do you know the difference between cyber security and information security? – IT Governance Blog
How business continuity contributes to your organisation’s cyber resilience – IT Governance Blog
The Top 3 Open Source Tools for AWS Incident Response - Delta Risk
Gerald M. Weinberg: Writer - Consultant OFFICIAL WEBSITE Dedicated to Helping Smart People be Happy
GOP chair urges Senate to pass DHS cyber reorganization bill | TheHill
DevSecOps: The Keys to Success - HealthcareInfoSecurity
HIPAA Security Rule Turns 20: It's Time for a Facelift
Tom Walsh
CNIL warns pair of smaller companies about GDPR violations
Errata Security: What the Caesars (@DefCon) WiFi situation looks like
Vectra Spotlight Report - Manufacturing 2018
(2) New Messages!
Nmap Cheat Sheet – it…'s Notes
PRINCE2 project management with OpenProject – it…'s Notes
DISA Approves STIGs for VMware NSX on DoD Networks
Custom Certificate Replacement Guide
Network Architect vs Network Engineer (Part 2) — jumboframe.net
Network Architect vs Network Engineer (Part 1) — jumboframe.net
Altering MDT Task Sequence to Update from Windows Update – Stick To The Script
CISSP Study Agenda and Resources, 16-Weeks : cissp
Active Directory: Workstation Logon Restrictions (Log On To)
Server-side Ransomware SAMSAM Hits Healthcare Industry - Security News - Trend Micro USA
What Makes SamSam, the Ransomware that Crippled Atlanta, So Different
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…
Chris Hafey's Blog
My Road Warrior Survival Guide
Rethinking The Need For WSUS – Stick To The Script
6 Eye-Raising Third-Party Breaches
IBM WAS Global Security problems with Active Directory when Workstation Restrictions are configured - United States
LDAP error codes | ServiceNow Docs
Automate password changes with Ansible
Chrissanders88 presentations
Active Directory Schema Management | Alexander's Blog
acr2018final - cisco-acr-2018.pdf
How to Improve the California Consumer Privacy Act of 2018 | Electronic Frontier Foundation
User Login on JMX-console ;( |JBoss Developer
IDEAS IN FOOD: Triple Chocolate Remix
Trip of a lifetime to Japan
DSHR's Blog: The Blockchain Trilemma
Ultimate List of Tensorflow Resources for Machine Learning Engineers - Big Data Beard
Successful IT Departments Engage with End Users | APMdigest - Application Performance Management
PowerShell One-liner to Extract a Windows 10 Upgrade Error Code – smsagent
FreeBSD has its own TCP-queue-of-death bug, easier to hose than Linux's SegmentSmack • The Register
Windows 10 V1803: Domain join bug and a workaround | Born's Tech and Windows World
21 SysAdmin Influencers, Bloggers and Geeks to Follow - ITChronicles
The mechanics of Windows patching - in plain English | Computerworld
We continue at MS-DEFCON 1: Don’t install any of the July patches @ AskWoody
redhat: Cloudification Is Coming, but Service Providers’ Processes and Culture Must Change | Al Bawaba
The CEO of Red Hat Wants to See His Employees Cussing and Crying. The Reason Behind It Is Priceless | Inc.com
Easy Disaster Recovery Plan – neckercube.com
Firewalld: The Future is nftables - RHD Blog
VMware NSX - Top 9 Free Books To Read | ESX Virtualization
Black Hat USA 2018: Google, Microsoft and Red Hat dish on the Meltdown/Spectre backstory
Varying Tiers in the MSP Help Desk — Building Your Support System
Geo Redundancy: Amazon S3 vs Microsoft Azure Blob vs Google Cloud Storage
Delicious Onion Mushroom Pasta Recipe -- Gluten Free, Vegan, Frugal, and Easy | Penniless Parenting
Building a better thermostat with Home Assistant | Opensource.com
Multiple Flaws Discovered in Healthcare Software Firm - Infosecurity Magazine
How to Install and use Open vSwitch (OVS) 2.9 with KVM on CentOS 7 / RHEL 7 Server
DocBook - markup language for technical documentation - LinuxLinks
5 Tools to Scan a Linux Server for Malware and Rootkits
How to Install InvoicePlane on Ubuntu 18.04 LTS
South Carolina TV maker laying off most workers, blaming Trump tariffs - Japan Today
How to become a certified DPO – IT Governance Blog
WannaCry Outbreak Hits Chipmaker, Could Cost $170 Million
Do you need a vulnerability disclosure program? The feds say yes | CSO Online
PMKID Vulnerability that bypasses 4-way Handshake discovered in WPA2 WiFI Encryption - Appuals.com
Empowering Operations to Tackle Ransomware with Rubrik Polaris Radar - Wahl Network
Updating Debian from stretch to buster aka Debian 9 to 10
WannaCry has infected chip maker TSMC fabs … | Born's Tech and Windows World
Feeling the Heat of High-Frequency Trading | Hackaday
FAQs About Master's Degree in Cybersecurity from WGU | Alexander's Blog
Mastering MITRE's ATT&CK Matrix
Mitre ATT&CK matrix
Atlanta’s Reported Ransomware Bill: Up to $17 Million
How America Can Stop Being the Wild West of Data - Bloomberg
U.S. Treasury calls for national data breach notification and increased data protections
Black Hat Arsenal USA 2018 — The w0w lineup – Hack with GitHub – Medium
Most SMBs Not Equipped to Handle Security Concerns: Study
Do you have a data breach response plan? – IT Governance Blog
What is business continuity/ISO 22301 and why do you need it? – IT Governance Blog
Resurrecting a Dead Library: Part Two - Stabilization - mtlynch.io
A new WPA/WPA2 attack with PMKID | Born's Tech and Windows World
Failure Scenarios for vSAN — ThinkCharles.net
How To Enter BIOS Utility (UEFI Settings) On All PCs And Boot From USB?
Discus - Show Colourised Disk Space Usage in Linux
Proxmox config directory & files | SvennD
VMware vSphere 6.7 Performance Best Practices PDF | ESX Virtualization
Protecting your thoughts – Data Protection Hub
Valuable Lessons from My Second Year of Freedom | Mad Fientist
When cheap and simple turns into anything but… | A Rambling Geek
Snippet 0x0E: Booting image files and ISOs with KVM/QEMU (EFI and BIOS) - Philipp's Tech Blog
Raccoon - A High Performance Offensive Security Tool For Reconnaissance And Vulnerability Scanning - KitPloit - PenTest Tools for your Security Arsenal ☣
The default OpenSSH key encryption is worse than plaintext
Doc Searls Weblog · A helpful approach to personal data protection regulation
20180724-economic-espionage-pub.pdf
Increased Windows Modules coverage with PowerShell Core 6.1 | PowerShell Team Blog
SQL Performance troubleshooting guide: A walk through – Don Castelino
What are the best Performance Testing Tools? – Testing Spot
How to Find & Replace Outdated Windows Drivers
driverquery > driver.txt
Happy Birthday, Harry Potter: wizard-worthy Pi projects - Raspberry Pi
For a 7-Minute Workout, Try Our New App - The New York Times
Invoke-VMScriptPlus v2 - LucD notes
Diffusing The IT Blame Game With Network Visibility (by Keith Bromley)
Windows EOL dates differs for clients and servers | Born's Tech and Windows World
Venezuela says Maduro was target of attempted drone attack
My Own Car System, Rear Camera, Offline Maps & Routing, Map Matching with Go on Raspberry Pi part II · Fabrice Aneche
My Own Car System, Rear Camera, Offline Maps & Routing on Raspberry Pi part I · Fabrice Aneche
How to Make Android Faster: What Works and What Doesn't
Zero Day Initiative — Checking In: A Look Back at the First Half of 2018
Internet edge device security - NCSC Site
Global Threats to Information Systems | US-CERT
Securing Network Infrastructure Devices | US-CERT
6 Steps to Build an Incident Response Plan | Webroot
Windows Incident Response: The Future of IR, pt I
Thoughts on the Information Security Skill Set •
CSP Falco Space Asset - FINAL.pdf
Spectre: the vulnerability that just keeps on giving
Gen V Security - Bridging the (Cybersecurity) Generation Gap
OWTF v2.4 - Offensive Web Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
The age of cyberwar is here. Now, citizens need to have a say | David Sanger | Opinion | The Guardian
The Art of the Presentation (Part 3 of 3) | Thom Langford
Check IIS Health (Services, Site, AppPool Statuses) - Syspanda
Tracking & Monitoring Domain Admins with Logstash - Syspanda
Generate Windows Services Report - Syspanda
APT Trends Report Q2 2018 - Securelist
The Top 20 Penetration Testing Tools, Part 2
The GDPR is not a one-day thing - Security Art Work
Active Directory Security Risk Factors and What to Do About Them (Part 2) | Security Architects Partners
Active Directory Security Risk Factors and What to Do About Them (Part 1) | Security Architects Partners
CIS Adapts Critical Security Controls to Industrial Control Systems - Blog | Tenable™
Cybersecurity Benchmarking: Where’s The Data? - Blog | Tenable™
Cookies and consent at the IAPP
Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers
Vulnerability Management: Why the Problem Can't Be Solved
HHS Weighs Changes to Health Data Privacy Regulations
Securing the Internet of Things | US-CERT
FBI Releases Article on Securing the Internet of Things | US-CERT
Patch Lady – my response @ AskWoody
How GDPR Could Turn Privileged Insiders into ...
How to Set Clock Time on AD domain Controller and Sync Windows Clients – jasoncoltrin.com
How to configure multiple NTP network time servers on a Windows client · Ctrl blog
Find Windows 10 Upgrade Blockers with PowerShell – smsagent
Introducing: A Diverse, Free Stock Photo Library — The WordPress.com Blog
All about headroom and mandatory patching before June 2019 | Frits Hoogland Weblog
SDKMAN - A CLI Tool To Easily Manage Multiple Software Development Kits
Rose Eveleth, Podcast Producer | Cool Tools
AWS IoT Device Defender Now Available – Keep Your Connected Devices Safe | AWS News Blog
Configuring Ansible to Manage Windows Servers – Step by Step | Argon Systems
Testing POE with Pockethernet (by Tony Fortunato)
A PowerShell Conference In A Book | SQL DBA with A Beard
Senator suggests ways to combat misinformation and boost data privacy
The US is not prepared to shape global internet policy
Managed detection and response supports internal security teams
20 Fascinating Subreddits With Facts and Stories That'll Blow Your Mind
An open letter to Microsoft management re: Windows updating | Computerworld
Windows (10) Update Survey and an open letter to Microsoft | Born's Tech and Windows World
July 2018 patches: Review for administrators | Born's Tech and Windows World
It's Becoming Difficult to Discuss Interesting Topics With People Who Don't Read - Daniel Miessler
WTF - A Terminal Dashboard
Risk Based Security Announces Sponsorship and Integration With OWASP Dependency-Track
Security Technologies: ExecShield - Red Hat Customer Portal
SPECTRE Variant 1 scanning tool - Red Hat Customer Portal
American Cyber Security Firm FireEye Denies Hacking Chinese Military - Motherboard
We Need to Change the Dictionary Definition of 'Hacker' - Motherboard
Looking back at Microsoft’s July 2018-Patches | Born's Tech and Windows World
Virtualization The Future: VMware Certification Tracks and Levels Explained
All of Kodi Common Errors In This One Guide (With Images)
Your essential guide to what sysadmins really mean – Naked Security
Katello: Security Compliance Management with OpenSCAP | Lisenet.com :: Linux | Security | Networking
Intel patches three vulnerabilities in its Smart Sound Tech
WAScan v0.2.1 - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Faraday v3.0 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
CCTV and the GDPR – an overview for small businesses – IT Governance Blog
Ensure you’re #BreachReady in the media sector – IT Governance Blog
The NIS Regulations: Why cyber resilience is crucial – IT Governance Blog
Mandatory documents for ISO 27001:2013 – IT Governance Blog
Ransomware Attack Leads to Discovery of Lots More Malware
Healthcare Exchange Standards: Privacy and Security Considerations for the use of Open APIs for Patient Directed Exchange.
Summary: The War on Normal People - Daniel Miessler
Anatomy of the American Death Spiral - Daniel Miessler
Best Cybersecurity Certifications to Consider in 2019 | Alexander's Blog
How To Burp With Confidence - Our 5 Favorite Features | CQURE Academy
SQL Server on Linux - I/O internal thoughts
ODA, network interface and configure-firstnet - Blog dbi services
rapid7-under-the-hoodie-2018-research-report.pdf
What is a race condition? | Born's Tech and Windows World
Real-Time Rogue Wireless Access Point Detection with the Raspberry Pi | Linux Journal
The US as a threat. Love for NATO. This is how Canadians feel about security issues
Great Books about Strong Girls and Women -A Short List » Public Libraries Online
SharePoint Talk: GDPR/DSGVO Field Guide for Office 365 & Azure
The Law of Military Cyber Operations and the New NDAA - Lawfare
How to Attach a High-Gain Antenna to a Router (And Which One to Buy)
15 of the Best Courses on Udemy for Self-Improvement
Get Started With Ethical Hacking Using Kali Linux and Raspberry Pi
Dockerizing R and Python Web Services – Microsoft Machine Learning Server
Azure Government Marketplace expanding with new Pay-As-You-Go offers – Azure Government Cloud
The Different Ebook Formats Explained: EPUB, MOBI, AZW, IBA, and More
How to Cat-Proof Your Laptop Computer and Desk Area
Becoming a Full Stack Product Person
It’s About Time and Project Management | The Networking Nerd
Navigating IT Chaos: Why the Challenges of Discovery and Inventory Are More Relevant Than Ever | APMdigest - Application Performance Management
The State of IT Service Delivery: Next-Generation Technologies Force Change | APMdigest - Application Performance Management
Create a USB Drive for Windows Server 2019 Installation
2018 BH/DC/BSidesLV Hiring List ·
MPECS Inc. Blog: Hypervisor, Cluster, and Server Hardware Nomenclature (A quick what's what)
White House reportedly working on federal data privacy policy
Samsung patches multiple SmartThings Hub security flaws
11 Ways (Not) to Get Hacked - Kubernetes
DevOps Hiring: The Ultimate Guide | The Enterprisers Project
How to Install and Manage Virtual Machines and Containers
Some of Intel's Effort to Repair Spectre in Future CPUs | Linux Journal
Install ELK as Centralized Logfile Management Server on CentOS 7
How to Flush the DNS Cache on Linux - Make Tech Easier
Spectre CPU Attacks Could Go Remote With NetSpectre
My VCAP Network Virtualization Deployment exam experience | viktorious.nl – Virtualization & Cloud Management
17 Key MySQL Config File Settings (MySQL 5.7 proof) - Speedemy
Tech "R" Us (by Paul W. Smith)
Cookbook development on the VMware platform
Clint Boessen's Blog: Excluding TEMP Directory from User Profile Disks in Remote Desktop Services
Healthy Chinese Restaurant Style Pineapple Chicken Recipe -- Paleo, Gluten Free, Allergy Friendly | Penniless Parenting
Licensing Microsoft SQL Server in a VMware Cloud on AWS Environment - Part 2 - VMware Cloud Community
VRO Enable lockdown mode – Virtual Me
Virtualization Based Security (VBS) in vSphere 6.7 - VMARENA
Is your home a better investment than the stock market?
Keys to Maintaining a Lean Business Model as a Big Corporation
Bank Grade Security
Georgia congressman is the latest to introduce data privacy bills
These vSphere Configurations Will Slow Down Your VMs
MySQL Load Balancing with HAProxy - Tutorial | Severalnines
BDB Podcast EP 35 - Exploring the magical world of Disney Data Analytics - Big Data Beard
U.S. GAO - High-Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation
Azure Stack Readiness Checker – AzsReadinessChecker
Turning Tactical IT Into Strategic IT | APMdigest - Application Performance Management
The Mentor/Mentee Relationship | Don Jones
Software supply chain attacks set to become a major threat
Exactis breach exposes 340M records, may compel GDPR-like reg in U.S.
Perspectives of a former CISO: Disrupted security in digitalization – Microsoft Secure
A sysadmin's guide to Ansible: How to simplify tasks | Opensource.com
Policy Analyzer – minor update – Microsoft Security Guidance blog
NBlog - the NoticeBored blog: NBlog July 20 - ISO/IEC 27001 and 27031 revisions
Basic Digital Security Could Have Prevented One of the Biggest Political Scandals in American History - Motherboard
Canadian Telecoms Make the Most Money on Mobile Data in the World - Motherboard
Driving data security is a shared responsibility, here’s how you can protect yourself – Microsoft Secure
Assessing Microsoft 365 security solutions using the NIST Cybersecurity Framework – Microsoft Secure
Equifax agrees to cybersecurity regulations set forth by 8 U.S. States
Faraday Beta v3.0 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
ProbeManager - Centralize Management Of Intrusion Detection System Like Suricata, Bro, Ossec... - KitPloit - PenTest Tools for your Security Arsenal ☣
TP-Link-defaults - Python Script For Trying Default Passwords For Some TP-Link Hotspots - KitPloit - PenTest Tools for your Security Arsenal ☣
THRecon - Threat Hunting Reconnaissance Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
Doing More with Less: How MSSPs Succeed in Today's Cyber Landscape
VOOKI - Web Application Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Optiva Framework - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Study suggests buried Internet infrastructure at risk as sea levels rise | EurekAlert! Science News
LogonTracer - Investigate Malicious Windows Logon By Visualizing And Analyzing Windows Event Log - KitPloit - PenTest Tools for your Security Arsenal ☣
KillerBee - IEEE 802.15.4/ZigBee Security Research Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
5 data protection policies your organisation must have – IT Governance Blog
Load Balancing with HAProxy | StackPath Blog
How to do a SQL Vulnerability Assessment in SSMS - Mohammad Darab
ZDLRA ready for Oracle Database 18c – Upgrade your Database - NOW!
Real-life examples of social engineering – part 2 – IT Governance Blog
Real-life examples of social engineering – IT Governance Blog
How to perform a comprehensive vulnerability assessment – IT Governance Blog
Handling cyber threats in 7 simple steps – IT Governance Blog
Infographic: List of data breaches in 2017 – IT Governance Blog
25062018_Minimum_Cyber_Security_Standard_gov.uk__3_.pdf
Green paper: DSP Toolkit and NIS Regulations: The impact for healthcare organisations – IT Governance Blog
Maintaining independence of the DPO role in healthcare organisations – IT Governance Blog
How to simplify the data mapping process under the GDPR – IT Governance Blog
NIS Directive Consultancy
Information security and compliance training for the healthcare sector – IT Governance Blog
Tools to help identify gaps in your GDPR compliance – IT Governance Blog
The business case for ISO 27001 – IT Governance Blog
How to conduct an ISO 27001 internal audit – IT Governance Blog
The GDPR: Do you know the difference between personal data and sensitive data? – IT Governance Blog
The NIS Directive (NIS Regulations) – the UK law businesses need to know about – IT Governance Blog
Bill Text - AB-375 Privacy: personal information: businesses.
FDA: Make Sure EHRs Used for Clinical Studies Are Secure
Software Flaws: Why Is Patching So Hard? - HealthcareInfoSecurity
Why Cybersecurity Is Critical to Healthcare Innovation
A CIO on Carrying the Burden of Medical Device Cybersecurity
Cletis Earle
$4.3 Million HIPAA Penalty for 3 Breaches - HealthcareInfoSecurity
OpenSSH security and hardening - Linux Audit
How Can an ISAC Improve Cybersecurity and Resilience?
Comprehensive Guide to Sqlmap (Target Options)
Washington State to Launch Privacy Checklist Beta
DPO liability and potential insurance coverage
3 Ways Extract Password Hashes from NTDS.dit
LabCorp Still Recovering From Ransomware Attack
A New Effort to Draft Medical Device Cybersecurity Guidance
Equifax must incorporate stronger data security measures after massive breach, consent order says
EU Cybersecurity Plan Aims to Streamline Product Certification | Bloomberg Law
Cyber Readiness Institute
Global News Roundup — June 18–25, 2018
A year after WannaCry, healthcare organizations face mounting cyberthreats - Modern Healthcare Transformation Hub - Modern Healthcare
How your EU DPA wants your DPO's contact information
How many GDPR complaints so far?
AI spots legal problems with tech T&Cs in GDPR research project | TechCrunch
Brazil moves forward with online data protection efforts | ZDNet
Analysis: Vermont's data broker regulation
Amazon’s Healthcare Push Could Run into HIPAA Compliance Issues
The Best Encrypted Messaging Apps You Should Use Today [Updated]
Threat Model Thursdays: Crispin Cowan | Emergent Chaos
The Calculus of Threat Modeling — Leviathan Security
Errata Security: Lessons from nPetya one year later
Errata Security: SMB version detection in masscan
Evil Tester: Using a Travel Router for Mobile Testing
I reviewed 600+ call-for-paper submissions, (and you’ll probably guess what happened next.) – tisiphone.net
How to Test and Measure the Effectiveness of Your Security Awareness Program - Delta Risk
Aftershocks of GDPR: Making Sense of the Business-Wide Effects of New Data Privacy Laws - Delta Risk
Risk Deck | Emergynt
Adam Shostack: Tabletop Infosec Games
Cybersecurity Career Path – A Fresh Perspective - The Ethical Hacker Network
Cisco CPO: Privacy Is Not About Secrecy or Compliance
Secure by Default Is Not What You Think
A Technical Deep Dive into STARTTLS Everywhere | Electronic Frontier Foundation
The GDPR and Browser Fingerprinting: How It Changes the Game for the Sneakiest Web Trackers | Electronic Frontier Foundation
What We Talk About When We Talk About Risk
6 M&A Security Tips
Creating a Defensible Security Architecture
What The Code of Hammurabi Can Teach Us About Hardware and Software Liability - Daniel Miessler
The Evolution of the SOC and the CSIRT - Daniel Miessler
Getting Hired: A Few Tips ·
Windows 10 Pro V1803: SMBv1 ‘special traps’ | Born's Tech and Windows World
Lessons from My Strange Journey into InfoSec
How to perform a risk assessment: Rethinking the process | CSO Online
One-Third of Businesses Lack a Cybersecurity Expert
DNS Rebinding Explained - Daniel Miessler
New Cyber Center Opens at Augusta University in Georgia
Top reasons CEOs should care about privacy | CSO Online
gtir-executive-guide-2018.pdf
Home | balbix.com
Oracle CPU July 2018 | Onapsis
What makes CISOs successful? | CSO Online
To Raise Exceptional Children, Teach Them These 7 Values
Burstcoin Rig 1.0 & 1.5 being retired…. for a new rig – TDSheridan Lab
Solved: Use USG to block sites/apps, like ER - Ubiquiti Networks Community
GitHub - StevenBlack/hosts: Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
Five ways to make your presentation better | Seth's Blog
We’re still clueless about lifetime value | Seth's Blog
Advisory on July 2018 .NET Framework Updates | .NET Blog
New TETRA Trunk Tracker for use with SDR# and the TETRA Demodulator Plugin - rtl-sdr.com
Using a HackRF to Spoof GPS Navigation in Cars and Divert Drivers - rtl-sdr.com
.Net-Framework Update July 2018 pulled | Born's Tech and Windows World
Understanding Advanced Features in a Network Packet Broker (by Greg Zemlin)
My vSphere 6.7 Upgrade – WOW! – Notes from MWhite
9 Useful Electronics Tools Under $13 | Cool Tools
IT Architect: Foundation in the Art of Infrastructure Design: A Practical Guide for IT Architects · vNinja.net
Patch those Dell Servers easily! · vNinja.net
Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 3
NAS vs iSCSI: When You Need What
An Introduction to Cybersecurity: The First Five Steps – ThisHosting.Rocks
Patching my databases with the July 2018 PSU, BP and RU
I've reviewed and screened thousands of resumes, and I am sharing my preferred resume format, free to download as a Word doc (along with my best resume advice). : FinancialCareers
Small file performance on distributed filesystems - Round 2
Further Reflections on the Russian Hacking Indictment - Lawfare
How to convert System partition from MBR to GPT (EFI) on Windows 10 without loosing data – support for UEFI and SecureBoot – MILOSZENGEL.com
mbr2gpt
4 Steps to Automated Major Incident Management | APMdigest - Application Performance Management
9 New Microsoft Teams Features, Meetings and Chat Improvements - Tom Talks
Use PowerShell to Determine What Your System is Talking to – Mike F Robbins
The need for having both a DW and cubes | James Serra's Blog
Troubleshooting a Cloud Problem with Wireshark (by Paul Offord)
Building tiny container images | Opensource.com
Detect and correct orphaned ‘adminCount=1’ in Active Directory | >_
Revised .NET Framework Update KB4340558 (July 19, 2018) | Born's Tech and Windows World
Windows: Stop error 0xD1 in July 2018 updates explained | Born's Tech and Windows World
Rebuild
Streamlining build environment management with Linux containers
Linux Monitor Hard Disks Temperature With hddtemp - nixCraft
Building Debian packages in CI (ick)
How to Monitor Linux Server Security with Osquery
whowatch - Monitor Linux Users and Processes in Real Time
EncryptPad: Encrypted Text Editor For Your Secrets - Linux Uprising Blog
Free Virtual Machines from IE8 to MS Edge - Microsoft Edge Development
4n6k: Forensics Quickie: Identifying an Unknown GUID with Shellbags Explorer, Detailing Shell Item Extension Block 0xbeef0026, & Creative Cloud GUID Behavior
What is Yammer and why you need it - SharePoint Maven
Troubleshoot Windows 10 Battery Life and Modern Standby
Alacritty - A Fastest Terminal Emulator for Linux
Rewritten GandCrab Ransomware Targets SMB Vulnerabilities To Attack Faster
Linux history Command Tutorial for Beginners (8 Examples)
Seccomp security profiles for Docker | Docker Documentation
How The Update Framework is Working to Improve Software Delivery Security
SAP Security Notes July 2018 | Onapsis
The Best Blogs Every Network Engineer Must Follow - RouterFreak
MTU and TCP MSS
Microsoft 365 Usage Analytics, New Free Power BI Office 365 Usage Reports from Microsoft - Tom Talks
Containers or virtual machines: ​Which is more secure? The answer will surprise you | ZDNet
James Bottomley
Why the U.S. Needs Federal Data Privacy Legislation - Lawfare
9 Essential Personal Finance Skills to Teach Your Kid Before They Move Out
11 Stock Market Oddities — and How to Exploit Them
netdev day 1: IPsec! - Julia Evans
There are no shortcuts ~ Get Rich Slowly
Why ‘Find Your Passion’ Can Be Bad Advice — My Money Blog
Homemade Easy Apple Chips Recipe | Penniless Parenting
Why you should bundle the root CAs in your image - Fabio Alessandro "Fale" Locati's blog
Why DOD Should Look Before Leaping into Open Source | SIGNAL Magazine
6 Essential Tips to Help You Write Your World-Class Business Plan
The forever fallacy ~ Get Rich Slowly
Portland Underground Grad School
TxFS Linux File-System Supports ACID Transactions, Simple API - Phoronix
A Linux Sysadmin's Guide to Network Management, Troubleshooting and Debugging
Scout_Realtime - Monitor Server and Process Metrics in Linux
Insights Security Hardening Rules - Red Hat Customer Portal
Road to RHCA--Preparation Meets Opportunity | Linux Journal
The Road Less Traveled: Certifications Can Chart a Great Career in Linux and Open Source | Linux Journal
Taz Brown
Troy Hunt: The 111 Million Record Pemiblanc Credential Stuffing List
Teleconsole - Share Your Linux Terminal with Your Friends
5 open source principles that help DevOps teams excel | The Enterprisers Project
bootiso: Easy ISO To Bootable USB Drive From The Command Line - Linux Uprising Blog
Groot Simplifies Entering Chroot On Any Linux Distribution - Linux Uprising Blog
jobs.freenode.net
Is your Network Security Slowing you Down? (by Jason Nutt)
How to Prioritize Product Features and Improvements
Prioritizing a Technical Roadmap Against a Product Roadmap - via @codeship | via @codeship
What You Should Know About Penetration Testing - via @codeship | via @codeship
PowerShell For Programmers: Here Strings, There Strings, Everywhere Some String Strings – Kory Thacher
Book Review: Architecting Microsoft Azure Solutions – Exam Guide 70-535 – Azure Development Community
Staying up-to-date with .NET Container Images | .NET Blog
SAP on Azure: General Update – June 2018 | Running SAP Applications on the Microsoft Platform
Generating documentation as code with mermaid and PlantUML – Rule of Tech
White hat gray hat black hat - what's the difference? - The Silicon Underground
Budget pfSense build with workstation parts - The Silicon Underground
HP Z210
SAP on SQL Server – Performance Tuning and Optimization Clinic – Microsoft Premier Offerings for SAP
Understanding Containers – the layer between the operating system’s kernel and the application – Microsoft Faculty Connection
Key Differences between VM and Container Vulnerability Scanning – Steve Lasker's Web Log – blogs.msdn.microsoft.com/SteveLasker
PowerShell Settings file (import/export) – Joe Talks Microsoft
SharePoint User Adoption – SharePoint Steve
(82) Irving Younger's 10 Commandments Of Cross Examination at UC Hastings College Of The Law - YouTube
Windows Command-Line: The Evolution of the Windows Command-Line – Windows Command Line Tools For Developers
TEMPDB – Files and Trace Flags and Updates, Oh My! – MSSQL Tiger Team
MSDTC Supported Configurations – SQL Server Premier Field Engineer Blog
Preparing for Certified Kubernetes Application Developer (CKAD) exam and how it compares to CKA – Arsen Vladimirskiy
The SQL Server Defensive Dozen Part 2 – SQL Server Encryption, Key Management, And Data-At-Rest Encryption – SQL Server Cybersecurity
Steps for Hardening SQL Server 2016: The Defensive Dozen – SQL Server Cybersecurity
System.IO.Pipelines: High performance IO in .NET | .NET Blog
Raspberry Pi + Azure Functions + Cognitive Services + Microsoft Teams -> How a Pi informs us about lunch | modern workplace solutions
What is your Agile? – Premier Developer
The Best 18650 Battery and How to Avoid Buying Fakes
The 12 Best Kodi Add-Ons for Watching Live News
How to Network Boot a Raspberry Pi Without a MicroSD Card
8 Surprising Uses for Linux That You Can (Mostly) Try Yourself
How to Record Audio With a USB Microphone on Android
5 of the Most Famous Computer Viruses and Their Terrible Impact
5 Causes for a Raspberry Pi That Won't Boot (And How to Fix Them)
How to Encrypt and Protect Your Data and Files Using VeraCrypt
6 Helpful Machine Learning Tutorials and Courses to Grasp the Essentials
Secure coding practices in Java: challenges and vulnerabilities | the morning paper
How not to structure your database-backed web applications: a study of performance bugs in the wild | the morning paper
EnclaveDB: a secure database using SGX | the morning paper
Machine Learning Getting Started Guide | Tallan's Blog
Generating a WiFi Radio Heatmap with a Helical Antenna, Antenna Rotator and a HackRF - rtl-sdr.com
Tracking Police and Military Aircraft at the G7 Summit with an RTL-SDR - rtl-sdr.com
Has paying the ransom become business as usual? - Help Net Security
Exposing Hospital Pager Privacy Breaches - rtl-sdr.com
Ten awesome 3D-printable Raspberry Pi goodies - Raspberry Pi
How To Get Rockwell TechED 2018 Labs and Presentations for Free - The Automation Blog
Installing Powershell on Centos 7
Microsoft’s July 2018 patch mess – put update install on hold | Born's Tech and Windows World
Identity Theft, Credit Reports, and You | Kalzumeus Software
PowerShell Functions to Get Logged On User and Logoff Logged On User – Jason Pearce
Removing The Last Governor: Core Software Pricing - IT Jungle
IDEAS IN FOOD: Bubble Mix
Microsoft Teams Free Version, What's included, What's not? - Tom Talks
AWS Storage Gateway Recap – SMB Support, RefreshCache Event, and More | AWS News Blog
96-core ARM supercomputer using the NanoPi-Fire3 | Climbers.net
Teardown Of USB Fan Reveals Journalists’ Lack Of Opsec | Hackaday
U.S. GAO - Information Security: Supply Chain Risks Affecting Federal Agencies
How to use PowerShell jobs to parallelize scripts – Virtually Sober
A rare breed of the brute-force: A history of one attack
70 percent would leave a job if their digital activity was secretly monitored
How Nonprofits Practice Continuous Improvement | Beth's Blog
Best practices for securing the container life cycle – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
CredSSP, Windows RDP connection error. | Nerd Drivel
Chris's Wiki :: blog/solaris/ZFSOurSparesSystemII
How to easily detect SMBv1 scanning by using your traffic! ( by John Bronson)
Open Source Elasticsearch Security: Using Cilium for Elasticsearch Access Control with No App/Container Changes — Cilium
PowerShell Script to Backup / Restore Clipboard Contents | chentiangemalc
The basics of continuous integration and delivery tools: BuildBot, CircleCI, Jenkins, Spinnaker, and Zuul | HPE
How to Setup Django Development Environment on Ubuntu 18.04
26 Useful Windows Command Prompt Tricks You Might Not Know
This Server Technology Is a Game Changer so You Better Be Ready – Blades Made Simple
Spear Phishing Attack Prevention Best Practices and Tools
How to Install PowerCLI on Ubuntu Linux 18.04 LTS
Latest Fling from VMware Labs - ESXi Compatibility Checker - Eric Sloof - NTPRO.NL
How To Become an NSX Expert in 72 Hours - ActualTech.io
80,000 Hours user data is affected by the Typeform data breach - 80,000 Hours
Fibre Channel vs iSCSI: Choosing with SAN in Mind
Microsoft Security Compliance Toolkit 1.0 | Microsoft Docs
Revisiting wallabag, an open source alternative to Instapaper | Opensource.com
2018-07: OpenSprinkler, Qubes OS | KWLUG - Kitchener-Waterloo Linux User Group
Windows Admin Center Update - New Features in latest build | ESX Virtualization
Create an IoT sensor with NodeMCU and Lua
How to enable all SysRq functions on Linux - LinuxConfig.org
DIY RV Offsite Backup and Media Server | Linux Journal
Chris's Wiki :: blog/python/SortTakesTupleKeys
Why Automation Matters : ITIL | The ORACLE-BASE Blog
How To Configure SSH Key-based Authentication In Linux - OSTechNix
How to Create and Delete Virtual Machine from Command line in OpenStack
What Is "Pseudo AI": Humans Disguised As Bots Because Manual Labor Is Cheap
WellMess: This Go-based Malware Attacks Both Linux And Windows Machines
6 must-read internet standards | Opensource.com
Tips for transitioning from Hudson to Jenkins
A Look at Federal Student Loan Borrowing by Field of Study – Robert Kelchen
Install Windows Admin Center (WAC) using DSC – PowerShell, Programming and DevOps
Rob England on Twitter: "From my presentation "Project Management was the worst thing ever to happen to IT" comes 20 dysfunctions of IT project management… https://t.co/EtfuaklBd8"
No visibility in the GDPR era, be ready for BIG fines! (by Derek Burke)
Should I move up the ladder or stay low and technical? - part 2 - The Matrix has you...
Chris's Wiki :: blog/sysadmin/HowWeSellStorage
Chris's Wiki :: blog/web/POSTWithoutContentType
Chris's Wiki :: blog/sysadmin/SSHAltPortNoSecurity
18c: some optimization about redo size - Blog dbi services
Azure Kubernetes Hackfest - Day 2 - Eric’s Azure Blog
Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
containers operating system virtualization
Setting up Nginx reverse-proxy for distributed Minio S3 deployment - CormacHogan.com
OS Hardening vs Data Protection: Is Your Data Really Safe?
Land Your First MSP Client: 6 Tips for Managed Service Providers
MSP Infographics: Managed IT Service Providers Survey
Why Freedom is Essential to Security and Privacy – Purism
Containers Break the Shared Responsibility Model Between Cloud Providers and Ops  - The New Stack
Linux With Education - Best Free Education Apps - LinuxLinks
Why SMS should never be used as second factor - Fabio Alessandro "Fale" Locati's blog
CentOS 6.10 Released, Scientific Linux 6.10 Coming Next Week - Phoronix
Using Ansible to set up a workstation - Fedora Magazine
MindForger - More Than A Notebook and Markdown IDE
Sosreport - A Tool To Collect System Logs And Diagnostic Information
10 killer tools for the admin in a hurry | Opensource.com
Weekend Reading: Python | Linux Journal
Terrible Ideas in Git | Linux Journal
AWS Online Tech Talks – July 2018 | AWS News Blog
Introducing the OpenFaaS Operator for Serverless on Kubernetes
ESXi CLIativity – Part 2 | Adventures in a Virtual World
What is RAMPAGE Attack? Why It Affects Every Android Since 2012?
Historical inventory of collaborative editors - anarcat
Solution for Windows Update Error 0x800705b4 (2018-06 Cumulative Update) | Alexander's Blog
Latest on TLBleed | Tux Machines
Ticketmaster’s data breach - what to do next
Pyenv - Install Multiple Python Versions for Specific Project
How to explain blockchain in plain English | The Enterprisers Project
Embedded software device security | Timesys Embedded Linux
PMP Certified!
The Vertica exam asked very little about the underlying architecture and use cases of the product and more about esoteric features and point-and-click GUI stuff. I find little value in vendor certifications and their exams when the questions are merely a marketing ruse.
LMTV LIVE | How To Diffuse The IT Blame Game (with Keith Bromley and Scott Peerbolte)
Jekyll is so much better than Drupal and Wordpress
Deployment Research > Research
I Didn’t Even Know I Was Sick – Ethan Banks
Creating connection between Azure and Amazon EC2 | geekdudes
Wellington Home Automation Hackers | Jethro Carr
Case Study: Scaling Your Data Scientist
Cloud Vendor Lock-in
LACP Configuration in vSphere 6.5 - JBcomp.com
Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 2
Bare Metal Deployment of ESXi on HP Proliant Hardware: Part 1
Summary: The Department of Homeland Security’s Cybersecurity Strategy - Lawfare
Cilium 1.1: Istio sidecar mode, cri-o/containerd support, improved efficiency & scale, init policies — Cilium
WSUS: Microsoft Update Catalog Import failure | Born's Tech and Windows World
Remote security assessments in Solaris 11.4 beta | rootpool
Seven Ways to Protect Your Organization’s Privileged Accounts - CSO | The Resource for Data Security Executives
Private-Sector Initiatives for Cyber Norms: A Summary - Lawfare
A Glimpse into Private-Sector Cybersecurity in Japan - Lawfare
Tuned - Automatic Performance Tuning of CentOS/RHEL Servers
Passive income vs. passion income ~ Get Rich Slowly
Write an MBA-Worthy Business Plan That Will Lead You to Success
HSA Accounts: 4 Reasons Why They Benefit Your Business
DSHR's Blog: The Four Most Expensive Words in the English Language
Dan Ruderman, Physicist and technologist | Cool Tools
flashcards
Should I move up the ladder or stay low and technical? - part 1 - The Matrix has you...
Will IT Certifications Help My Career? - Big Data Beard
Advanced scheduling of your patching maintenance windows - System Center Central
Cloud Automation Boosts Revenue and Profitability | APMdigest - Application Performance Management
Automation of endpoint security is top priority for IT pros
Is antivirus still relevant for your organization?
The Dark Side of Stress - The IT Hollow
PowerShell: Hyper-V Virtual Machine Backup Utility (v4.3) – Stick To The Script
Azure Data Architecture Guide (ADAG) | James Serra's Blog
Connecting Azure virtual machines in different regions | geekdudes
Create Interactive Charts with WPF and PowerShell – smsagent
Cisco ASA: VPNs With Overlapping Subnets | PeteNetLive
My Super Frugal Trip to Brussels, Belgium | Penniless Parenting
Are Hypervisor's Commodity Today? — ThinkCharles.net
Patch Lady – cleaning up on the weekend @ AskWoody
Review: How InSpec 2.0 delivers comprehensive compliance | CSO Online
Authenticating Customers & Identifying Fraudsters - Pindrop
Cost savings of the cloud | James Serra's Blog
Understanding Cosmos DB | James Serra's Blog
PKI Infrastructure (01) – Introduction & Certificate Lifetimes | Erik Bussink
Deployment Research > Research
Moving to Hetzner VPS: Shorter legal docs as a competitive advantage · Ctrl blog
Chris's Wiki :: blog/unix/XBackspaceTerminateHistory
Chris's Wiki :: blog/sysadmin/RunningServersNotTrivial
Chris's Wiki :: blog/sysadmin/DisablingAccountChallenge
Chris's Wiki :: blog/solaris/ZFSDirectoriesAndChanges
Fix: Windows 10 hangs in update installation loop | Born's Tech and Windows World
Office 365: Zero-Font bypassing weakens email security | Born's Tech and Windows World
Using ARA Records Ansible Within Projects - EverythingShouldBeVirtual
GitHub - openstack/ara: ARA records Ansible Playbook runs and provides intuitive interfaces to browse them
Samsung packs 8TB into its new PCIe 4.0 SSD sporting 3,100MB/s read speeds, more | 9to5Toys
Terence Luk: Scoring an A grading from Qualys SSL Labs with VMware Horizon View 7.4.0 Security Server
Fix phones, tablets, laptops, more w/ this 77-in-1 screwdriver kit for $17 Prime shipped | 9to5Toys
Kickstarting your Z-Wave smart home: The best hubs, switches, sensors and more | 9to5Toys
Minio S3 object store deployed as a set of VMs on vSAN - CormacHogan.com
BCDR: Business Continuity and Disaster Recovery
Patching Oracle Database 18.1.0 to 18.2.0 on premises
A Quick Intro to the AWS CLI - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Creating a Database and Connecting on Oracle Cloud | EzDBA – BLOG
Anatomy of a perfect pull request | Opensource.com
Containers and Cloud Security | James Bottomley's random Pages
How to Monitor Nginx Performance Using Netdata on CentOS 7
GitHub - firehol/netdata: Get control of your servers. Simple. Effective. Awesome! https://my-netdata.io/
How to Use OpenVAS to Audit the Security of Your Network (2/2)
Vulnerability Scanning with OpenVAS 9 part 1: Installation & Setup - Hacking Tutorials
Can Congress Improve Our Cyber Deterrence Posture? - Lawfare
continuous integration should be fun
A Platform Of A Certain Age And Respectability - IT Jungle
Amazon Polly Plugin for WordPress Update – Translate and Vocalize Your Content | AWS News Blog
Installing Oracle Database 18c – Upgrade your Database - NOW!
Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 3
Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 2
Brendan Tierney - Oralytics Blog: Twitter Analytics using Python - Part 1
Cisco Switch Configuration: an Easy and Quick Guide - RouterFreak
Off to the Kubernetes – Networking in a Post VM world — EtherealMind
Supply-Chain Attacks: Why the U.S. Should Worry - Lawfare
The Cyberspace Solarium Commission: A Timely Proposal - Lawfare
June 19 Has Been Declared National FreeBSD Day, Happy 25th Anniversary FreeBSD!
Speeding up Cornercases | Angry Cane Ramblings
How Linux & Open Tech Empower Medical Healthcare | It's FOSS
My First CCIE Lab Attempt – neckercube.com
How To Build A 4-Week Treasury Bill Ladder: A Visual Guide — My Money Blog
Your LinkedIn Company Page Is Dull. Here Are 10 Ways to Fix That.
Why Automation Matters : Reliability and Confidence | The ORACLE-BASE Blog
Upgrade Oracle 12.2.0.1 to Oracle Database 18c on-premises
Identifying & Resolving Excessive CPU Overcommitment (vCPU:pCore ratios) | CloudXC
Linux, BSD, and everything else...: Nomadic Working with NomadBSD 1.0.1 - BSD on a stick
Decision-Making in Self-Management Organizations Using Systemic Consensus -
How to generate a UML diagram using Powershell And GraphViz -
Industries Most and Least Likely to Be Disrupted in 2018 | APMdigest - Application Performance Management
Installing macOS Mojave 10.14 Developer Beta on Proxmox 5.2 – Nicholas Sherlock
Python Lambda script for Cleaning Up unused Amazon EC2 instances | geekdudes
Database Migration Guide – June 2018 updates – Microsoft Data Migration Blog
Windows Incident Response: Coding in DFIR
Probequest - Toolkit For Playing With Wi-Fi Probe Requests - KitPloit - PenTest Tools for your Security Arsenal ☣
My Tactical Advice for Clearing Depression - Daniel Miessler
Chris's Wiki :: blog/linux/LinuxBootOverview
Cloud Storage, File Sharing Apps and GDPR: This Could Get Ugly Fast! - Security Boulevard
Can Security be a Business Enabler? – ShiftLeft Blog
A language to speak Dev[Sec]Ops – ShiftLeft Blog
Here are the 2 biggest IT priorities for boards of directors - TechRepublic
To keep pace with digital transformation, boards of directors at many companies are prioritizing cybersecurity skills, and operational risk and compliance. The tech talent shortage is one major barrier to digital transformation success, with security and analytics skills in high demand.
Don't Rely on Long Support Lifecycles · Lindsay Hill
The Zero Trust Model Provides a More Proactive Approach to Security
Group Fines Under the GDPR – Threat Stack
AWS Security Monitoring Checklist - Security Boulevard
Making Sense of Tomorrow’s Cybersecurity Trends
A Totally Tubular Treatise on TRITON and TriStation « A Totally Tubular Treatise on TRITON and TriStation | FireEye Inc
Introducing Gaum: An Open Source O/RM That isn’t an O/RM
How Ransomware Is Changing Cybersecurity and What To Do About It - Security Boulevard
Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty | Radware Blog
Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty - Security Boulevard
What is AWS PCI Compliance? – Threat Stack
What Systems Keep You Effective? - Security Boulevard
CISOs Have an Opportunity to Shine as Regulations Enforce Change, Gartner Says
PCI DSS 3.2.1 FAQs - Security Boulevard
Cybersecurity: Protecting All the Endpoints
Automated SQL Injection Testing of Serverless Functions On a Shoestring Budget (and Some Good Music) - Security Boulevard
Monitoring Data & Data Access to Support Ongoing GDPR Compliance – Part III: Tools - Security Boulevard
Healthcare: Security in Crisis? - Social-Engineer.Com - Professional Social Engineering Training and Services
How to Secure Public Cloud and DevOps? Get Unified Visibility. - Blog | Tenable™
Cyber security - How Threat Hunters Operate in Modern Security EnvironmentsSecurity Affairs
ICS/SCADA Smart Scanning: Discover and Assess IT-Based Systems in Converged IT/OT Environments - Blog | Tenable™
Monitoring VPN Logins & Incorporating them to AD - Syspanda
CISSP CAT Exam Deep Dive: Study Tips from InfoSec Institute Alum Joe Wauson
Cyber Defense e-Magazines – Cyber Defense Magazine
Cybersecurity Framework | NIST
Updated 1.1
Highlights from Verizon DBIR 2018 - Security Boulevard
Identity Governance and Administration (IGA) in IT Infrastructure of Today - Security Boulevard
GitHub - WaterByWind/edgeos-bl-mgmt: Automated updating of EdgeOS firewall network-group to be used as source address blacklist
NBlog - the NoticeBored blog: NBlog June 14 - metrics maturity metric, mmm
Are your Android apps sending unencrypted data? – Naked Security
Back to Basics: Building a Foundation for Cyber Integrity - basics-building-foundation-cyber-integrity-38455
NBlog - the NoticeBored blog: NBlog June 5 - security frameworks
NBlog - the NoticeBored blog: NBlog June 12 - infosec priorities
Florida leads list of states with worst cyber hygiene, New Hampshire the safest
How to become a Linux security expert? - Linux Audit
Bad .Men at .Work. Please Don’t .Click — Krebs on Security
Cybersecurity Reference Architecture: Security for a Hybrid Enterprise – Microsoft Secure
Updating your cybersecurity strategy to enable and accelerate digital transformation – Microsoft Secure
Building Zero Trust networks with Microsoft 365 – Microsoft Secure
The Spamhaus Project - The Top 10 Most Abused TLDs
RDP logs and incident response - Koen Van Impe - vanimpe.eu
DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital Forensics, Malware Analysis, And Network Defense - KitPloit - PenTest Tools for your Security Arsenal ☣
DejaVU - Open Source Deception Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
Why incident response planning is critical for your organisation – IT Governance Blog
Only 24% of organisations consistency apply incident response plans – IT Governance Blog
Wifite 2.1.0 - Automated Wireless Attack Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Namechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than 100 Websites, Forums And Social Networks - KitPloit - PenTest Tools for your Security Arsenal ☣
Omnibus - Open Source Intelligence Collection, Research, And Artifact Management - KitPloit - PenTest Tools for your Security Arsenal ☣
Omnibus
Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style - KitPloit - PenTest Tools for your Security Arsenal ☣
Rastrea2r
Requirements of a DPO in health and social care – IT Governance Blog
Organisations must invest more in incident response planning – IT Governance Blog
5 ways to become a successful distance learning student – IT Governance Blog
4 tips for incident response management success – IT Governance Blog
What are the Data Subject Rights under the GDPR? – IT Governance Blog
GDPR: lawful bases for processing, with examples – IT Governance Blog
JPCERT/CC Blog: How to Describe Vulnerability Information?
Drone Forensics Gets a Boost With New Data on NIST Website | NIST
Infosecurity.US - Web Log - The First Cyberattack
The 3 Must Knows of Sandboxing
Building a Strong, Intentional and Sustainable Security Culture
4 Cybersecurity Tips for Staying Safe During the World Cup
Implementing appropriate security under the GDPR
How to Protect Your DNS Privacy on Ubuntu 18.04 with DNS over TLS
How not to write your GDPR-'compliant' data protection notice
One-third of healthcare CIOs 'still on the journey' to comply with GDPR privacy rules
Security Ratings Answer Big Questions in Cyber ...
Understanding data processors’ ISO and SOC 2 credentials for GDPR compliance
ISO explained
Facebook, Google Targeted Among 19 Pan-EU Privacy Complaints - Bloomberg
Bash tips for everyday at the command line | Opensource.com
A complete 5G standard is finally here
15 Best Security Podcasts For You
Should the FDA Create a Cybersecurity Measuring Stick?
Linux Privilege Escalation using LD_Preload
Evil Tester: Notes on Shift Left in Testing and Software Development
The L0pht Legacy - The Ethical Hacker Network
Medical Device Cyber Vulnerabilities: More Alerts
How to Use the NIST Cybersecurity Framework - HealthcareInfoSecurity
Congress Considers Ways to Beef Up Healthcare Cybersecurity
Erik Decker
The best free cultural & educational media on the web | Open Culture
Read This Before Signing Up for a Programming or Coding Course!
Using PowerShell to report on thousands of Microsoft SQL Instances & Databases – Virtually Sober
These 10 Security Experts Are Making Your Life More Secure
Neat Odroid & GlusterFS Build Stashes Data, Sips Power | Hackaday
StarWind Free Virtual Tape Library (VTL) | ESX Virtualization
Meet 'Bro': The Best-Kept Secret of Network Security
15 Octave Commands Every Data Scientist Must Know - Big Data Beard
Security metrics you need for the board | CSO Online
Ubunsys - An Advanced System Configuration Utility For Ubuntu Power Users - OSTechNix
Welcome to NTPsec
Open Social Security: Free, Open-Source Social Security Calculator
The GDPR initiative and how it affects US government and industry | CSO Online
Modern Cybersecurity Demands a Different Corporate ...
Security and Privacy Are Not As Different As People Think - Daniel Miessler
Managed Service Providers vs In-House IT Administrators
How to Configure ESXi Unattended Installations: Part 2
What is the New York Cybersecurity Regulation? What you need to do to comply | CSO Online
Generating a docs website powered by Git & Markdown – Karim Vaes
NSE Scripts – More Than Scanning | CQURE Academy
Difference Between Multi-Factor Authentication and Multi-Step Authentication | Alexander's Blog
Integrity and ethics in IT | The IT Skeptic
ODROID-HC2 as an entry-level NAS | Logan Marchione
The Life of Kenneth: Peering with Root DNS Servers
PowerShell Practice Makes Perfect
Look who's coming to Raspberry Fields 2018! - Raspberry Pi
Build your own weather station with our new guide! - Raspberry Pi
Synchronize your watches | Seth's Blog
CrowPi: Raspberry Pi Experimenters Kit Review (With RTL-SDR and RPiTX Tests) - rtl-sdr.com
Working with JSON data in PowerShell – Kory Thacher
App Service Diagnostics – Profiling an ASP.NET Web App on Azure App Service | Azure App Service Team Blog
DSC Resource Kit Release June 2018 | PowerShell Team Blog
joeware – never stop exploring… :) » Blog Archive » Non-Expiring IDs Redux
ITAR Compliance: Guidelines for Companies Dealing with USML
NAT discussions, fact checking, and debate - The Forwarding Plane | The Forwarding Plane
Network Labs Using Nested Virtualization in the Cloud | Open-Source Routing and Network Simulation
Why Automation Matters : Lost Time | The ORACLE-BASE Blog
IT decision makers limit cloud use due to difficulties with compliance
New solution helps secure infrastructure across OT and IT environments
Why Nonprofit Workplaces Are Stressful and What To Do About It | Beth's Blog
What Is a Breadboard and How Does It Work? A Quick Crash Course
Center for Humane Technology
Chotto: A Little Japanese Word with 7 Different Meanings
VMware's Accidental Containerization Hero
Microsoft May 2018 Security Update CredSSP Issue
ADB Exploit Leaves Thousands Of Android Devices Exposed To Attackers
Microsoft and friends need to explain why always-connected PCs make sense
ACPC
Restaurant Style Pasta with Three Cheese Sauce Recipe -- Easy, Gluten Free, and Delicious | Penniless Parenting
The four-percent rule for safe withdrawals during retirement
7 Tips for Issuing an Effective Press Release
Windows Server 2019 What's New - Insider Preview Build 17666 | ESX Virtualization
Want Your Child To Eat (Almost) Everything? There Is A Way : The Salt : NPR
Using KSQL, Apache Kafka, a Raspberry Pi and a software defined radio to find the plane that wakes…
XenServer PowerShell – New Windows VM from ISO | Ask the Architect
Why You Should Use Windows Subsystem for Linux -- Virtualization Review
Hacking When It Counts: The Magnetron Goes to War | Hackaday
Understanding Cosmos DB | James Serra's Blog
Bacula enterprise backup: Review - ITSMDaily.com
A Better Way to Hire & Scale Your Team
AMA: Do You Worry About Your Career? | Don Jones
A third of IT professionals don't know how many endpoints they manage
71 percent of IT pros believe they can hack any organization
DevOps Balanced Scorecard Dashboard | The IT Skeptic
Top Five Ways to Optimize Performance Monitoring (by Keith Bromley)
Is your network provider peered with Microsoft? - Tom Talks
Office 365 Connectivity Guidance – On The Wire
Gartner: Digital Workers Think Management is Out of Touch with Technology | APMdigest - Application Performance Management
Cisco Stacking 2960-X Catalyst Switches | PeteNetLive
The Future Isn’t In Databases, But In the Data - Thomas LaRock
Advanced Standalone Kubelet tutorial for Raspberry Pi - Povilas Versockas
How to find the Windows Experience Index in Windows 10 with Powershell – jasoncoltrin.com
Deployment Research > Research
ZPAQ
GDPR: Continental bans WhatsApp & Snapchat | Born's Tech and Windows World
In Memory Performance, Hyperconverged Simplicity – SAP HANA Validated on Nutanix AHV | Long White Virtual Clouds
Chris's Wiki :: blog/unix/SbrkVersusMmap
Lynis – Automated Security Auditing tool for Linux Servers
Quick tip: Testing volume licensing activation by a KMS | >_
A Quadruple-Provider Vagrant Environment - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Need Help with Oracle Security GDPR Training and Services
Massive Delete | Oracle Scratchpad
Exploring Kubernetes with Kubeadm, Part 1: Introduction - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Half-baked ideas: Server remote management with an RPi Zero | Richard WM Jones
Slow network throughput between Ubiquiti EdgeRouter VLANs - IVOBEERENS.nl
CCNA Training » CCNAv3 – New Questions Part 2
RedEye Ransomware Destroys Your PC Files If Payment Isn't Made
Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
HDD and SSD Maintenance Checklist
ESXi boot fatal error 33 inconsistent data | Adventures in a Virtual World
Explaining your "Why" | Opensource.com
Why You Need To Understand Your Software Supply Chain
Read Ebooks Quicker With This Spritz-Like Fast Reading Command Line Software - Linux Uprising Blog
How this media company became the first to broadcast entirely on Linux | Opensource.com
Five Free Open Source Testing Tools You Can Trust | Information Security Buzz
Standup report: June 8th, 2018 | Will's blog
Homemade Cashew Based Hummus Recipe --- Paleo, Vegan, and Easy | Penniless Parenting
Hummus Recipe
Volume Shadow Copy Service: Overview and Troubleshooting
SAP on AWS – Past, Present, and Future | AWS News Blog
Amazon EKS – Now Generally Available | AWS News Blog
FCC shrugs at fake cell towers around the White House
Using MQTT to send and receive data for your next project | Opensource.com
Citellus: Validate your deployments
Creating a Wildfly cluster for load-balancing in Linux - LinuxTechLab
How to Monitor Apache Performance using Netdata on CentOS 7
Atlanta ransomware attack may cost another $9.5 million to fix
Censorship in the Age of Large Cloud Providers - Lawfare
How Apple Programmer Sal Soghoian Got Apps Talking to Each Other | WIRED
How to Build an Amazon Echo with Raspberry Pi - Make Tech Easier
Open Source Kata Project Improves Security With Virtualized Containers
Data Privacy: Why It Matters and How to Protect Yourself | Linux Journal
An Inside Look at OpenStack Security Efforts
procinfo - Shows System Statistics from /proc Filesystem
A Starter Collection of Blockchain Explainers | DennisKennedy.Blog
The Fifth Anniversary of the Snowden Disclosures - Lawfare
Make a $6 Tiny Portable Weather Station that Transmits Live Data Wherever You Are
18650 control boards
How to dismantle a compiler bomb | Code Explainer
The Importance of Using SIEM for GDPR Compliance - Security Boulevard
CISSP Official Study Guide 8th Edition - What's new
Think You’ve Got Your Credit Freezes Covered? Think Again. — Krebs on Security
NCTUE
Rethinking the “Lessons” of the First World War - Lawfare
Working with Ansible and AWS EC2, SG, ASG and ELB tags - Alex Scoble's IT Notes - An Information Technology Blog
NPM Fails Worldwide With "ERR! 418 I'm a Teapot" Error
Announcing Federal Security and Compliance Controls for Docker Datacenter - Docker Blog
You receive a "logon failure: unknown user name or bad" error message while accessing remote security-enhanced resources from an ASP.NET application
TigerText now TigerConnect | Clinical Communication Solutions
Products · NRS Systems
Binmap: a system scanner
How to: Login to your Microsoft Azure Subscription using Powershell «
How big is the Microsoft Azure Cloud? «
List all VM sizes in Microsoft Azure per Location «
3 Tools for Automating Deployments in the Era of the Modern Hybrid Cloud «
VulnDB
Why there are at least 6,000 vulnerabilities without CVE IDs | Synopsys
Script to Reset WSUS for SysPrep’ed Image – Random Musings of Jeremy Jameson
Adamj Clean-WSUS Powershell Script : sysadmin
Clean Up WSUS the Easy Way - Step by Step
Script Reset WSUS Authorization and get new WSUS SID
Script Reset Windows Update Agent
GitHub - strongdm/comply: Compliance automation framework, focused on SOC2
The State of ICS: One Year Into the Cyber Executive Order
Security: Getting Off the Patch - The Shining Hope - Security Boulevard
SecMon State of the Union: Refreshing Requirements - Security Boulevard
Security: Getting Off the Patch - The Shining Hope
Crashing HDDs by launching an attack with sonic and ultrasonic signalsSecurity Affairs
The Ultimate Guide to CompTIA’s Security+ Certification - Security Boulevard
The Security+ CBK Domains: Information And Updates - Security Boulevard
GDPR Is Affecting the Way WHOIS Works, Security Researchers Worry
What GDPR Compliance means to the IT Security Professional - Security Boulevard
50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts – Threat Stack
Home
Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
Developing GDPR compliant applications, Part 2: Application privacy by design
Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
Manage your fleet’s firewalls with osquery | Trail of Bits Blog
Back to basics: What sysadmins must know about logging and monitoring | HPE
The crooked timber of humanity | 1843
Resetting Your Router the Paranoid (=Right) Way - Resetting Your Router the Paranoid (=Right) Way
Binary analysis with Radare2 - Binary analysis with Radare2
Radare2
Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups - KitPloit - PenTest Tools for your Security Arsenal ☣
Prowler - Distributed Network Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages - KitPloit - PenTest Tools for your Security Arsenal ☣
GitHub - trimstray/otseca: Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
What goes in an incident response plan? – IT Governance Blog
5 tips to thwart medical device attacks | CSO Online
Evil Tester: Google Advanced Searches - Google Dorks
How to implement an ISMS aligned with ISO 27001 – IT Governance Blog
PCI DSS compliance made easier – IT Governance Blog
How to Prevent Cloud Configuration Errors
Sysadmin Stories: PowerCLI - Get the sizing of virtual machines
I/O Analyzer
13 tools for checking the security risk of open-source dependencies
Librarians, Meet Your Motherboard » Public Libraries Online
Ready, Set, Negotiate! Preparing for Successful Contract Talks » Public Libraries Online
Observation, Orientation, Decision, Action Applying the OODA Loop Concept to Libraries » Public Libraries Online
Teaching Technology » Public Libraries Online
Windows Server 2012 R2 – Uninstalling .Net Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.71 – the Connector Space
Using the server_stats command on Celerra / VNX File - THE SAN GUY
Gathering performance data on a virtual windows server - THE SAN GUY
Scripting automatic reports for Isilon from the CLI - THE SAN GUY
Meet Aptomi: An application delivery engine for Kubernetes - Superuser
Isilon Port Usage - THE SAN GUY
Default Passwords - THE SAN GUY
Minikube: Try Kubernetes on Windows without headaches – Marksei
Spanning The Tree : Dr Radia Perlman & Untangling Networks | Hackaday
ESXi CLIativity – Part 1 | Adventures in a Virtual World
An inside look at Google’s hiring and onboarding processes
How to Configure ESXi Unattended Installations: Part 1
Counting Bees With A Raspberry Pi | Hackaday
​Red Hat's only business plan is to keep changing plans | ZDNet
Effects of Bring Your Own Device (BYOD) On Cyber Security
Amazon Web Services Networking Overview « ipSpace.net by @ioshints
dbKoda | dbKoda is the open-source, next generation IDE for MongoDB. Take your database to the next level with our Rich Code Editor, Multiple Connection Management and Topology Tree Explorer.
Systematic MongoDB performance tuning – dbKoda – Medium
Introducing SQL Server on Kubernetes - Blog dbi services
Semi-Automatic LaTeX: KDE’s Kile | OCS-Mag
OpenStack Summit Vancouver: Automating the data centre | Ubuntu blog
Kubernetes recipes: Maintenance and troubleshooting - O'Reilly Media
BPFILTER Landing For Linux 4.18 For Eventually Better Firewall / Packet Filtering - Phoronix
Paleo Vegan Tzatziki Recipe -- Mediterranean Yogurt Cucumber Sauce | Penniless Parenting
What is zchunk?
How to Monitor Your Linux Servers Performance with Glances Tool
Red Hat Summit: Building production-ready containers - RHD Blog
10 7zip (File Archive) Command Examples in Linux
Notes On Installing CentOS 7 Server – levlaz
Hewlett Packard Enterprise Grows Compute Business as Private Cloud Opportunities Advance
Microsoft OneDrive for Business Review: Pros and Cons
Building an 90° angular power adapter for the C64 | 0xf8.org
"How much house can I afford?"
Top 5 Consumer Tips for Your Credit Report - Law and Daily Life
Can an Employer Check Your Credit Score? - Law and Daily Life
Nutanix Resiliency – Part 2 – Converting from RF2 to RF3 | CloudXC
Nutanix Resiliency – Part 1 – Node failure rebuild performance | CloudXC
Block Ads & Malvertising on pfSense Using pfBlockerNG (DNSBL) - Linux Included
DNS is Changing. Are you Ready? - DNS is Changing. Are you Ready?
Giving a Presentation? How to Impress Your C-Level Audience
Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch - KitPloit - PenTest Tools for your Security Arsenal ☣
How InfoSec Institute Alum Rexson Serrao Earned the World’s Highest CGEIT Score
List of data breaches and cyber attacks in May 2018 – 17,273,571 records leaked – IT Governance Blog
Ten Best Practices for Outsmarting Ransomware
Sia Load Test Wrap-up | Space Duck
Abusing IVR Systems - Legacy Telecom [CVE-2018-11518]Security Affairs
Fortinet Threat Report Reveals an Evolution of Malware to Exploit Cryptocurrencies
“Free” Memory Sticks can be Expensive
Troy Hunt: Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords
USING POWERSHELL TO BACKUP SQLSERVER DATABASES
Don’t Be GDPR Complacent, It’s Time to Get Compliant - Security Boulevard
Does your organisation rely too heavily on technology? – IT Governance Blog
What does a ransomware attack cost? Beware the hidden expenses | CSO Online
A Gorgeous Guide to the First Wave of Personal Computers - Motherboard
Collect NTFS forensic information with osquery - Security Boulevard
Pathways to an Enterprise Security Architecture (ESA) | Security Architects Partners
NBlog - the NoticeBored blog: NBlog May 11 - mind remapped
NBlog - the NoticeBored blog: NBlog May 19 - PRAGMATIC security metrics
NBlog - the NoticeBored blog: NBlog May 25 - GDPR day
Back to Basics: Focus on the First Six CIS Critical Security Controls - basics-focus-first-cis-critical-security-controls-38395
10 Endpoint Security Problems Solved by the Cloud - 10-endpoint-security-problems-solved-cloud-38415
The Untold Story of Japan’s Secret Spy Agency
Completing the vSphere vCenter Appliance Hardening Process | slice2
HOWTO quickly STIG Firefox 59.01 | slice2
ESXi Compatibility Checker
GDPR Hall of Shame
Cybersecurity salaries highest in retail sector
Securing the modern workplace with Microsoft 365 threat protection – part 4 – Microsoft Secure
Securing the modern workplace with Microsoft 365 threat protection – part 3 – Microsoft Secure
Securing the modern workplace with Microsoft 365 threat protection – part 2 – Microsoft Secure
Securing the modern workplace with Microsoft 365 threat protection – part 1 – Microsoft Secure
DHS Cybersecurity Strategy | Homeland Security
Cyberattack map shows impacted U.S. school districts
Fiber Cable | Nbctcp's Weblog
Metta - An Information Security Preparedness Tool To Do Adversarial Simulation - KitPloit - PenTest Tools for your Security Arsenal ☣
[LFCS] Commands to manage and configure containers in Linux – //Cloud notes from my desk
Honeybits - A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
FreeRADIUS Server Configuration Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name - KitPloit - PenTest Tools for your Security Arsenal ☣
Sandmap - A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
Open Source Security Podcast
Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers - KitPloit - PenTest Tools for your Security Arsenal ☣
Security and Human Behavior (SHB 2018) - Schneier on Security
USB Reverse Engineering: Down the rabbit hole | /dev/alias – Hack. Dev. Transcend.
GDPR compliance checklist for healthcare – IT Governance Blog
Business Continuity Awareness Week (BCAW) – Free BCM resources – IT Governance Blog
Galileo - Web Application Audit Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API - KitPloit - PenTest Tools for your Security Arsenal ☣
Burpa - A Burp Suite Automation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Where does data flow mapping fit into your GDPR compliance project? – IT Governance Blog
Two Ways To Be A Parent: Insights From The Author Of 'The Gardener And The Carpenter' : Goats and Soda : NPR
Magic Mirror Tirelessly Indulges Children’s Curiousity | Hackaday
Cyber security incidents are becoming more common and harder to resolve – IT Governance Blog
CISO MindMap 2018 – What Do InfoSec Professionals Really Do?Rafeeq Rehman – Personal Blog
Vulnerability Management: So Much More Than Just Patch Management
Deployment Research > Research
From Cambridge Analytica to GDPR: Enter digital supply chain management
HITRUST Unveils Certification for NIST Cybersecurity Framework
HITRUST releases NIST Cybersecurity Framework certification program
Ask the DPO Web Conference Series
The AWS Bucket List for Security
SOC Automation: Good or Evil?
The 13 Step Guide to Secure Your PC After a Fresh Windows Installation [Updated]
Linux Privilege Escalation using Sudo Rights
Healthcare Exchange Standards: Erasure Receipt
Healthcare Exchange Standards: GDPR on FHIR
Smashing Silos and Building Bridges in the ...
US Government Cybersecurity at a Crossroads
Hacking Articles - Raj Chandel's Blog
The Modern Day Hacker – A Cautionary Tale - The Ethical Hacker Network
7 Tools for Stronger IoT Security, Visibility
Get Ready for 'WannaCry 2.0'
What Israel's Elite Defense Force Unit 8200 Can ...
GDPR 101: Keeping Data Safe Throughout the 'Supply ...
A Data Protection Officer's Guide to the Post-GDPR ...
GDPR, WHOIS & the Impact on Merchant Risk Security ...
Clint Boessen's Blog: 432 4.3.2 STOREDRV.Deliver recipient thread limit exceeded
Pi serial adaptor | Facelesstech
Harrowing Story of Installing Libreboot on ThinkPad | Hackaday
Atari co-founder Ted Dabney dies
List of Shark Tank Contestants
11 ways to hack 2FA | CSO Online
Security Report Analysis: 2018 DBIR Report - Daniel Miessler
What SSH Hacking Attempts Look Like – Doug Rickert – Medium
Best certifications to get - The Silicon Underground
LOADays
OWASP DefectDojo Project - OWASP
Linked - IBM bans all removable storage, for all staff, everywhere
GDPR : The good, the good and the good! | The ORACLE-BASE Blog
Computer security principles » Gofore
Brendan Tierney - Oralytics Blog: Creating a Word Cloud using Python
GitHub - rShetty/awesome-podcasts: Collection of awesome podcasts
Decoding and Listening to HD Radio (NRSC-5) with an RTL-SDR - rtl-sdr.com
YouTube Talk: Investigating RF Controls with RTL-SDR - rtl-sdr.com
Naturebytes' weatherproof Pi and camera case - Raspberry Pi
Continued: the answers to your questions for Eben Upton - Raspberry Pi
PR-Holonet: Disaster Area Emergency Comms | Hackaday.io
PR-Holonet
Strengthening cybersecurity for the DoD – accelerating compliance – Azure Government Cloud
Hey DBAs! Powershell is your friend! – Stefano Altamura’s Blog
Windows Server Performance Tuning Guidelines – Brad Chen's SQL Server Blog
Why GDPR is a $3.5 billion business opportunity – Microsoft Partner Network Blog
How to set up a Virtualization Host using KVM on Ubuntu – Marksei
How to Make Windows Speak the Time Out Loud Every Hour
5 Ways to Generate a List of All Installed Programs in Windows
Windows Keyboard Shortcuts 101: The Ultimate Guide
How to Keep Ethernet, TV, and Power Wires Tidy Using Cable Covers
Making Sense of USB-C and Thunderbolt Cables and Ports on Your MacBook
10 Essential Vivaldi Browser Tips & Tricks for Speed and Productivity
The Internet of (Medical) Things: Dangers, Risks, and Security Problems
Why You Should Be Concerned About the EU's New CPC Law
DNS Propagation Checker - ViewDNS.info
Why modernize your datacenter if you are cloud first? | Virtual Me
Passing the AWS Certified Developer – Associate Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert @PSIServicesLLC – vMusketeers
Everything You Need to Know About Raspberry Pi GPIO Pins
The scientific methodology for troubleshooting SharePoint | SharePoint Dragons
Auto-generated infrastructure node graphs from Terraform plans - Skelton Thatcher
A Better Way of Visualizing Microservice Architecture
A free e-learning tool for creating digital content | Opensource.com
Chris's Wiki :: blog/linux/ReplacingNetstatNotBad
15 books for kids who (you want to) love Linux and open source | Opensource.com
FOSS as a Part of a Corporate Sustainability Plan | Linux Journal
Zammad - An Open Source Help Desk and Support Ticket System
8 Policy Changes to Improve Your Business’s Security
GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape - Lawfare
Sorting Through GDPR: What to Watch After May 25 - Lawfare
BBC - Culture - The 100 stories that shaped the world
Speculative Store Bypass: spectre for browsers, the nightmare isn't over yet – Marksei
Is Training The Enemy of Progress? | The Networking Nerd
Culture Shifts and Work Travel Learnings · Lindsay Hill
Router on a Stick: Intro & Configuration (with lab files) - RouterFreak
Rethinking motivation and engagement in the open organization | Opensource.com
Journal of Azuma Hazuki (5086)
Adding Value to Risk Management Activities With Open Source Tools
Digitizing my DVDs
DOTmed.com - Boston Children's Hospital quickens medical image processing in RedHat and MOC collab
Which Programming Languages Use the Least Electricity? - The New Stack
Debian-goodies - A Set Of Useful Utilities For Debian And Ubuntu Users - OSTechNix
GitHub - tryolabs/luminoth: Deep Learning toolkit for Computer Vision
An FUQ for the GDPR | Linux Journal
How to Run Your Own Git Server | Linux.com | The source for Linux information
How to Install TeamSpeak Server in CentOS 7
Circuit VR: Sink or Swim with Current Sources | Hackaday
Ask Hackaday: Whatever Happened to Wire Wrapping? | Hackaday
Printed Circuits In The Palm Of Your Hand | Hackaday
Printed It: Toolbag Essentials | Hackaday
Harmony Hub Hacked and Patched | Hackaday
Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World « Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World | FireEye Inc
HFT On HF, You Can’t Beat It For Latency | Hackaday
3D Printing Air Quality Study | Hackaday
Getting ready for GDPR with Office 365
7 ways we have improved our core code base
100 percent of organizations have active insider threats
The Electrical Outlet and How It Got That Way | Hackaday
Poor mans Bash Bunny – Cron Blog – My personal findings
Richard Feynman: A Life Of Curiosity And Science | Hackaday
How Hertha Ayrton Enabled the Titanic to Call SOS | Hackaday
Hertha Ayrton
Cloud computing may finally end the productivity paradox
Half of employees not aware of their company's GDPR preparations
Microsoft will roll out 'key' GDPR rights globally... not just in Europe
Chris's Wiki :: blog/tech/DangerousRegistration
Windows Server Status Monitor (Update Version 1.4) – Stick To The Script
Economist Bryan Caplan thinks education is mostly pointless showing off. We test the strength of his case. - 80,000 Hours
UK Decision Makers Unsatisfied with IT Vendor Service | APMdigest - Application Performance Management
How to stay on top of home improvement ~ Get Rich Slowly
Pure//Accelerate 2018 – Thursday General Session – Rough Notes | penguinpunk.net
Sandpits in enterprise data protection » NetWorker Information Hub
Just one more esxi-guy: vSAN Cluster via PowerCli
How-To Create a Training Class Through Ravello Training Platform | ESX Virtualization
pasta salad with roasted carrots and sunflower seed dressing – smitten kitchen
Slacking Away on vSAN — ThinkCharles.net
AsteroidOS and OpenWatch Aim to Open Up Smartwatch Market | Linux.com | The source for Linux information
OpenWatch
Using Stratis to manage Linux storage from the command line | Opensource.com
Zuul - A Project Gating System — Zuul documentation
dbachecks – Save the results to a database for historical reporting | SQL DBA with A Beard
HP 3PAR CLI Reference Guide - THE SAN GUY
Multi-tier load-balancing with Linux | Vincent Bernat
AppDynamics for SAP Released | APMdigest - Application Performance Management
Windows 10: End of Life for several builds | Born's Tech and Windows World
How cool is this: EMC’s Recoverpoint goes INSIDE vSphere!
The Complex Taxation of America’s Retirement Accounts - Tax Foundation
A newbies guide to ELK - Part 4 - Filtering w/ Grok - mwpreston.net
Engage 2018, some HUGE announcements and the OGS Replay
Chris's Wiki :: blog/tech/NoPersonalInfrastructure
Stop wasting time developing SharePoint Training Manuals - SharePoint Maven
Suing to Get a 30-Yr-Old Child Out of Your House - Law and Daily Life
Spotify's GDPR updates add privacy and data download tools
'Japan Sales Mastery:' Lessons from 30 years in Japan - Japan Today
After Meltdown and Spectre, Another Scary Chip Flaw Emerges | WIRED
VeeamON 2018 Recap | TinkerTry IT @ Home
Motivation: Take Advantage Of Being 29, 39, 49, or 59 Years Old — My Money Blog
Windows 10 Upgrade/Servicing tools demoed at MMS 2018 – CCMEXEC.COM – Enterprise Mobility
I am Disappointed in Frontier Communications - Patshead.com Blog
Google and Microsoft unveil Spectre V4 CPU vulnerability | Born's Tech and Windows World
7 Places to Find Free or Cheap Groceries
How to Write a Great Resume as a Business Professional
Intel details fourth Spectre-style CPU security flaw
6 Key Pointers for Running Your Virtual Machine Safely
Training Programs: The Secret to Business Success
Chris's Wiki :: blog/tech/NFSMyMetricsSplit
Analyzing Large Capture Files Part 2 – Protocol Hierarchy – Chris Sanders
PeteNetLive - KB0000515 - VMware - Cannot Cut, Copy, or Paste to and from VM's | PeteNetLive
Windows: Finding Stale User and Computer Accounts | PeteNetLive
Visibility is Security | APMdigest - Application Performance Management
What are Thresholds for Good and Poor Network Packet Loss, Jitter and Round Trip Time for Unified Communications? - Tom Talks
Use Powershell to Get a List of Users with Out of Office enabled in Outlook Office365 – jasoncoltrin.com
Windows Download - #1 Windows ISO Download Source
Generating Good Passwords, Part I | Linux Journal
States and Their Proxies in Cyber Operations - Lawfare
Weekend Reading: Backups | Linux Journal
Speeding Up Netfilter (by Avoiding Netfilter) | Linux Journal
Security and privacy reminder: Spring clean your systems | Opensource.com
‘Crush Them’: An Oral History of the Lawsuit That Upended Silicon Valley - The Ringer
You-Get - A CLI Downloader To Download Media From 80+ Websites
After Four Years, AsteroidOS Open-Source Smartwatch OS Is Ready for the Masses
AsteroidOS
Red Hat Virtualization 4.2 Adds New High-Performance, SDN Features
Fixing Disk Signature Collisions – Mark's Blog
Schedule Task Monitor Script
Why You Need Cloud Data Backup: Cloud Storage Weaknesses Explained
IoT for Managed Service Providers: Challenge or Opportunity?
DSHR's Blog: Prof. James Morris: "One Last Lecture"
Amazon.com: Charles Platt: Books
DeployHappiness | The One and a Half Year Bachelor’s Degree for Less Than Free
19 Things You Should Make Your Kids Pay For
Here Are 11 Reasons We Have An Umbrella Liability Insurance Policy — My Money Blog
Hierarchy of Financial Needs (and the Meaning of Life) | Mad Fientist
Philippines to integrate open-source electronic medical record platform for enhanced health programs | OpenGovAsia
Healthcare Open Source Projects Speed Up Technology Adoption
What Is EVPN? « ipSpace.net by @ioshints
Kickstart Scripted VMware ESXi Install to USB Media – Michelle Laverick…
Configuration vulnerability could leave SAP systems open to compromise
If Facebook had been GDPR compliant would things have been different?
73 percent of industrial networks are vulnerable to hackers
The rise of the experimentation team
How managed services can help businesses with GDPR [Q&A]
Younger generations lack understanding of cybersecurity careers
18 useful financial rules of thumb ~ Get Rich Slowly
How the Father of Computer Science Decoded Nature’s Mysterious Patterns - The New York Times
Ευάγγελος Μπαλάσκας - USBGuard » Evaggelos Balaskas - System Engineer
Terratest - an Open Source Go Library for Automated Infrastructure Testing
Perfect Gluten Free Vanilla Cake Recipe -- Allergy Friendly, Dairy Free, Vegan Option | Penniless Parenting
Ring doorbell flaw lets others watch after password changes (updated)
Securosis - Blog - Article
Introducing vSphere 6.7 Security - VMware vSphere Blog
Cyber Exposure Meets Political Practicality - Blog | Tenable™
How to Secure and Audit an Amazon Web Services Three-tier Web Architecture - Blog | Tenable™
Critical Oracle WebLogic Server Flaw Still Not Patched - Blog | Tenable™
Virtual Instruments Releases VirtualWisdom 5.6 | APMdigest - Application Performance Management
VirtualWisdom
Skype for Business to Microsoft Teams Roadmap Update April 23, 2018, 9 Changes - Tom Talks
The Office 365 train is still steaming along with more than 135 million monthly active users, Microsoft FY18 Q3 Results - Tom Talks
Labeling endpoint actions with Logstash - Threat Hunting - Syspanda
Zero Day Initiative — The May 2018 Security Update Review
What does a CISO actually do? | Thom Langford
State Machine Testing with Echidna | Trail of Bits Blog
Windows Incident Response: EDR Obviates Compliance
Barebone Kickstart setup for CentOS 7 | Velenux Home Page
IT Monitoring Changing in 2018 | APMdigest - Application Performance Management
Catchpoint Releases Free Benchmarking Service | APMdigest - Application Performance Management
The STEM Pipeline: What Can You Do? | Webroot
Importing McAfee ePO Threat events to ELK - Syspanda
Monitoring Active Directory with ELK - Syspanda
VMware PowerCLI - Create Port Groups Script
VMware PowerCLI - Copy Port Groups Script
How to thrive at a technical conference - major.io
The Advent of the Fourth Wave of Computing - Netronome
Why Bare Metal Does Not Have To Be Nude - Netronome
The Case for Express Virtio (XVIO) – Part 2 - Netronome
The Case for Express Virtio (XVIO) – Part 1 - Netronome
Zero-Trust Security for Cloud Data Centers – How Much Does it Cost? - Netronome
Samba login using windows AD on Centos 7 | SvennD
An Updated Look at My Multi-Platform Toolbelt - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
Our preparations for Europe’s new data protection law
Data Collection: How To Gather Meaningful Data - Thomas LaRock
Don't run away from The System, learn to bend it to your advantage - The Matrix has you...
NIST Updates Risk Management Framework to Incorporate Privacy Considerations | NIST
First EU cybersecurity law takes effect—with new fines for misbehaving companies – EURACTIV.com
Is the Irish DPC fit for purpose?
Building A Windows 10 1803 (April 2018 Update) Reference Image with MDT – Stick To The Script
Free stock photos · Pexels
Google outlines GDPR-compliance efforts
Calculating Cloud Cost: 8 Factors to Watch
20 Signs You Are Heading for a Retention Problem
Why GDPR is Every Security Professional’s Dream - Delta Risk
Failure without Consequences after Breach - The Ethical Hacker Network
How to Avoid Bad Clients: 12 Red Flags I Look for to Dodge Nightmare Projects
Google Online Security Blog: Google CTF 2018 is here
'All of Us' Research Project: The Privacy Risks
Is Converging Your IT and OT Networks Putting Your Organization at Risk? | CSO Online
Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance | CSO Online
The rise of the NIST cybersecurity framework | CSO Online
PowerShell mouse jiggler | Logan Marchione
Install Python On Windows With A One-Liner - krypted.com
LasLabs Blog | Storing SSH keys in Active Directory for easy deployment - LasLabs Blog
LasLabs Blog | Managing SSH Keys Stored in Active Directory - LasLabs Blog
The Idiot uses Grafana and Influxdb to monitor Proxmox – Jon Spraggins
Resolved: "Permission denied (publickey)." when trying to access via ssh an Ubuntu Server - Knowledge eXchange
How to store your ssh public key in a different directory - Knowledge eXchange
Deployment Research > Research
Find the repository of all installed packages on Debian or Ubuntu | /contrib/famzah
Time To Get Back To Basics? | The Networking Nerd
Packets over a LAN are all it takes to trigger serious Rowhammer bit flips | Ars Technica
Quick tip: What new products and classifications have been added in the past 30 days to WSUS? | >_
Doc Searls Weblog · GDPR will pop the adtech bubble
Career Certification Strategy – vcdx133.com
vRA Design Considerations – vcdx133.com
VCDX – Exam Techniques – vcdx133.com
Deploying vSphere Virtual Machines using Ansible
vSphere Design Considerations – vcdx133.com
VSAN Maintenance Mode with PowersHell – Michelle Laverick…
MSP Backup Pricing Guide: Tips and Strategies
Red Hat Certification Guide: Overview and Career Paths
5 Awesome Open Source Cloning Software - nixCraft
Spectre, Meltdown made industry collaborate: Red Hat - Security - CRN Australia
A look at open source image recognition technology | Opensource.com
Terraform by HashiCorp
Maximizing Value from Open Source Testing Frameworks - The New Stack
GitHub - axsh/openvdc: Extendable Tiny Datacenter Hypervisor on top of Mesos architecture. Wakame-vdc v2 Project.
OpenVNet
Axsh | Cloud Technology and Network Virtualization
18 Tips & Tricks To Speed Up Windows 10 And Make It Faster
Everything You Need to Know about the Cloud and Cloud Computing, Part I | Linux Journal
How Misinformation Spreads on Social Media—And What To Do About It - Lawfare
Keynote: Crossing the River by Feeling the Stones - Simon Wardley - vNinja.net
VCDX – Throwing Bones – vcdx133.com
VCDX Journey – Part 3 – Design Scenario – vMusketeers
VCDX Journey – Part 2 – Where I Messed It Up – vMusketeers
VCDX Journey – Part 1 – Lessons Learned – vMusketeers
My VCAP-DCV 6.5 exam experience – VCDX6 in the pocket | viktorious.nl – Virtualization & Cloud Management
Performance Checklist now available for vSAN benchmarking - CormacHogan.com
Automate Performance Monitor Statistics Collection for SQL Server and Windows
Finding ESXi iLO/iDrac Information with PowerCLI
Making a little nest for your VMs – Michelle Laverick…
Upgrade Raspbian Jessie to RaspbianStretch | Marco Franssen
10 “Notes to Self” that Will Stop You from Taking Things Personally
RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting - KitPloit - PenTest Tools for your Security Arsenal ☣
WSSAT v2.0 - Web Service Security Assessment Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Astra - Automated Security Testing For REST API's - KitPloit - PenTest Tools for your Security Arsenal ☣
hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains - KitPloit - PenTest Tools for your Security Arsenal ☣
Zoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
AutoTTP - Automated Tactics Techniques & Procedures - KitPloit - PenTest Tools for your Security Arsenal ☣
New certificate in cybersecurity and data privacy law responds to student demand
1.13M Records Exposed by 110 Healthcare Data Breaches in Q1 2018
How to conduct an ISO 22301-compliant business impact analysis – IT Governance Blog
New criminal hacking group targets healthcare organisations – IT Governance Blog
Companies continue to download faulty software exploited in Equifax breach
GDPR-US-10-things-you-need-to-know-052018_final.pdf
Securing IoT in Healthcare is Critical | CSO Online
What is a Chief Security Officer? Understanding this critical role | CSO Online
Breakout Time: A Critical Key Cyber Metric
Microsoft's Patch Tuesday Fixes Two CVEs Under ...
Some ideas about Oracle Database on Docker - Blog dbi services
Simon Wardley – Strategy by Mapping,Crossing the River by Feeling the Stones — EtherealMind
Person with diabetes finds open source and builds her own medical device | Opensource.com
Equifax confirms data breach included driver's licenses and passports
Security Vendor Sales Pitches and Empty End Point Promises
Security baseline for Windows 10 “April 2018 Update” (v1803) – FINAL – Microsoft Security Guidance blog
First things first: Envisioning your security deployment – Microsoft Secure
The Ransomware Sausage Factory – Do You Really Want To Know How They Got Your Data Back?
What is tar and why does OpenShift Container Application Platform use it? - Red Hat Customer Portal
Understanding the Role of Multi-Stage Detection in a Layered Defense
Different block sizes when you plugin? – Upgrade your Database - NOW!
How to convert/split p12 certificates into single files – – Unixblogger –
Security Trade-Offs in the New EU Privacy Law — Krebs on Security
JPCERT/CC Blog: JPCERT/CC Publishes "Vulnerability Coordination and Disclosure Policy"
NIS Directive and GDPR double jeopardy: Can you be fined twice for the same breach? – IT Governance Blog
Software to support your GDPR compliance project – IT Governance Blog
List of data breaches and cyber attacks in April 2018 – 72,611,721 records leaked – IT Governance Blog
The GDPR and the right to be forgotten – IT Governance Blog
The GDPR: Get a crucial cyber security qualification in one day – IT Governance Blog
Investors must pay closer attention to cyber threats – IT Governance Blog
Infographic: How to comply with the NIS Directive – IT Governance Blog
Securing top management’s approval of your BCMS is crucial – IT Governance Blog
5 things you need to know about CIR management – IT Governance Blog
5 benefits of an ISO 22301-conforming BCMS – IT Governance Blog
The Scottish Cyber Resilience Strategy for health boards – IT Governance Blog
Cyber risk and resilience: A guide for the board and senior management – IT Governance Blog
Cloud service providers and the NIS Directive – are you resilient enough? – IT Governance Blog
(31) APPSEC Cali 2018 - ReproNow - Save time Reproducing and Triaging Security Bugs - YouTube
Ray Ozzie’s plan for unlocking encrypted phones gets a chilly reception | Ars Technica
(31) Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac - YouTube
Is Article 27 the GDPR's 'hidden obligation'?
Massachusetts Senate passes data breach bill regulating consumer reporting agencies
Store 6000+ Records & Breach Costs Will Exceed Security Investment: Report - Infosecurity Magazine
What's the future hold for US health care privacy regulation?
​Equifax has spent $242.7 million on its data breach so far | ZDNet
Companies launch open-source GDPR framework for DSARs
Recent Ransomware Incidents Serve Up Lessons - HealthcareInfoSecurity
FDA Unveils Plan for ‘Software as a Medical Device’ Review
The Best Strategy for Cyber-Conflict May Not Be a Cyber-Strategy
(31) APPSEC Cali 2018 - Closing Keynote - Digital Disease: How Healthcare Cybersecurity Challenges... - YouTube
Infosecurity.US - Web Log - QOTD Esther Dyson
GDPR Is Coming. Is Your Organization Ready?
PyRoMine Malware Sets Security Industry on Fire
5 Top Cybersecurity Themes at RSA 2018 - HealthcareInfoSecurity
How Triton Malware Targets Industrial Control Systems
Is Payments Industry Ready for New Encryption Protocols?
SamSam Ransomware Offers Volume Decryption Discount
Certain Becton Dickinson Products at Risk for 'KRACK' Flaw
How Authentication Must Evolve in the Age of GDPR
Former Physician Convicted of Criminal HIPAA Violation
The Biggest “Small” Personal Digital Security Mistakes – tisiphone.net
Texas Hospital CEOs: Cybersecurity Is No. 1 Worry
Multitouch 'skin' makes your body the controller
Lesley on Brakeing Down Incident Response Podcast – All About Playbooks – tisiphone.net
Finally, a free open-source database for all Canadian startup information | Financial Post
USB Device Tracking using the Partition/Diagnostic Event Log - Digital Forensics Stream
Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business. - The Ethical Hacker Network
Why Am I Getting All These Terms of Service Update Emails? | Electronic Frontier Foundation
Bring in the Nerds: EFF Introduces Actual Encryption Experts to U.S. Senate Staff | Electronic Frontier Foundation
Building a freedom-based photography community | Opensource.com
Spicy Garlicky Stir Fried Eggplant Recipe -- Paleo, Vegan, and Easy | Penniless Parenting
There is No Middle Ground on Encryption | Electronic Frontier Foundation
WEBCAST: Web App Assessments for Non-Majors - Black Hills Information Security
Analyzing Large Capture Files Part 1 – Colorizing Conversations in Wireshark – Chris Sanders
'Zero Login:' The Rise of Invisible Identity
Sarah Squire
3 Ways to Maximize Security and Minimize Business ...
GDPR Requirements Prompt New Approach to Protecting ...
Ransomware Attacks Jumped 400% Worldwide in 2017
Automation Exacerbates Cybersecurity Skills Gap
What Meltdown and Spectre Mean for Mobile Device ...
Encryption is Necessary, Tools and Tips Make It Easier
Spectre Returns with 8 New Variants
5 Ways to Better Use Data in Security
Calling all open source advocates: join the GPL Cooperation Commitment
Going through the 7 stages of GDPR | CSO Online
Best security software, 2018: How 9 cutting-edge tools tackle threats | CSO Online
GDPR-defined personal data can be hard to find—here's where to look | CSO Online
China increases employee surveillance, creating its own Thought Police | CSO Online
Branding infosec: Why security should consider its own internal advertising campaign | CSO Online
Can Shadow IT Be Good for Enterprises? | CSO Online
Updates to Ansible Playbook for Usenet Docker containers | Calvin Bui
Cybersecurity Tech Accord
Cyberwar: Silicon Valley’s new bright, shiny thing | CSO Online
Why securing containers and microservices is a challenge | CSO Online
Conway's Law: does your organization’s structure make software security even harder? | CSO Online
What is cyber resilience? Building cybersecurity shock absorbers for the enterprise | CSO Online
Adopt the NIST cybersecurity framework (CSF) and harness the wisdom of crowds | CSO Online
Insuring Uncle Sam’s cyber risk | CSO Online
Starting and Stopping Azure Virtual Machines Using Azure PowerShell
vCenter Service Appliance 6.7 Tips and Tricks | Virten.net
Berkshire Hathaway Shareholder Meeting Full Videos, Transcripts, and Podcasts — My Money Blog
About updating inbox PowerShell modules | >_
Spectre-NG: Security bods uncover eight new 'Spectre-class' flaws in Intel CPUs
Yale Scientists Found 'Time Crystal' In The Unlikeliest Place
US elevates the role of Cyber Command
Chinese spies linked to decade-long hacking campaign
Solved: DNS Forwarding 100K+ Entries - Ubiquiti Networks Community
Should a SaaS provider open source its primary platform? | Opensource.com
NHS will upgrade all systems to Windows 10 following WannaCry outbreak
Rob Shaw, Deputy Chief Executive
Welcome to brigade’s documentation! — brigade 0.0.1 documentation
Dell Technologies World 2018 – storage.12 – XtremIO X2: An Architectural Deep Dive Notes | penguinpunk.net
StarEast, InteropITX and GDPR - DBA Kevlar
Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 2 - Blog dbi services
SQL Server Security: Are your databases ready for the GDPR? - Blog dbi services
On the Myth of the 10X Engineer and the Reality of the Distinguished Engineer – Charting Stacks
Cloud Not Just Someone Else's Computer · Lindsay Hill
Testing VSAN 6.7 network outages on Ravello is easy! – vMusketeers
To Be a 10x Engineer, or Not to Be - IOD: [tech.content]
10X Engineers - Quora
Dell Technologies World 2018 – Dell EMC Announces PowerMax | penguinpunk.net
What’s The Buzz About StorageOS? | penguinpunk.net
We Have to Learn How to Manage the Cattle « ipSpace.net by @ioshints
Qucs project: Quite Universal Circuit Simulator
Introducing zchunk
Working around Intel Hardware Flaws | Linux Journal
This Russian Company Sells Zero-Day Exploits for Hospital Software - Motherboard
De-Googling my phone · Martin Pitt
A brief history of bad passwords | Opensource.com
Open Source Password Management Solutions | Bitwarden
GitHub - google/gvisor: Container Runtime Sandbox
May 2018 Issue: Privacy | Linux Journal
Privacy Is Still Personal | Linux Journal
Weekend Reading: Qubes | Linux Journal
The GDPR Takes Open Source to the Next Level | Linux Journal
Where is serverless computing headed? | Opensource.com
What is Windows 10 Timeline? How To Use It Like A Pro?
POWERCFG: How To Check Battery Health Report And Energy Report In Windows Using CMD
How to Install and Configure Redis on Ubuntu 18.04 and Speed Up WordPress Using Redis Caching | Dotlayer
A Bash Script to Create a Bootable USB from ISO in Linux
How to Install BookStack Documentation Wiki on CentOS 7
Is it Time to Regulate Cyber Conflicts? - Lawfare
What works best Clean Install or Dirty Upgrade?: VMware ESXi Upgrade on HP ML350e Gen8 – Michelle Laverick…
DELL N4032 / HP HP ProCurve Switch 2810 / Juniper SRX 300 cheat sheet – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
Qemu now supports the HPPA in softmmu mode! | Virtually Fun
What's New in vSphere 6.7? Should I Upgrade?
Managed Services Market Trends to be Aware of in 2018
How to Create a Business Project When It's Your College Homework
VCSA 6.5 AD Lookup Issues #DNS #DIG #VMware #vExpert #VCSA #vCenter – vMusketeers
vSphere 6.7 – Let’s break it down! - VirtuallyInclined.com
Sysadmin Stories: PowerCLI - Batch migrate VM network adapter
Incremental vs Differential Backup: Difference Explained
Technology Short Take 98 - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
3 questions about Kata Containers answered | Opensource.com
Automating Labs…Now With YAML and Multi-Threading! – neckercube.com
CCNA Training » GRE Tunnel Tutorial
Things to do after installing Ubuntu 18.04 Bionic Beaver Linux - LinuxConfig.org
Overview on Android x86 Project & Call to Help – FOSS Post
A look at Peek screen recorder for GNU/Linux - gHacks Tech News
Timeshift review - Let's do the time warp again
Red Hat Launches All-In-One Data Center Storage Solution
Weekend Reading: Privacy | Linux Journal
Researchers Spent 10 Years Creating This "Master Key" To Unlock Millions Of Hotel Rooms
How to randomize DNS resolver selection in Knot Resolver – Ctrl blog
Zero D’Eh: Canada Takes a Bold Step Towards Offensive Cyber Operations - Lawfare
The best and worst laptop brands 2018
StorageNewsletter » Daily Breaking News for the Worldwide IT Storage Industry
New IRS Data Shows Most IRA Contributions Were Made by Middle-Class Taxpayers - Tax Foundation
Social media has a censorship problem of its own making
The perfect is the enemy of the good ~ Get Rich Slowly
OpenDedup – Opensource Dedupe to Cloud and Local Storage
Zenko - Scality’s Open Source Multi-Cloud Data Controller
Non-Malware Attacks: What They Are and How to Protect Against Them?
Why Hackers Love Healthcare
Recent BA Ransomware Incidents Serve Up Lessons
TECH-T08-It's-Time-to-Kill-the-Pentest.pdf
5 signs you've been hit with an advanced persistent threat (APT) | CSO Online
Atlanta's recovery highlights the costly mistake of being unprepared | CSO Online
Why does your most important database run on Oracle 10.2.0.4?
Oracle Fusion Middleware Infrastructure 12.2.1.2.0 - Probable Incorrect Firewall Configuration - Blog dbi services
If You're Not Doing Continuous Asset Management You're Not Doing Security
NBlog - the NoticeBored blog: NBlog April 24 - privacy policies under GDPR [UPDATED]
One month out: Top 6 steps for GDPR compliance
9 steps to implementing ISO 27001 – IT Governance Blog
Risk Analysis Requirement Survives ‘Meaningful Use’ Revamp
GDPR compliance in a nutshell | CSO Online
All About Versions – Time to Upgrade? | ThatJeffSmith
How This Artist Finds Abstract Art in Footage of Nuclear Explosions - Motherboard
How to Use Sensu and RabbitMQ on Ubuntu to Monitor Your WordPress Website | Sitety
How to Install Log.io Realtime Log Monitoring Tool on Ubuntu 16.04 LTS
[Howto] Using Ansible to manage RHEL 5 systems – /home/liquidat
Health care data breaches included in Arizona's new notification law
MalPipe - Malware/IOC Ingestion And Processing Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
TR Center - Man in the Arena
A closer look at the GDPR’s technical requirements – IT Governance Blog
Reading The F****** Manual: Setting Up VMware PowerCLI 10.x – Michelle Laverick…
A simple Pivotal Container Service (PKS) deployment - CormacHogan.com
Cilium 1.0: Bringing the BPF Revolution to Kubernetes Networking and Security — Cilium
BPF, eBPF, XDP and Bpfilter… What are these things and what do they mean for the enterprise? - Netronome
Chris's Wiki :: blog/linux/HiDPILinuxHassles
Cookiescanner - Tool For Check The Cookie Flag In Multiple Sites - KitPloit - PenTest Tools for your Security Arsenal ☣
5 steps to an effective ISO 27001 risk assessment – IT Governance Blog
A catastrophic cyber attack is imminent, says UK government – IT Governance Blog
Why you shouldn’t ignore the NIS Directive – IT Governance Blog
Passing the AWS Certified Solutions Architect – Associate Exam 2018 Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert – vMusketeers
Patching my databases with the April 2018 PSU, BP and RU
Insider Threat: Putting Theory Into Practice - HealthcareInfoSecurity
Why is the kernel community replacing iptables with BPF? — Cilium
Spectre and Meltdown's Critical Impact on Cloud Providers and Customers
Quick Take-Aways From the RSA Security Conference | CSO Online
Total Meltdown (not Meltdown!) exploit now available @ AskWoody
Windows Privilege Escalation - Unquoted Services - The Ethical Hacker Network
Just solve the problem! ~ Get Rich Slowly
www.moosecon.com
Infrastructure Hardening · Veeam Backup & Replication Best Practices
Tom Sneddon's stuff
Batch Script Tutorial
Android-x86 - Porting Android to x86
GitHub - joaomatosf/jexboss: JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
DosTips - The DOS Batch Guide
Francis Lam's Weapons-Grade Ratatouille | The Splendid Table
GDPR kills the American internet: Long live the internet!
VMware Product Interoperability Matrices for VMware vSphere Hypervisor (ESXi) | TinkerTry IT @ Home
Making Use Of The search Option In resolv.conf
Aaron Toponce : Use A Good Password Generator
The Difference Between URLs and URIs
Giving social networking back to you - The Mastodon Project
Unable to login because of a ESXi root account lockout - IVOBEERENS.nl
What to know about Spectre and Meltdown with VMware environments - IVOBEERENS.nl
Conversation Intelligence Technology for Sales Teams | Gong.io
GitHub - BloodHoundAD/BloodHound: Six Degrees of Domain Admin
Scanning and Patch Auditing VMware Using Nessus - Blog | Tenable™
Security Orchestration and Automation for Security Operations | Rapid7
GitHub - nccgroup/Scout2: Security auditing tool for AWS environments
Open Source Management and Monitoring System for Ceph | openATTIC
Index of /
Including OWASP ModSecurity Core Rule Set – Welcome to netnea
The Working Centre
Introducing Mastermind: Powerful and Simple Deployment, Scaling, Load Balancing and Testing of Applications in the Cloud – Microsoft Faculty Connection
OH2BNF's Plan for a Large Scale Raspberry SDR (LSR-SDR) Based on RTL-SDR Dongles - rtl-sdr.com
Life On Contract: Lowering Your Cost without Dropping Your Price | Hackaday
5 Things You Have to Know About the Dangers of Ransomware
The 3 Best Ways to Scan Your Old Photos (And Why You Should)
1. Scanning Old Photos at Home 2. Using an App for Digitizing Photos 3. Photo-Digitizing Services
Learn About Cybersecurity with These 11 Essential Videos
7 Types of Ransomware That Will Take You by Surprise
When Hackerspace Directors Burn Out | Hackaday
GDPR Data Discovery On Tap from Raz-Lee - IT Jungle
A lesson in wireless engineering from the Raspberry Pi
Security Patches: Move Faster to Keep Up With the Bad Guys - Security Boulevard
2018 Phishing Trends & Intelligence Report: The Shift to Enterprise - Security Boulevard
20 Critical Security Controls: Control 7 – Email and Web Browser Protections - Security Boulevard
What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders | CSO Online
Using Rubber Ducky To Steal Encrypted Data | CQURE Academy
Ransomware (with Allan Liska & Tim Gallo) - Advanced Persistent Security
NSA reveals how it beats 0-days – Naked Security
20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs - Security Boulevard
OWASP APPSEC Cali 2018, Anthony Trummer's 'European Vacation: Leveraging GDPR For Security' - Security Boulevard
Technology for GDPR Compliance: Turning Plans into Action - Security Boulevard
Why Cyber-Security Is Critical to The Loyalty of Your Most Valued Customers - Security Boulevard
What Harm Can Come From Missing 59,000 Vulnerabilities?
Doing OSINT and Twitter Analytics with Tinfoleak - Koen Van Impe - vanimpe.eu
SMBrute - SMB Protocol Bruteforce - KitPloit - PenTest Tools for your Security Arsenal ☣
RTA (Red Team Arsenal) - An Intelligent Scanner To Detect Security Vulnerabilities In Companies Layer 7 Assets - KitPloit - PenTest Tools for your Security Arsenal ☣
How to write a GDPR-compliant personal data breach notification procedure – IT Governance Blog
Keep your professional services firm’s papers under wraps for GDPR compliance – IT Governance Blog
MPs agree there is a “long way to go” to bring cyber security up to standard in the NHS – IT Governance Blog
FDA Proposes Action to Enhance Medical Device Cybersecurity
CYMSAB
Countdown to GDPR: Part 2 — Opportunities and challenges
How To Start Taking Control Of Your Data - Essential Privacy Tools
A brief guide to cyber security risk assessments – IT Governance Blog
GRC Evolves Into Integrated Risk Management - HealthcareInfoSecurity
Abbott Issues Software Patches for More Cardiac Devices
What Came First: VLANs or VRFs? « ipSpace.net by @ioshints
Chris's Wiki :: blog/solaris/ZFSWhyIOInRecordsize
UUID of hard disk | SvennD
Installing and Configuring Windows Server Update Services with Windows Server 2016 Core – Stick To The Script
Self-hosted videos with HLS | Vincent Bernat
GDPR Scope Queries for Oracle E-Business Suite | Integrigy
How to recycle your used and unwanted gadgets
FDA Proposes Action to Enhance Medical Device Cybersecurity
This Japanese Budgeting System Could Be the Key to Saving Big Bucks
kakeibo
How to be happy and lead a meaningful life ~ Get Rich Slowly
How will the GDPR impact open source communities? | Opensource.com
Backup And Restore Application Settings On Newly Installed Linux System - OSTechNix
Failure to automate: 3 ways it costs you | The Enterprisers Project
Richard Stallman, RMS, on Privacy, Data, and Free Software
Privacy as an Afterthought: ICANN's Response to the GDPR | Electronic Frontier Foundation
Create Dynamic Wallpaper with a Bash Script | Linux Journal
Life After WannaCry's Wake-Up Call: What's Next?
Health Data Breach Tally Spikes in Recent Weeks
The Agony and the Ecstasy of Cloud Billing | Linux Journal
Running Jenkins builds in containers | Opensource.com
The IoT Hacker's Toolkit · System Overlord
How to build confidence (and destroy fear)
Firewall Management Software | Network Security Monitoring
Application Risk Module - Kenna Security
Zero Trust Security Model | Alexander's Blog
GDPR and client-side tools
Tips and Tricks for Detecting Insider Threats
Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest Tools for your Security Arsenal ☣
Healthcare Exchange Standards: IHE Perspective on EU GDPR
PowerShell Script to Monitor Active Directory Health | Alexander's Blog
Mesos and Marathon REST API via cURL - A Hello World Example
Testing the Hetzner Cloud API via cURL - IaaS Automation -
DICOM Library - Anonymize, Share, View DICOM files ONLINE
DICOM Library - Anonymize, Share, View DICOM files ONLINE
IT Automation Part III: Saltstack "Hello World" Example -
IT Automation Part II: Ansible "Hello World" for Templating -
IT Automation Part I: Ansible "Hello World" Example using Ansible on Docker -
GitHub - ubeeri/Invoke-UserSimulator: Simulates common user behaviour on local and remote Windows hosts.
Finding purpose: 12 exercises to help you discover purpose and passion
ICND1 & ICND2 » ICND1 – VLAN Questions
ICND1 & ICND2 » ICND2 – OSPF Questions 4
ICND1 & ICND2 » ICND2 – OSPF Questions 3
ICND1 & ICND2 » ICND2 – OSPF Questions 2
ICND1 & ICND2 » ICND2 – OSPF Questions
Cisco and System Security Basics: Learning By Doing: Challenges
ICND1 & ICND2 » ICND2 – InterVLAN Questions
ICND1 & ICND2 » ICND2 – RSTP Questions 2
ICND1 & ICND2 » ICND2 – STP Questions 2
ICND1 & ICND2 » ICND2 – STP Questions
Cisco and System Security Basics: CDP: Building Topology Diagram
Cisco and System Security Basics: Cheap Hacker's Lab
Cisco and System Security Basics: Passive Reconnaissance - Flowers in Corp Web Page
Order of Precedence when Configuring ASP.NET Core – Premier Developer
Cisco and System Security Basics: Cisco: Beginner Level
Cyber Defense | PowerShell Script to Block Cortana for Privacy | SANS Institute
Weekly Cyber Risk Roundup: Orbitz Breach, Facebook Privacy Fallout - Security Boulevard
6 practices for super smooth Ansible experience by Maxim Chernyak
Vagrant - Complex Vagrantfile Configurations - EverythingShouldBeVirtual
The Anatomy of an Instant Clone - VMware Blogs
Getting Started With Vagrant
Configuration - VirtualBox Provider - Vagrant by HashiCorp
Migration and Disaster Recovery in the Oracle Cloud with Rackware | Oracle Cloud Infrastructure Blog
How to Disable, Uninstall or Reinstall OneDrive in Windows 10
Tap Drill Sizes
Protecting routers and other network equipment
GDPR 'Murica! - DBA Kevlar
Linux 101 for SQL Server DBAs, Part II - DBA Kevlar
SQL Server Operations Studio - DBA Kevlar
GDPR Solutions in the Day of Automation - DBA Kevlar
Hadoop Architecture | HDFS Architecture | HDFS Tutorial | Hadoop Tutorial – DBA Tutorials
ISO/IEC 27001 and Why It Matters for Your Business
When Your Greatest Cybersecurity Doubters Are in the C-Suite - Security Boulevard
20 Critical Security Controls: Control 10 - Data Recovery Capabilities
A week in security (April 02 – April 08) - Security Boulevard
The Future of GPOs - JumpCloud
MY TAKE: A breakdown of why Spectre, Meltdown signal a coming wave of ‘microcode’ attacks - Security Boulevard
What do you wish osquery could do? - Security Boulevard
OPM provides guidance to address cybersecurity skills gap - Security Boulevard
Netsparker Surveys US Based C-Levels on GDPR Compliance - Security Boulevard
Efficiently Testing Pipelined Microservices - Security Boulevard
Infrastructure-as-Code: Project Update - Virtual Elephant
Oracle Instance – Prakash Blog
GROW THAT DBA CAREER – Prakash Blog
Infrastructure-as-Code: Project Overview - Virtual Elephant
Infrastructure-as-Code: Bootstrap CoreOS with Ignition - Virtual Elephant
Infrastructure-as-Code: Understanding CoreOS Ignition - Virtual Elephant
Infrastructure-as-Code: Getting started with Ansible - Virtual Elephant
Infrastructure-as-Code: Ansible for VMware NSX - Virtual Elephant
VCDX Quick Hit - Monitoring and Alerting - Virtual Elephant
Docker for Ansible + VMware NSX Automation - Virtual Elephant
Enhanced NSX Modules for Ansible - Virtual Elephant
oVirt hosted engine with zfs storage - My Wired House
Manage SCCM configuration items and baselines with community tools – 4sysops
Tailing the Alert Log with SQLcl | ThatJeffSmith
A Place to Learn Oracle, No Setup Required | ThatJeffSmith
UK GCHQ director confirmed major cyberattack on Islamic StateSecurity Affairs
JeremyFleming
“Need to Know” for Oracle DBA Begineers – Prakash Blog
The DBA works at the intersection of the database, server, operations group, and developers. A DBA must understand concepts from all these facets of IT as well as be able to draw upon knowledge of their production environment to troubleshoot performance, hardware, and software issues.
RAC Notes Scanned Documents – Prakash Blog
Database Authentication with a Smart Card – Part 3 | Late Night Oracle Blog
Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 1 - Blog dbi services
Oracle Backup and Recovery Solutions – Prakash Blog
SOLVED: Application Data.. repeating recursion | Wordlinks' Blog
Disable or Uninstall OneDrive Completely in Windows 10 - Tech Journey
20 Ways to Increase the Efficiency of the Incident ...
As Businesses Rush to Comply with GDPR, Some Face Costs of over $1 Million - Security Boulevard
Tenable Research Advisory: AXIS Camera App Malicious Package Distribution Weakness - Blog | Tenable™
Zuckerberg Unveils the Cyber-Naivete of Congress - Security Boulevard
Best Buy the Latest Victim of Third-Party Security ...
A Nonverbal Analysis of Mark Zuckerberg’s Congress Testimony - Social-Engineer.Com - Professional Social Engineering Training and Services
Are your Android devices updated? Researchers say maybe noSecurity Affairs
Security Affairs newsletter Round 157 – News of the weekSecurity Affairs
The Real Industry Behind Fake Electronics - Motherboard
Vigilante hackers strike Russia and Iran Networks exploiting Cisco CVE-2018-0171 flawSecurity Affairs
Pairing Policy & Technology: BYOD That Works for ...
Slideshows - Dark Reading
Avoiding the Ransomware Mistakes that Crippled ...
7 Steps to a Smooth, Secure Cloud Transition
7 Non-Financial Data Types to Secure
Businesses Calculate Cost of GDPR as Deadline Looms
Video: MDT 2013 log files basics (bdd.log and smsts.log) | Keith's Consulting Blog
Basic Usage - Provisioning - Vagrant by HashiCorp
GitHub - Or3stis/apparatus: A graphical security analysis tool for IoT networks
ASTo - An IoT Network Security Analysis Tool and Visualizer - KitPloit - PenTest Tools for your Security Arsenal ☣
APNIC Labs enters into a Research Agreement with Cloudflare | blabs.apnic.net
The Art of Soldering - Motherboard
Atlanta, Colorado DOT ransomware mitigation costing millions
Journey Into Incident Response: Process Hollowing Meets Cuckoo Sandbox
Journey Into Incident Response: Making Incident Response a Security Program Enabler
Journey Into Incident Response: Introducing the Active Threat Search
Journey Into Incident Response: Security Monitoring with Attack Behavior Based Signatures
Journey Into Incident Response: Triage Practical Solution – Malware Event – Proxy Logs Prefetch $MFT IDS
GitHub - infobyte/faraday: Collaborative Penetration Test and Vulnerability Management Platform
How GDPR could impact US health care providers
Security baselines should underpin efforts to manage cybersecurity risk across sectors – Microsoft Secure
Building a Successful Security Operations Center (SOC): Part 4Rafeeq Rehman – Personal Blog
Vulnerability Assessment | Detect Vulnerabilities in Binaries via Hash Lookup
Microsoft to deliver new products and strategies for security innovation at 2018 RSA Conference – Microsoft Secure
Why the cyber security skills gap is so damaging – IT Governance Blog
How are the C-Suite failing cyber security? – IT Governance Blog
10 key areas to identify gaps in your GDPR compliance – IT Governance Blog
Why ISO 27001 is integral to data protection compliance – IT Governance Blog
The GDPR: What technical measures do you need to conduct? – IT Governance Blog
Healthcare Exchange Standards: IHE on FHIR tutorial
Healthcare Exchange Standards: De-Duplicating the received duplicate data
2018 Data Breach Investigations Report | Verizon Enterprise Solutions
2018-02.pdf
GitHub - XalfiE/Nix-Auditor: Nix Audit made easier (RHEL, CentOS)
The Impact of All 50 States Having Breach Notification Laws
Trusted insider at the federal level raises concerns | CSO Online
Imran Awan
Facebook's Zuckerberg Pledges Worldwide GDPR Compliance
Sep 2011 - C_inaday-NL-ISACA-Erik-van-Eeeden-Cobit.pdf
WSUS Automated Maintenance (Formerly Adamj Clean-WSUS) - Script Center - Spiceworks
The CISO as an Internal Security Evangelist - HealthcareInfoSecurity
How to setup SOC using open-source tools – Sath
Healthcare Data Management | Commvault
VMware Storage IO Control (SIOC) Overview
Open Security Operations Center
On Old Configs and Automation | The Networking Nerd
Mind Map for CCIE & CCNP Routing & Switching – neckercube.com
Mellanox, Ixia and Cumulus: Part 3 - MovingPackets.net
Mellanox, Ixia and Cumulus: Part 2 - MovingPackets.net
Mellanox, Ixia and Cumulus: Part 1 - MovingPackets.net
Container Security through Segregation « ipSpace.net by @ioshints
The Death Of Expertise
Security baseline for Windows 10 (v1511, "Threshold 2") — FINAL – Microsoft Security Guidance blog
Article: Using Secedit To Apply Security Templates | ITNinja
Infront Consulting Group - Microsoft IT solutions and software
Business Intelligence and Big Data Analytics Softwa
high performance WAF platform with Naxsi and HAProxy - HAProxy Technologies
Configuring Apache in front of JBoss Application Server Using mod_jk
The answers to your questions for Eben Upton - Raspberry Pi
Explaining and Demonstrating Jam and Replay Attacks on Keyless Entry Systems with RTL-SDR, RPiTX and a Yardstick One - rtl-sdr.com
How to clean a circuit board - The Silicon Underground
Kubernetes 1.10 Released - via @codeship | via @codeship
Looking inside a .NET core process using windbg – Rohith's blog
Compare two text files with PowerShell – neo
Ramping up on Powershell & CLI – Premier Developer
The Japanese Calendar’s Y2K Moment – I'm not a Klingon ( )
Cooking for Beginners: 5 Essential Sites for Newbies in the Kitchen
DSHR's Blog: Natural Redundancy
The Raspberry Pi 3B+ As An SDR – Without The SDR! | Hackaday
A comprehensive guide to Docker Networking – Marksei
The Bootup Baseline (by Tony Fortunato)
Deployment Research > Research
Lawmakers want more tech companies to address privacy legislation
Katello: Create a Domain, Subnet, Installation Media, OS, Provisioning Templates, Host Groups, PXE Boot | Lisenet.com :: Linux | Security | Networking
50 State Infographic: How Much Income Do You Need to Afford the Average Home? — My Money Blog
Automating 4,000 Microsoft SQL Databases with Rubrik, REST APIs, and PowerShell – Virtually Sober
AWS Online Tech Talks – April & Early May 2018 | AWS News Blog
How to create vSphere VMs with RDM disks
Tackling L33t-Speak | Linux Journal
Agedu - A Useful Tool for Tracking Down Wasted Disk Space in Linux
Simple Cloud Hardening | Linux Journal
Blockchain, Part I: Introduction and Cryptocurrency | Linux Journal
Weekend Reading: Sysadmin 101 | Linux Journal
20 Outstanding Backup Utilities for Linux Systems in 2018
How Wizards and Muggles Break Free from the Matrix | Linux Journal
Install an OpenStack cloud with Jenkins | Opensource.com
Laverna - keep your notes private
Capsule8 - Zero-day attack detection for modern Linux environments
How to Boot Debian 9 ISO File Directly From Hard Drive With GRUB2
42 Books That Will Make You A Better Person (Each Described In 1 Sentence) | RyanHoliday.net
A Google Cloud Platform Primer with Security Fundamentals
6 Steps for GDPR Readiness
20 Critical Security Controls: Control 16 - Account Monitoring and Control
What is Virtual Hardening for Websites? Read all about it.
20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program - Security Boulevard
Improved Cybersecurity Measures for Better Organizations | Netswitch Technology ManagementNetswitch Technology Management
Web Application Firewalls: The Definitive Primer - Security Boulevard
10 Best Practices for Mobile App Penetration Testing
20 Critical Security Controls: Control 15 - Wireless Access Control
Establishing a Global Security Operations Center (GSOC) - Security Boulevard
GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams - Security Boulevard
Why Enterprises Should Control Their Encryption Keys - Security Boulevard
It’s Complicated - Operational Security for Developers - Security Boulevard
Burp Suite continuing the Saga - Security Boulevard
SamSam Ransomware: How to Identify and Mitigate the Risk - Security Boulevard
Real-Time Analytics for PCI Compliance - Security Boulevard
Annual Report Shows Increased Maturity in Security Operations - Security Boulevard
SAP HANA Pentesting. Part 1: Vulnerabilities history
SecurityEverAfter 2018-03-29 21:17:00 - Security Boulevard
3 Payloads in Healthcare Data Breaches - Security Boulevard
20 Critical Security Controls: Control 12 - Boundary Defense
OWASP APPSEC Cali 2018, Josh Sokol's 'Architecting for Security in the Cloud' - Security Boulevard
Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk - Security Boulevard
RAVELLO: Troubleshooting VSAN Network connectivity issues – vMusketeers
VMware Specialist: vSAN – Objective 2.2 – Describe vSAN Requirements - thecloudxpert
Nexenta Announces NexentaCloud | penguinpunk.net
DBeaver is an SQL client and a database administration tool - Free Alternative to SQL Server Management Studio | ESX Virtualization
White-Label Backup Solution as a part of MSP Offering
Amazon S3 Storage Classes Explained
Managed Service Provider Pricing: Basic Guide on MSP Pricing Models
Best Backup Software in 2018 | G2 Crowd
What is SAP S/4HANA? – Business Introduction
SAP S/4HANA
The Many Hats Club: Color Doesn't Matter
20 Critical Security Controls: Control 11 - Secure Configuration for Network Devices
Physician, protect thyself: An ounce of prevention is worth a pound of cure - Security Boulevard
Nine Selves and the Hero’s Journey – Michael O. Church
How to improve your code using SonarQube
DSHR's Blog: Flash vs. Disk (Again)
Tofugu — A Japanese Culture & Language Blog
How Long Does It Take To Recover From vSAN Drive or Node Failures? — ThinkCharles.net
Metrics, Measurement, and Information Security -
SamSam Ransomware: How to Identify and Mitigate the Risk - Blog | Tenable™
How to prepare for a security audit | Trail of Bits Blog
GRUB Recovery for UEFI/GPT/LUKS/LVM · The Hacking Memento
GoScanSSH Malware spread avoiding Government and Military networksSecurity Affairs
IPFS is the Distributed Web
Securing the Corporate WLAN in a Healthcare Regulated Organization - securing-corporate-wlan-healthcare-regulated-organization-38370
Top 6 steps for GDPR compliance
InfoSec Handlers Diary Blog - How are Your Vulnerabilities?
NBlog - the NoticeBored blog: NBlog April 4 - 7 top tips on documentation
Announcing: new British Standard for cyber risk and resilience – Microsoft Secure
MalwareJake: Atlanta government was compromised in April 2017 - well before last week's ransomware attack
7 common flaws that keep security managers up at night
7 points CEOs need to know about Spectre and Meltdown
Envizon - Network Visualization Tool With Focus On Red / Blue Team Requirements - KitPloit - PenTest Tools for your Security Arsenal ☣
Pyfiscan - Web-Application Vulnerability And Version Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Moloch - An Open Source, Large Scale, Full Packet Capturing, Indexing, And Database System - KitPloit - PenTest Tools for your Security Arsenal ☣
GRR Rapid Response - Remote Live Forensics For Incident Response - KitPloit - PenTest Tools for your Security Arsenal ☣
Security Onion - Linux Distro For IDS, NSM, And Log Management - KitPloit - PenTest Tools for your Security Arsenal ☣
The GDPR: A guide for small businesses – IT Governance Blog
15% of computers still run on Windows XP at NHS Lothian in Scotland – IT Governance Blog
Employees’ lack of security awareness is “inexplicable and inexcusable” – IT Governance Blog
Simplify your risk assessments – IT Governance Blog
How to write an ISO 22301-compliant business continuity plan – with example template – IT Governance Blog
Data Security and Protection (DSP) Toolkit launched for health and social care – IT Governance Blog
GDPR compliance for professional services firms: time to get on track – IT Governance Blog
7 principles of the PRINCE2 project management method – IT Governance Blog
ISO 27001: How to set and document your information security objectives – IT Governance Blog
Why you should know about SSL certificates: CertDB.com Case
10 Alarming Cyber Security Facts that Threaten Your Data [Updated]
10+ Critical Corporate Cyber Security Risks – A Data Driven List [Update 2018]
Why Is Shadow IT So Common in Healthcare? - HealthcareInfoSecurity
Should HHS Offer Incentives for Cybersecurity Frameworks?
Full Disk Encryption on Linux – Exotic Security
Using Piwik Analytics – Exotic Security
What exactly is encrypted with Android full disk encryption?
Setting up FreeRADIUS to secure your WiFi – Exotic Security
KeePassX
Is patching still the best defence – Exotic Security
The implication was that a huge percentage of malware these days is delivered as an .exe in a zip file from an email claiming to be a traffic infringement or something similar. Suggesting that patching is no longer the easiest win for IT Security.
Automatic Updates for Debian – Exotic Security
Setting up Gogs on Debian Jessie with Apache2 and PostgreSQL – Exotic Security
Ansible Role Rdiff-Backup Script | World Backup Day | b3n.org
Fill Your Skills Tank - The IT Hollow
How to Reset the ESXi Root Password
Docker for impatient newbies part 1: Getting started – The Buttonfactory
20 Ways to Get The Most Out of Your Data Platform - Thomas LaRock
IP Over InfiniBand and KVM Virtual Machines - Patshead.com Blog
Lecture Your Sudoers - krypted.com
Out-Default Considered Harmful! | Keith's Consulting Blog
How to setup PFSense with the new Secure and Private CloudFlare 1.1.1.1 DNS – jasoncoltrin.com
Errata Security: WannaCry after one year
How to Set Up AWS CloudTrail: An Important Step in Account Security - Delta Risk
Slideshows - Dark Reading
3 Security Measures That Can Actually Be Measured
Medical Device Security Startup Launches
Four Gas Pipeline Firms Hit in Attack on Their EDI ...
How Security Can Bridge the Chasm with Development
How to Build a Cybersecurity Incident Response Plan
Supply Chain Attacks Could Pose Biggest Threat to ...
The Definition of Security is “Without Worry"
DevOps as the Art and Science of Deliberate Practice
Analysis of the 2018 F5 Threat Intel Report
11 ways ransomware is evolving | CSO Online
What is FedRAMP? How cloud providers can work with the U.S. government | CSO Online
MITRE ATT&CK
RSA Conference: CISOs' top 4 cybersecurity priorities | CSO Online
What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
Integrating Ansible with Jenkins in a CI/CD process
SQL Server Always Encrypted Data | CQURE Academy
GDPR: end user data loss prevention | CSO Online
An excellent demonstration of Cross-Site Request Forgery – Exotic Security
Alternative Networks for this site - ZeroNet – Exotic Security
Alternative Networks for this site - Tor – Exotic Security
Alternative Networks for this site - I2P – Exotic Security
Kerckhoffs's principle – Exotic Security
Setting up mailpile on Debian 8 Jessie for remote access – Exotic Security
Adding subject alternative name to certificate request – Exotic Security
Riot – Riot – open team collaboration
Home | Matrix.org
Seting up Matrix Synapse and Riot on Debian 8 Jessie – Exotic Security
Using ssh config to save settings and make your life easier – Exotic Security
Chris's Wiki :: blog/sysadmin/BackupCompressionNumbers
Storing passwords in cleartext: don't ever
Newsboat - An RSS/Atom Feed Reader for Linux Terminals
12 Git tips for Git's 12th birthday | Opensource.com
ASD's Essential Eight – Exotic Security
What I like about ASD's advice is that it's easy to read, in comparison ISO 27001:2013 might be full of great advice but even the name is indecipherable jargon to most people. ASD's Essential Eight are simple to understand, and with the exception of Application whitelisting, they are relatively easy to implement. They are: Application whitelisting Patch applications Disable untrusted Microsoft Office macros User application hardening (Uninstall shovelware) Restrict administrative privileges Patch operating systems Multi-factor authentication Daily backup of important data While it might be fun to install blinky-light boxes that run fancy machine learning algorithms and cost a fortune. ASD's Essential Eight are cheap, simple and effective and will definitely get you your best bang for your buck.
How I Manage Successful Customer 360 Projects
Upgrading a Nexus 6P from CyanogenMod 13 to LineageOS 14 – Exotic Security
Automating Oracle Linux Installation with Kickstart - Blog dbi services
Working with Windows File and Folder NTFS Permissions (Copy and Reset) – A Windows System Admin's Blog
Best Free Web Application Firewalls - Add an External Security Layer - LinuxLinks
IP Addresses in Entertainment | The Networking Nerd
Akash Network
Overclock Labs | Distributed Infrastructure, Simplified
10 Killer Tips To Speed Up Ubuntu Linux
How to Install Ansible AWX on CentOS 7
Is Cybersecurity Improving? - Lawfare
Is It Legal to Publish Email Correspondence Without Permission? - Law and Daily Life
Foolish money mistakes (and how to avoid them) ~ Get Rich Slowly
2 Simple Principles to Make Your Business Relationships More Profitable
GitHub - gerbera/gerbera: UPnP Media Server for 2018 (Based on MediaTomb)
FDA wants Facebook and Twitter to crack down on opioid sales
6 myths CEOs believe about security | CSO Online
SamSam group deletes Atlanta's contact portal after the address goes public | CSO Online
How to configure multiple websites with Apache web server | Opensource.com
Jaffar's (Mr RAC) Oracle blog: Backup2Cloud - a backup/restore automation utility
How reimaging detects the ODA hardware? - Blog dbi services
12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
Install SquidGuard with Squid proxy server : Complete guide - LinuxTechLab
How to Benchmark Your System (CPU, File IO, MySQL) with Sysbench
FOSS Project Spotlight: CloudMapper, an AWS Visualization Tool | Linux Journal
Apple now lets you access medical records in Health app
A simple (but effective) investment strategy ~ Get Rich Slowly
Dinnertime: Which Meals Offers The Most Nutrition Per Dollar? — My Money Blog
Epic Fail: Microsoft's Windows 7 Meltdown Fix Made Your PC More Insecure
How to programmatically set-up a (HTTP) proxy for a Selenium test | Adventures in the programming jungle
The hidden (and not so hidden) costs of a ransomware attack | CSO Online
Setting Up Full Disk Encryption on Debian 9 Stretch – Exotic Security
Installing OpenCanary on a Raspberry Pi – Exotic Security
Upgrading vSphere 5.5 before End of General Support – The Wifi-Cable
Benefits of Cloud Storage: Cloud Backup Cost, Data Availability and More
​Happy 25th birthday Red Hat Linux! | ZDNet
9 Ways to Vet Your New Employer
BranchScope: Your Intel CPUs Are Vulnerable To New Spectre-Like Attack
Manage your workstation with Ansible: Automating configuration | Opensource.com
How to create an open source stack using EFK | Opensource.com
Elasticsearch, Fluentd, and Kibana (EFK)
Get money: Live the life you want, not just the life you can afford
Attending AWSome Day #AWSomeDay #AWS @AWS_UKI @AWScloud – vMusketeers
Teaching ‘Cybersecurity Law and Policy’ - Lawfare
IETF Approves TLS 1.3 as Internet Standard
Dunning-Kruger in IT Infrastructure « ipSpace.net by @ioshints
5 Minute FOSS: Spinning a custom Linux distribution | Linux Journal
Reuse before buy before build – Exotic Security
OWASP OWTF
"WannaCry" ransomware attack losses could reach $4 billion - CBS News
Setting up Backblaze for Duplicati – Exotic Security
Hang Gliding Over Hell, 3 drives die in a 6 drive NAS – Exotic Security
Jaffar's (Mr RAC) Oracle blog: Oracle Cloud - Database Services
Jaffar's (Mr RAC) Oracle blog: Tricky Oracle data guard situation
Jaffar's (Mr RAC) Oracle blog: Benefits from Oracle Backup to could service
IT Value: Using the Web to Divide Your Organizations for Effective Resource Management | CIO
A Breakdown of Utility Computing | CIO
Ransomware Damage Costs $5 Billion in 2017, Up from $350 Million in 2015Cybersecurity Ventures
General Data Protection Regulation
GitHub - redhat-performance/quads: Automated future scheduling, documentation, end-to-end provisioning and assignment of servers and networks.
BSI Kitemark | BSI Group
FY17 NDAA Bill Summary.pdf
Cybersecurity experts: Device makers have “duty to keep users safe” from hacking | Imperial News | Imperial College London
BeyondCorp A New Approach to Enterprise Security
Hippocratic Oath for Connected Medical Devices | i am the cavalry
Draft NISTIR 8200, Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT) - nistir8200-draft.pdf
Tech Networking in Asheville NC and Western North Carolina
GitHub - R0GGER/docker-wsusoffline: Using a Docker container for WSUS Offline Update...
Leader in Third-Party Remote Access | Third-Party Remote Support | SecureLink
BeyondCorp | Run Zero Trust Security Like Google
Database Authentication with a Smart Card – Part 1 | Late Night Oracle Blog
FOSSA - Effortlessly comply with open source licenses
Linux mkfifo Command Tutorial for Beginners (with Examples)
ddgr - A Command Line Tool To Search DuckDuckGo From The Terminal | 2daygeek.com
ddgr
Digitizing VHS with Fedora | Opensource.com
8 Ways to Maintain a Clean, Lean Ubuntu Machine - Make Tech Easier
Huawei – Probably Not What You Expected | penguinpunk.net
Atlanta officials still 'working around the clock' to resolve ransomware attack | CSO Online
Shenzhen's Homegrown Cyborg - Motherboard
GitHub - cldrn/rainmap-lite: Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!
Windows Server release information | Microsoft Docs
Windows Client and Server in 2018 – Stick To The Script
Every Business Needs to Prioritize Security - common denial
Defining Computer Security Incident Response Teams | US-CERT
CERTs, CSIRTs and SOCs after 10 years from definitions - Security Boulevard
4 Tips for Managing an Employee with Addiction
My life philosophy: 49 things I've learned during 49 years on Earth
Teamwork: Embracing new culture of work – The Art of Possible
Going paperless with Tesseract OCR
Hackaday Visits World’s Oldest Computer Festival: TCF 43 | Hackaday
How to download files with Powershell - Thomas Maurer
TCF
Tracking ransomware end-to-end | the morning paper
How to Save on Storage cost and security using AWS - ITSMDaily.com
Infosecurity.US - Web Log - Our Strategy...
Technological Unemployment: Yes, It’s Our Problem Too – Michael O. Church
8 Easy Ways to set your Desktop up for a Distraction-Free Software Demo
Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]
Tackling a Fear Of Public Speaking
Automating DataDog with Terraform
Windows Metric Dashboards with InfluxDB and Grafana
5 Tips for Writing DSC Resources in PowerShell 5
Ultimate PowerShell Prompt Customization and Git Setup Guide
Testing Ansible Roles Against Windows with Test-Kitchen
Slow Transfer, Packet Losses, Congestion Avoidance, Shaping and Policing (by Phil Storey)
City of Atlanta paralyzed by a ransomware attack, is it SAMSAM?Security Affairs
What Does the GDPR Consider to be a Data Breach?
Computer Forensics: Chain of Custody
SANNY Malware Delivery Method Updated in Recently Observed Attacks - Security Boulevard
Beware the fake Facebook sirens that flirt you into sextortion – Naked Security
ODIN - Tool For Automating Penetration Testing Tasks - KitPloit - PenTest Tools for your Security Arsenal ☣
PyRexecd - Standalone SSH Server For Windows - KitPloit - PenTest Tools for your Security Arsenal ☣
Cyber attacks: What to prepare for – IT Governance Blog
How ITIL can help your cyber security career – IT Governance Blog
How ISO 27001 and ISO 22301 can help keep your organisation secure – IT Governance Blog
vSAN Benchmarking on Consumer Grade Kit — ThinkCharles.net
Removing Inaccessible Objects in vSAN — ThinkCharles.net
A Look At The Relative Spectre/Meltdown Mitigation Costs On Windows vs. Linux - Phoronix
Setting up a safe development environment in Linux · gsilvapt dot me
Healthcare Exchange Standards: Privacy is not dead, but does need reinforcement
4 Ways Every Employee Can Play a Role in Their Company’s Security
Hybrid cloud security: Emerging lessons | The Enterprisers Project
Create VLAN bridge under Linux (trunk, IEEE 802.1Q) | panticz.de
A system administrator's guide to getting started with Ansible - FAST!
Is Patching And Tech Support Bad? A Response | The Networking Nerd
vMotion with 40GbE NIC – virtual graveyard
The Linux Journal NSA Weekend Reading List: Tails and Tor | Linux Journal
Doc Searls Weblog · Facebook’s Cambridge Analytica problems are nothing compared to what’s coming for all of online publishing
France's Cyberdefense Strategic Review and International Law - Lawfare
United States Cyber Command’s New Vision: What It Entails and Why It Matters - Lawfare
Dell EMC and VMware – Better Together for Service Providers - VMware Telco NFV Blog - VMware Blogs
mastodon.social - Mastodon
VMware ESXi and ESXTOP "P" Key is New in vSphere 6.5 - Did you know? | ESX Virtualization
Surviving 63 Drives Failure on vSAN — ThinkCharles.net
NSX-v 6.3 - Load Balancing capabilities + confi... |VMware Communities
25 Low-Cost Foods Packed With Nutrition
Advice for a young adult learning to manage money ~ Get Rich Slowly
New R2D2 Technique Protects Files Against Wiper Malware
An accessible overview of Meltdown and Spectre, Part 2 - Security Boulevard
Cloud Backup for Small Business: 3 Misconceptions SMBs Have About Cloud
Study: Malware counts higher on computers whose users visited piracy sites
Government ‘should have done more’ to prepare organisations for the GDPR – IT Governance Blog
80% of organisations affected by cyber security skills gap – IT Governance Blog
On purpose and by necessity: compliance under the GDPR | the morning paper
Three years of the Right To Be Forgotten | the morning paper
10 Vital Features You Should Know About Your Windows PC
10 Basic Encryption Terms Everyone Should Know and Understand
Lack of investment in security training adds to skills gap
Google Beefs Up Cloud Security and Data Privacy Tools | News & Opinion | PCMag.com
White House pushing for research carveout in GDPR
Why is the CISO Role the Most Difficult Job in the World?Webinar.
Digital Advertising Consent
Oath Takes Aggressive Steps Outlining GDPR Compliance 03/22/2018
Is MLAG an Alternative to Stackable Switches? « ipSpace.net by @ioshints
Suplemon - A Powerful Console Text Editor with Multi Cursor Support
Practical Security Principles
The Reason Software Remains Insecure
The Two Kinds of Privacy Loss
Mitigating Personal Cyber Risk | CSO Online
How Programming Affects Your Brain: 3 Big Truths According to Science
How to Decide If You Need the New Raspberry Pi 3 B+ Model
Wireshark, an Open-Source Forensic Tool
Opening RDP sessions from KeePass
CRISC Domain 2: IT Risk Assessment
Why it’s a bad idea to break the rules, even if it’s for a good cause - 80,000 Hours
Use Ansible to patch your system and install applications | Opensource.com
A Guide to Preventing Common Security Misconfigurations
CASP Domain 4: Integration of Computing, Communications, and Business Disciplines
8 Podcasts About Crypto for Future Bitcoin Millionaires
Threat Horizon 2020: Foundations Start To Shake - Information Security Forum
10 efficient tools every marketing team needs in 2018
ToolsWatch.org – The Hackers Arsenal Tools Portal » T.rex_scan v0.2 – Integrate Tools to Audit Web Sites
Critical Security Controls v7 RELEASED - Security Boulevard
Yoda - The Command line Personal Assistant For Your Linux System - OSTechNix
WPSeku v0.4 - Wordpress Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Cybersecurity Spring Cleaning: 3 Must-Dos for 2018 ...
Zerto – What it is and why you need it | JonKensy.com
Case Study: Scaling Your Data Scientist
Your servers are replicated? Your backups should be, too » NetWorker Information Hub
SOC in Translation: 4 Common Phrases & Why They ...
Western Digital – The A Is For Active, The S Is For Scale | penguinpunk.net
7 Types of People Who Will Help Grow Your Career
Evil Tester: Automated Execution for Acceptance Testing - Java JUnit FizzBuzz
AMD vows to fix newly-disclosed processor vulnerabilities
Moro - A Command Line Productivity Tool For Tracking Work Hours - OSTechNix
7 Spectre/Meltdown Symptoms That Might Be Under ...
Codev2:Lawrence Lessig
(My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
redhat event Ansible Automates Zurich - Blog dbi services
The Cambridge Analytica-Facebook Debacle: A Legal Primer - Lawfare
NBlog - the NoticeBored blog: NBlog March 20 - a critique of CIS netsec metrics
Python BeautifulSoup Tutorial For Beginners | Linux Hint
Taipan - Web Application Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
Lessons the world took from ITIL | The IT Skeptic
ISO 27001 and the GDPR
Do IT Pros Consider Security When Purchasing Software? - Security Boulevard
CIS Releases Revised Top 20 Critical Security Controls
CUDA is Like Owning a Supercomputer | Hackaday
A Data Protection Officer's Guide to the GDPR Galaxy
Insider threat examples: 7 insiders who breached security | CSO Online
How to Encrypt Files From Within a File Manager | Linux.com | The source for Linux information
ACUS_Intel_MedicalDevices.pdf
CSR - ScottErvenMedicalDeviceSecurity.pdf
Underwriters Labs refuses to share new IoT cybersecurity standard | Ars Technica
Talks | i am the cavalry
It's Insanely Easy to Hack Hospital Equipment | WIRED
SNMP Lab Setup and Penetration Testing
Errata: Steve Gibson
Enterprise NAS Data Migration and Replication Solutions | Datadobi
Vint Cerf and Bob Kahn, co-inventors of TCP/IP protocol | FierceTelecom
GitHub - vincentcox/StaCoAn: StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Network issues with Updates KB4088875 / KB4088878 | Born's Tech and Windows World
Security-announce Info Page
OIG: HHS Improves Security, Yet Flaws Remain - HealthcareInfoSecurity
Weekly Cyber Risk Roundup: Russia Sanctions, Mossack Fonseca Shutdown, Equifax Insider Trading - Security Boulevard
Chris's Wiki :: blog/solaris/ZFSPoolRecoveryComing
Oracle Ravello Blogger Day 2018 (aka #RBD2) | Michelle Laverick...
Seth's Blog: When well-meaning people can't see it the same way
Magical Thinking in Internet Security
A Tale of Two Phases and Tech Inertia | Hackaday
What?s It Take To Be Tomorrow?s CISO? - Security Boulevard
Top 10 articles every SAP BASIS admin must read
Steps to Become CISSP (Certified Information Systems Security Professional)
Cybersecurity Evolution and its Importance in the Digital Age - Security Boulevard
More Free/Open Source Computer Forensics Tools
Are You Compliant with NIST 800-171? - Security Boulevard
9 Cyber Security Tips SMBs Can Implement Now - Delta Risk
CASP Domain 3: Research and Analysis
CASP Domain 2: Risk Management and Incident Response
CASP Domain 1: Enterprise Security
Harden your JBoss EAP 7.1 Deployments with the Java Security Manager - Red Hat Customer Portal
Microsoft Security Intelligence Report volume 23 is now available – Microsoft Secure
Security: 17 Things | Linux Journal
3 best practices for securing Kubernetes environments | Opensource.com
Getting to know your company’s risk appetite | CSO Online
The CLOUD Act Doesn’t Help Privacy and Human Rights: It Hurts Them - Lawfare
GitHub - initstring/linkedin2username: OSINT Tool: Generate username lists for companies on LinkedIn
GitHub - rezasp/joomscan: OWASP Joomla Vulnerability Scanner Project
SpiderFoot
5 reasons why law firms should adopt ISO 27001 – IT Governance Blog
Failing to patch vulnerabilities now will lead to punishment under the GDPR – IT Governance Blog
Get involved in Shaping the Future of the Internet (by Nalini Elkins)
GDPR Violations Are Hiding In Your Database - Here's How To Find Them - Thomas LaRock
We Need To Talk About Dashboards - Thomas LaRock
(ISC)2 Report: Glaring Disparity in Diversity for ...
Oracle Ravello Blogger Day 2 (#RBD2) – Part 2 – Ather Beg’s Useful Thoughts
Oracle Ravello Blogger Day 2 (#RBD2) – Part 1 – Ather Beg’s Useful Thoughts
3 ESXi Backup Methods using the Command-Line
FAI.me - build you own customized installation image
Chris's Wiki :: blog/linux/NfsiotopDesire
How to take back control of /etc/resolv.conf on Linux – Ctrl blog
MSRC security guidance: the dashboard | >_
Oracle Patches Spectre for Red Hat | Linux Journal
Infection Monkey
How to Overclock Your AMD GPU with AMDGPU on Linux - Make Tech Easier
Woke to IT Age Discrimination - The IT Hollow
Terence Luk: Monitoring Microsoft Exchange Server 2010, 2013 and 2016 services with PowerShell script and task scheduler
Emerging Technologies and VeriSM | Purple Griffon
The SQL Server Tiger Team Bookmarks - Thomas LaRock
Intel Spectre/Meltdown Microcode Updates (March 11, 2018) | Born's Tech and Windows World
MSRC security guidance: about release notes | >_
Databases need to be patched to a minimum before April 2019
GRV - A Tool for Viewing Git Repositories in Linux Terminal
Oracle Linux vs RedHat | Linux Hint
Cli.Fyi – A Tool To Quickly Retrieve Useful Information | 2daygeek.com
HIPAA Guidelines & Cloud Service Providers - Security Boulevard
XKCD, Generations - Security Boulevard
An Overview of the CCSP Domains
The Ultimate Guide to CCSP Certification
Evolving to Security Decision Support: Laying the Foundation - Security Boulevard
How to Prepare for the Future of Healthcare Digital Security - Security Boulevard
March Updates on Frameworks & Standards - Security Boulevard
The Top Five SOC 2 Compliance Questions Answered - Security Boulevard
What the Next Era of Cloud Computing Means for AppSec & the SDLC - Security Boulevard
Virginia Commonwealth University Enrolls WhiteHat Security and its Application Security Platform to be the Foundation of its Application Vulnerability Management Program - Security Boulevard
Army History, No. 106, Winter 2018 - AH106(W).pdf
2018 Cyberthreat Defense Report: Where IT Security Is Going - Security Boulevard
From my Gartner Blog - The Virtual Patch Analyst - Security Boulevard
Shifting Gears to Cloud-Centric Cybersecurity - Security Boulevard
What is a vulnerability management program? - The Silicon Underground
VMRay Analyzer: Rapid Malware Analysis for Incident Response (IR) Teams - vmray-analyzer-rapid-malware-analysis-incident-response-ir-teams-38325
Learn More about the 2018 PMP Exam Change | Tech Roots
Measure Security Performance, Not Policy Compliance - Security Boulevard
Who Cares About Cybersecurity? - Lawfare
Comparing Plans | Oracle Scratchpad
How To Quickly Monitor Multiple Hosts In Linux - OSTechNix
HIMSS18: Cybersecurity Takeaways - HealthcareInfoSecurity
GitHub - facebook/zstd: Zstandard - Fast real-time compression algorithm
UTOUG Training Days 2018 in Salt Lake City
NextGen SIEM Isn’t SIEM - Security Boulevard
NBlog - the NoticeBored blog: NBlog March 8 - brainstorming awareness ideas
What’s new for the Command Line in Windows 10 version 1803 – Windows Command Line Tools For Developers
CredsLeaker - Tool to Display A Powershell Credentials Box - KitPloit - PenTest Tools for your Security Arsenal ☣
Ride The Lightning: Large Law Firms Seeing More Data Breaches
Physical Data Center Security – Make it better
sub6 - Web App Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
The cost of a cyber attack – IT Governance Blog
Home Depot in $27.84 million California hazardous waste, privacy settlement
Patching Your Software Alone Is A Hassle. Not Patching Is A Risk
Your IT shop is Ugly! Part 3 | Virtual Me
Your IT shop is Ugly! Part 2 | Virtual Me
Your IT shop is Ugly! Part 1 | Virtual Me
Updated Oracle Roadmap Points To Post-11.4 Solaris Release Around 2020 - Phoronix
vSAN Online Health checks: New KBs now available - Virtual Blocks
vSAN Online Health checks: New KBs now available - Virtual Blocks
Rubrik Automated IT Helpdesk Ticketing v1 – Virtually Sober
Intel X710 NICs Are Crap - The Lone Sysadmin
Essential RHCE/RHCSA Study Guides – Codingbee
Nobody is an expert at Oracle Database 18c | The ORACLE-BASE Blog
Get IAM roles,policies and users-AWS CLI | geekdudes
Make Your Program Slower With Threads - Marc's Blog
Two traps in iostat: %util and svctm - Marc's Blog
Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
Latency lags bandwidth - Marc's Blog
A layered approach to backups | Scott Gruby's Blog
PowerCLI - VM and Host Metrics To Elasticsearch - EverythingShouldBeVirtual
Ansible for Extreme Devices · Lindsay Hill
Network Janitor | The Smartest Guy in the Room
How to Setup iSCSI Server (Target) and Client (Initiator) on Debian 9
Deeper Dive—Are the 3 major DRAM producers gaming the market? | FierceCable
sigma - Generic Signature Format for SIEM Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
How to write a GDPR privacy notice – with documentation template example – IT Governance Blog
Equifax facing historic data breach costs
GDPR - Three Things You Can Do Now to Prepare
Link Layer Discovery Protocol (LLDP): How it Works and Configuration
vRetreat 2018: Zerto Virtual Replication 6.0 – Ather Beg’s Useful Thoughts
Errata Security: Some notes on memcached DDoS
New York attorney general dips his toe into HIPAA’s murky waters
Is Healthcare Sector Cybersecurity Finally Maturing?
Partners HealthCare CISO on Bolstering Endpoint Security
EPIC - SEC Issues Guidance on Cybersecurity Disclosures
Due Diligence on Cybersecurity Becomes Bigger Factor in M&A - WSJ
Responding to GDPR pushback: The business case for compliance
Survey: Health care employees willing to sell confidential data
46 Tips To Save You Time, Money, and Trouble (From The 1950’s!) | Budgets Are Sexy
Addressing Top Health Data Risk Management Mistakes
HIMSS Speaker Dill on Underutilized Security Technologies
Malicious Bash Script with Multiple Features - SANS Internet Storm Center
SMBv1, The Phoenix of Protocols? - /dev/random
6 Questions to Ask Your Cloud Provider Right Now
Essential guidance on achieving and prioritising GDPR compliance – IT Governance Blog
Free green paper: essential compliance guidance for the NIS Directive – IT Governance Blog
Generating Scan Reports Using Nmap (Output Scan)
7 traits of a valuable DevOps team player | The Enterprisers Project
8 Best Tools to Access Remote Linux Desktop
Insider Threat Seriously Undermining Healthcare ...
Pragmatic Security: 20 Signs You Are 'Boiling the ...
Identity Management: Where It Stands, Where It's Going
Hackers Set New DDoS World Record: 1.7 Tbps
3 open source tools for scientific publishing | Opensource.com
Cybersecurity Gets Added to the M&A Lexicon
How to automatically scale Kubernetes with Horizontal Pod Autoscaling - Justin W. Flory's Blog
MAAS for the home | Ubuntu Insights
Healthcare Experiences Twice the Number of Cyber Attacks As Other Industries | CSO Online
SecurityBrief Australia - Exclusive Interview: Red Hat on their software-defined storage solution for surveillance
Host your own email with projectx/os and a Raspberry Pi | Opensource.com
projectx / os · GitLab
Cyberspace is the New Battlespace - Lawfare
BlackBerry's post-phone future includes IoT security
4 Ways Small Businesses Can Improve Their Cyber Security Strategies
How Can You Develop Good Leadership as a Business Owner?
EFF: Geek Squad has been working with the FBI for a decade
SQL database engine service startup failure: Troubleshooting Checklist – Don Castelino
Setting Up HAProxy for a SaaS Application - via @codeship | via @codeship
Barrier-enabled IO stack for Flash storage | the morning paper
How CEOs Without College Degrees Got to the Top
Seth's Blog: Bonnie's rules for being a better client
10 Techniques to help you present better | Power BI
Quantum Computing: Quick Reference Guide – Microsoft Faculty Connection
Two new GDPR solutions – Modern Workplace – Partner Readiness
Automatically Generating SQL Server Memory Dumps at a Defined Interval – SQL Meditation
Recent Changes in my "Learning Tools" Repository - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, virtualization, and networking, all with an open source view
How to use partclone to create a "smart" partition backup - LinuxConfig.org
Five Strategies For Surviving A Software Audit - IT Jungle
Sense/Net - Photoframe
Almost half of US healthcare organizations breached in the past year
1 Terabit DDoS Attacks Become a Reality; Reflecting on Five Years of Reflections
Carlos Morales
Happy birthday to us! - Raspberry Pi
Thermal Camera Diagnoses Thermal Issue on a Sonoff Switch | Hackaday
Fixing Health IT Security Risks at an Academic Hospital & Trauma Center
HIMSS 2018 Preview: Security, Business Intelligence & Interoperability
What is Rancher? Containers in the age of Cattle – Marksei
DeployHappiness | Remotely Renaming Computers Forever – A PowerShell Adventure
DSHR's Blog: Archival Media: Not a Good Business
DSHR's Blog: "Nobody cared about security"
9 Useful Electronics Tools Under $13 | Cool Tools
BPF comes to firewalls [LWN.net]
Cilium
Upgrading Your Blade Servers For Free – Blades Made Simple
International Law and Cyberspace: Evolving Views - Lawfare
18c new Lost Write Protection - Blog dbi services
Practical Lessons on WPF Forms and PowerShell | Alan's Blog
Preventing DDoS amplification attacks based on memcached - Red Hat Customer Portal
ToolsWatch.org – The Hackers Arsenal Tools Portal » Prowler v1.6 – AWS Security Assessment and Forensics Tool
The World's Largest Repository of historical DNS data.
Policy routing for 'GUEST LAN' » Saved LOG
Is there a CAP theorem for Durability? - Marc's Blog
r
Hyper-V Virtual Machine Backup Utility (Update Version 4.1) – Stick To The Script!
Value In Automating Processes In ITIL® Framework | Purple Gr...
84% of cybersecurity pros are open to switching companies in 2018 - TechRepublic
How to improve Apache server security by limiting the information it reveals - TechRepublic
How it Works: Understanding vSAN Architecture Components
Financial Cyber Threat Sharing Group Phished — Krebs on Security
Healthcare sector's biggest threats come from insiders, report
WannaCry hits 12 Connecticut state agencies
OpenSSH Two Factor Authentication (But Not Service Accounts) · System Overlord
Cl0neMast3r - Git All Your Favorite Tools In One Click - KitPloit - PenTest Tools for your Security Arsenal ☣
Two Ways to Get Mapped Drives with WMI | Alan's Blog
1.35Tbps: GitHub Faced World's Biggest Ever DDoS Attack
Complying with NIST Guidelines for Stolen Passwords - Security Boulevard
Bruce Plante's 'Russian Cyberwarfare' - Security Boulevard
Securing Healthcare Data and Applications - Security Boulevard
RIP CERT.org – You Will Be Missed
Hundreds of Tim Hortons outlets across Canada closed after malware attackSecurity Affairs
WAScan - Web Application Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
LineageOS 15.1 (Android 8.1.0) for Raspberry Pi 3
Restic - A Fast, Secure And Efficient Backup Application - OSTechNix
Misleading Cyber Foes with Deception Technology - ...
2018 Privacy Tech Vendor Report
Passhunt - Tool For Searching Of Default Credentials For Network Devices, Web Applications And More - KitPloit - PenTest Tools for your Security Arsenal ☣
Bettercap v2.0 - The State Of The Art Network Attack And Monitoring Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
yakLab Part 1c: Bootstrapping Bifrost with Ansible · Leif Madsen
yakLab Part 1b: Kickstart File Build Out · Leif Madsen
yakLab Part 1a: Building the virtual Cobbler deployment · Leif Madsen
yakLab build out · Leif Madsen
Create a virtual undercloud with TripleO Quickstart · Leif Madsen
A Secure Development Approach Pays Off
Training insurance agents and brokers in cyber risk | CSO Online
Sizing Up the Role of Deception Technology in Healthcare
Using a 'Privacy by Design' Approach to GDPR Compliance
Reminder: Beware of the "Cloud" - SANS Internet Storm Center
How to manage your workstation configuration with Ansible | Opensource.com
Nuance says NotPetya attack led to $92 million in lost revenue | CSO Online
14 top tools to assess, implement, and maintain GDPR compliance | CSO Online
Creating virtual machines in libvirt with virt-install · Leif Madsen
Peanalyzer - Advanced Portable Executable File Analyzer And Disassembler - KitPloit - PenTest Tools for your Security Arsenal ☣
CALISDO: Threat Modeling for Distributed Designs - Marc's Blog
Understanding Guide to Mimikatz
Presentation: Understanding & avoiding AV detection | DiabloHorn
An introduction to ITIL – IT Governance Blog
GDPR priorities in the lead up to May – IT Governance Blog
List of data breaches and cyber attacks in February 2018 – IT Governance Blog
Consumer group: GDPR will have positive impact worldwide
A Sneak Peek at the New NIST Cybersecurity ...
How & Why the Cybersecurity Landscape Is Changing
What Enterprises Can Learn from Medical Device ...
Ansible, Part IV: Putting It All Together | Linux Journal
An Update on Chinese Cybersecurity and the WTO - Lawfare
Chris's Wiki :: blog/linux/WorkMachine2017
The Third Generation of Security is Here | CSO Online
Best security software, 2018: How 5 cutting-edge tools tackle threats | CSO Online
New Cyber Security Style Guide helps bridge the communication gap | CSO Online
“Medjacked”: Could Hackers Take Control of Pacemakers and Defibrillators—or Their Data? | The Knowledge Group
Memcached DDoS – There’s Still Time to Save Your Mind | The Networking Nerd
Summary: The EU General Data Protection Regulation - Lawfare
Vulnerability in HPE Integrated Lights-out 2, 3, 4 | Born's Tech and Windows World
Chris's Wiki :: blog/linux/CheckingRAMDIMMInfo
Upgrade ESXi 6.0 to 6.5 via command line - JBcomp.com
iSCSI – target and initiators – Codingbee
Chris's Wiki :: blog/sysadmin/AutomatingAcmetool
Chris's Wiki :: blog/tech/MeltdownBadTimeToBuy
Block Advertising on your Network with Pi-hole and Raspberry Pi | hobo.house
Chris's Wiki :: blog/linux/ZFSOnLinuxExperienceII
Stability and evolution together are good signs. They mean that you have a project that is not stagnating and that's well run, and further that people care enough about ZFS on Linux (and use it enough) to bring up important features on it first (in the broad open source world).
GitHub - f1xpl/openauto: AndroidAuto headunit emulator
crankshaft: raspberry pi + android auto + free software + love.
Top 10 open source legal stories that shook 2017 | Opensource.com
DevOps jobs salaries: 9 statistics to see | The Enterprisers Project
AI Beats 20 Top US Lawyers, Reads Contracts In 26 Sec With 94% Accuracy
BAS and Red Teams Will Kill The Pentest - Augusto Barros
E-Mail Leaves an Evidence Trail - Security Boulevard
Computer Forensics: FTK Forensic Toolkit Overview
Secure & Compliant Payment Solutions for Contact Centers | PCI Pal
The Five Attributes Needed to Succeed at DevSecOps - Security Boulevard
The 12+ Internet Crime Stories That Make Cybersecurity Measures Essential
Why it matters?
IoT hack: how to break a smart home…again - Securelist
Cloud Computing Basics - Security Boulevard
Advance Web Application Testing using Burpsuite
Python Graphing Library, Plotly
The EU Network and Information Security (NIS) Directive
Australia’s Mandatory Breach Notification Laws: Time to Predict, Prevent, and Protect - Security Boulevard
18c, Cloud First and Cloud Only features: think differently - Blog dbi services
Lessons From Recent HIPAA Settlements - GovInfoSecurity
Upgrade to the UEK Release 5 Preview on Oracle Cloud Infrastructure | Oracle Linux Blog
The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf
state-of-cybersecurity-report.pdf
Set up boot method using IPMI - Dell Community
TripleO: Using the fake_pxe driver with Ironic · Leif Madsen
Dylan @ His Best: IPMI Upgrade through PXE
PXE BOOT « LINUX TUTORIAL
icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network - KitPloit - PenTest Tools for your Security Arsenal ☣
The Dirty Dozen Vendors Deluging Your Vulnerability Management Team - Security Boulevard
Google Cloud Platform
Ikigai – Finding Your “Reason For Being” — My Money Blog
Ipmitool - Kyle's Wiki
Cyclelicious » vSphere 5 Network PXE install
Chris's Wiki :: blog/tech/MisleadingAverages
How to use IPMI and IPMITOOLS » Saved LOG
Chris's Wiki :: blog/sysadmin/FileserversVsTheCloud
Dell C6100 BIOS/BMC Configuration | vNetWise
pxe - How do you add a machine to MAAS with IPMI power using CLI - Ask Ubuntu
IBM Knowledge Center - I/O tracing using blktrace
Chris's Wiki :: blog/linux/BlktraceNotes
Why culture is the most important issue in a DevOps transformation | Opensource.com
Virtual Institute for I/O [Virtual Institute for I/O]
Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
ODA Re-Image Baremetal (12.1.2.12) | EzDBA – BLOG
Quickly Make Fedora Linux Fonts Glorious | hobo.house
A slightly more realistic look at lvmcache – The ongoing struggle
blktrace
bcache and lvmcache – The ongoing struggle
Tracking down the lvmcache fix – The ongoing struggle
Online RegExp Testers | ma.ttwagner.com
Half a Petabyte in 4U | ma.ttwagner.com
Counting open files by process | ma.ttwagner.com
5 indispensable bash tricks | ma.ttwagner.com
Stout-basted Toulouse Sausages and Vegetables | hobo.house
Automate Dell iDRAC Administration with XML | hobo.house
Secure Cloud Data Backups using Python, Tar and GPG | hobo.house
Create OpenStack Users the Easy Way | hobo.house
RDO
Automated OpenStack Deployments with Foreman and Puppet | hobo.house
Simple Disk Performance Testing with Linux | hobo.house
nmon can give you some additional detail. Install nmon and run “d” for disk activity, or “c d n t” for a tiered metrics layout.
2.5.2. Tuned-adm - Red Hat Customer Portal
Remembering Tom Wallis, The System Administrator That Made The World Better | The Changelog
How to Make Citrus Chicken with Kale | hobo.house
Creating lots of iSCSI LUNs Quickly on Netapp | hobo.house
How to Manually Clean Indexes from Elasticsearch | hobo.house
Back to the Future: Converting a Server VM to Bare Metal | hobo.house
Trick out your Terminal | hobo.house
How to Make Killer Lasagna for Eight | hobo.house
Browbeat Is now an OpenStack Project | hobo.house
Fun and Profit with Reverse SSH Tunnels and AutoSSH | hobo.house
Tmux for GNU Screen Refugees and Vim Users | hobo.house
Automate Infrastructure Docs with Python, WordPress and Foreman | hobo.house
OpenCPN Official Site
7 Underused IPMItool Commands - Postmodern Sysadmin
Installing Debian by PXE using Supermicro IPMI Serial over LAN – The ongoing struggle
Bob Metcalfe — The Man (and Lessons) Behind Ethernet, Metcalfe’s Law, and More | The Blog of Author Tim Ferriss
Automate SuperMicro Server Provisioning or Die Trying | hobo.house
IPMI trick: Set the boot device | ma.ttwagner.com
Learning with Texts :: Help/Information
10 Basic Cybersecurity Measures - 10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf
Australian Cyber Security Centre (ACSC)
Top 4 Mitigation Strategies to Protect Your ICT System: ASD Australian Signals Directorate
Therac-25 - Wikipedia
OpenSnitch
Iridium Browser: A Browser for the Privacy Conscious
infosecinnovations
Incident Response Plan - You Need One... - NetWatcher - Cyber Security and Network Monitoring
Q and A - Script Powershell FileSystemWatcher
GitHub - glasnt/wail2ban: fail2ban, for windows.
An Introduction to Cybersecurity - file.html
Xylok Scanner Xylok Dashboard
Linked - How Manafort’s inability to convert a PDF file to Word helped prosecutors
Pledge: OpenBSD’s defensive approach to OS Security
Another Windows 10 version overview – Red Pill BLOGS
AWS EFS Windows
2017 Was A Nightmare Year For Security
7,900 Vulnerabilities In 2017 You Aren’t Aware Of May Put Your Organization At Risk
The Slow Burn of Meltdown and Spectre: Exploits, Lawsuits, and Perspective
Electricity Rates and Usage | Electricity Local
FactsCruncher - Facts For Fun: Easy way to install TK on Strawberry PERL ON WINDOWS!!
Docker vs CoreOS Rkt
LeanSentry: IIS Application Monitoring + Diagnostics
Resources
media.ccc.de - Sanitizing PCAPs
Vulnerator
Creating a culture of change
The East West Institute's New Report on Encryption: A Review - Lawfare
IBM's Phil Estes on the Turbulent Waters of Container History
Linux LAN Routing for Beginners: Part 1 | Linux.com | The source for Linux information
SAP Offers Three New GDPR Compliance Tools 02/22/2018
CCNA Training » Basic MPLS Tutorial
Prevent packages from being updated under Ubuntu / Debian – – Unixblogger –
How to Record Your Screen Using VLC
12 bad enterprise security habits to break | The Enterprisers Project
Kaspersky Lab v. DHS: The Government's Response and Kaspersky's Reply - Lawfare
Top 5 Useful VMware ESXi CLI Commands | ESX Virtualization
2ine the OS/2 emulator | Fun with virtualization
Meltdown patch for OpenBSD is available ... let's wait for feedbacksSecurity Affairs
Cybersecurity - Tips to Protect Small Business from Cyber AttacksSecurity Affairs
Intel failed to warn US government about Meltdown and Spectre flaws before going public
vsRisk™
Spectre and Meltdown Attacks - Security Boulevard
SSL with WildFly 8 and Undertow
Configuring SSL in Wildfly 8/9/10 | Real Life Java
Change Insecure Key To My Own Key On Vagrant
New Spectre/Meltdown Variants - Schneier on Security
Embracing the Chaos of Chaos Engineering - via @codeship | via @codeship
The Ultimate Pre-Install ESXi Host Setup Checklist
Strategies to realizing Cost Savings in Azure – Girish's Blog – Are you developing ON the cloud?
Making sense Of Linux namespaces -- Prefetch Technologies
How To Turn An Extra Phone Into A Complete Hotel Room Security System - foXnoMad
Health Net Cited for Refusing a Security Audit
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies - KitPloit - PenTest Tools for your Security Arsenal ☣
The 5 stages of ITIL – IT Governance Blog
Annabelle ransomware a horror show for users
Announcing dbachecks – Configurable PowerShell Validation For Your SQL Instances | SQL DBA with A Beard
How to Install and Use Netdata Performance Monitoring Tool on Debian 9
What Is Customer Data Onboarding and Do I Need It in My Business?
IOS Tips | Nbctcp's Weblog
How to Choose a Legal Tech Conference to Attend - Law Technology Today
GDPR 72-Hour Notification
Getting Started with IoT Security in Healthcare - ...
How to mitigate rapid cyberattacks such as Petya and WannaCrypt – Microsoft Secure
Key deadlines for the Scottish Public-Sector Action Plan on cyber resilience – IT Governance Blog
Troy Hunt: Introducing 306 Million Freely Downloadable Pwned Passwords
Have I been pwned? Pwned Passwords
What is a SharePoint architect anyway? – SharePoint Steve
Notes - Arnold Workout Advice - NevBlog
US AG creates a new 'Cybersecurity Task Force'
CIOs Say It Could Become Impossible to Manage Digital Performance as IT Complexity Grows | APMdigest - Application Performance Management
LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)
(6) Keynote: A history of the Internet: Hint, it was not the Bomb - YouTube
The AI era: 4 skills IT pros need to develop | The Enterprisers Project
Meltdown, Spectre Likely Just Scratch the Surface ...
7 Awesome Open Source Cloud Storage Software For Your Privacy and Security - nixCraft
L3 routing to the hypervisor with BGP | Vincent Bernat
| Sys Admin Extraordinaire | » Blog Archive » Job Interview Preparation, Tips and Job Transition Tips
WS2016 AD upgrade problem: TLS ciphers | House of Windows Blog
Speeding up TLS: enabling session reuse | Vincent Bernat
12 Open Source Cloud Storage Software to Store and Sync Your Data Quickly and Safely
Death of a middleman: Cloud storage gateways – and their evolution • The Register
Tools for OSForensics - ImageUSB - Write an image to multiple USB Flash Drives
OpenIO | Next-Gen Object Storage and Serverless Computing
Morro Data Announces CloudNAS | StorageReview.com - Storage Reviews
Documentation – OpenDedup
Effective medical device user training: Eight steps
Q&A with Massachusetts AG Maura Healey
ISAS - Our Services - NHS Information Security, Assurance & Penetration Testing
Information Systems Engineering Command (USAISEC)
Crawl coverage and vulnerability detection - Arachni - Web Application Security Scanner Framework
| Sys Admin Extraordinaire | » Blog Archive » Wireless Networking Workaround On VMware ESXi and Hyper-V Hosts Via DD-WRT Client Bridge Mode On A Linksys WRT54G v5
Be Aware of These 5 Data Center Trends in 2018
Digital nomads are hiring and firing their governments | TechCrunch
GitHub - azsdk/azsdk-docs
The Emergence of a Cognitive Risk Era: Cognitive Risk Framework | The GRC Bluebook
A Healthcare Minute: Healthcare Data Security and Systems [Video]
The Father Of The Internet Sees His Invention Reflected Back Through A 'Black Mirror' : All Tech Considered : NPR
What is Debian all about, really? Or: friction, packaging complex applications
DSHR's Blog: Notes from FAST18
This Game Teaches the History of Cryptography - Motherboard
Military Industrial Powerpoint Complex : Free Texts : Download & Streaming : Internet Archive
DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
Top 10 Operational Responses to the GDPR – Part 4: Data protection impact assessments and data protection by default and by design
Vulnerabilities Broke Records Yet Again in 2017
Meltdown/Spectre: The First Large-Scale Example of ...
Benchmarking Amazon EC2 Instances vs. Various Intel/AMD CPUs (February 2018) - Phoronix
One command database upgrade on ODA - Blog dbi services
Chroot: the magical healing powers of the original Linux virtualization tool
Linux command history: Choosing what to remember and how | Network World
Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking - KitPloit - PenTest Tools for your Security Arsenal ☣
Strategy Series: Build vs. Buy (sorta) - The Forwarding Plane | The Forwarding Plane
Deleting an archive from Glacier though the AWS CLI | viktorious.nl – Virtualization & Cloud Management
How to Copy File Permissions and Ownership to Another File in Linux
Efficient Ways To Read The Log Files In Linux | 2daygeek.com
iTWire - Data breach law takes effect on Thursday
Ansible, Part III: Playbooks | Linux Journal
OpenRA - Home
Duplicati Monitoring - dashboard and e-mail reports for Duplicati
Announcing dupReport - A Duplicati Email Report Summary Generator - Duplicati
Windows+Registry+Auditing+Cheat+Sheet+ver+1.1+Jan+2016.pdf
SYS.USER$ table in Oracle – last password change time, last locked, last expired, creation time, failed logon | DBAORA
List of default database users - Oracle FAQ
How to generate an SSH key pair in Linux?
SSH keys - ArchWiki
A surprising way to win in a crashing crypto market
Account Status within a Oracle RDBMS | Catt Solutions
State of Salaries Report - Hired
HODL on for Dear Life: The history and meaning of ‘HODL’ | The Litecoin Community Alliance
Medical Device Security Update: Why the MDS2 Form was Revised | Symantec Connect Community
Acquire Enterprise Mission Assurance Support Service (eMASS)
LKRG: Linux to Get a Loadable Kernel Module for Runtime Integrity Checking
VMSA-2018-0007.1 | United States
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP - KitPloit - PenTest Tools for your Security Arsenal ☣
Fujifilm Slots Tape into Cloud Backups -- InfoStor
Cloud Storage – ever considered LTFS Tape?? (Storageneers)
Etcher
Learn, Acquire, then Apply… » Blog Archive » How to run SysPrep on an Upgraded Operating System
GitHub - Srinivas11789/PcapXray: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Germany defense minister: Cybersecurity is going to be the main focus of this decadeSecurity Affairs
LMMS Guide Part 1: Creating Simple Melodies Using Sounds And Instruments
Open-Source Object Storage. Comparison of Solutions
X12 EDI file generation | Tallan's Technology Blog
How To Talk With Kids About Terrible Things : NPR Ed : NPR
Brendan Tierney - Oralytics Blog: 18c is now available (but only on the Cloud)
Culture of Quality: Measuring Code Coverage at Etsy - Code as Craft
GDPR and Data Storage Compliance
GDPR and Data Storage Compliance
Selling Remote Backup Service - 6 Helpful Tips
Infrastructure as Code – Microsoft MVP Award Program Blog
Administrator vs. Standard: Which User Account Should You Use in Windows?
Amazon S3 Logging - Enabling and Reading Amazon S3 Logs
Best Online Backup Service: 5 Questions That Need to Be Answered
7 Things You Need to Know about LTFS | SBDS
LTFS Tape-Disk Hybrid Storage: Who Needs Cloud? - EnterpriseStorageForum.com
RDP Cache Forensics – Cyber Forensicator
Three Ways to Take Home the Gold When It Comes to Cybersecurity at the Olympics
ReelPhish - A Real-Time Two-Factor Phishing Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Cyber resilience for the modern enterprise – Microsoft Secure
NBlog - the NoticeBored blog: NBlog February 17 - The I part of CIA
What Does 'Sheep Dip' Mean in Cyber Security? | OPSWAT Blog
Windows Analytics now includes Meltdown and Spectre detectorSecurity Affairs
NOC/SOC Integration: Opportunities for Increased Efficiency in Incident Response within Cyber-Security - noc-soc-integration-opportunities-increased-efficiency-incident-response-cyber-security-38290
A Performance Evaluation of Storage and Retrieval of DICOM Image Content - ora-dicom-bench-2008-129543.pdf
Pymap-Scanner - Python Scanner with GUI - KitPloit - PenTest Tools for your Security Arsenal ☣
Pymap-Scanner
How to avoid duplication when implementing an ISO 27001 ISMS – IT Governance Blog
Align your cyber resilience strategy with government best practice – IT Governance Blog
The key elements of data flow mapping under the EU GDPR – IT Governance Blog
APTSimulator - A toolset to make a system look as if it was the victim of an APT attack - KitPloit - PenTest Tools for your Security Arsenal ☣
Elk + Osquery + Kolide Fleet = Love – JP
How to implement ISO 27001 into your SME quickly and easily – IT Governance Blog
Raspberry Pi: Phoning home using a reverse remote ssh tunnel - TunnelsUP
Remote Monitoring and Management Software | ConnectWise Automate
Leading IT Business Management Software | Autotask
SnowMirror | The Smart Data Replication Tool for ServiceNow
rsync.net Enterprise Cloud Storage
The preparations you need to make ahead of GDPR
Cyber security in (big) numbers
Service Provider Security Solutions - Endpoint Security Solutions for MSSPs - Cisco
Windows 10 compatibility issues forcing US Air Force to scrap a significant number of computers
FreeNAS ZFS snapshot backup to Amazon S3 - Mourtada.se
VCDX181.com - Introducing VMware NSX-T Reference Design
A first look at AWS Greengrass on vSphere - CormacHogan.com
5 Reasons You Need to Start Using Containers Now -- Virtualization Review
GitHub - duplicati/duplicati: Store securely encrypted backups in the cloud!
*Updated* Pricing for Flash/Hybrid, Hyper Converged, SAN/NAS solutions
Top 10 Operational Responses to the GDPR – Part 3: Build and maintain a data governance system
Implementing the CNIL’s GDPR Prep
New Hack Can Steal Data From Devices in Faraday Cages - Motherboard
10 Cyber Security Decisions You (and Me) Will Regret in The Future
Threat Risk Modeling - OWASP
GitHub - deptofdefense/code.mil: An experiment in open source
JVM Monitoring and Performance Assurance for Java-Based Banking and Trading Applications | APMdigest - Application Performance Management
5 Reasons to fall in Love with ITIL | Purple Griffon
CPUs: Cores versus Threads on an Oracle Server - Blog dbi services
EzPi4ME - Getting rid of the Intel ME, for mere mortals – The Pensieve
PowerShell: Creating Domains and Domain Controllers | PeteNetLive
11 awesome vi tips and tricks | Opensource.com
Japan's young shogi star Fujii beats highest title holder Habu - Japan Today
Cyber attacks reportedly cost the US as much as $109 billion in 2016
Container security fundamentals: 5 things to know | The Enterprisers Project
Policy-based routing on Linux to forward packets from a subnet or process through a VPN | stewart a.
SQL Server Management Studio 17.4: Vulnerability Assessment - Blog dbi services
Real-time Linux based automation controller supports up to 16 I/O modules
Add-on board brings BACnet building control to the Raspberry Pi
Check Linux Distribution Name and Version | 2daygeek.com
Meltdown, Spectre and Ubuntu: What you need to know | Ubuntu Insights
Install OpenStack on Ubuntu | Linux Hint
Virtualizing GPU Access
Arch Anywhere is Dead – Long Live Anarchy - OSRadar
NHS Digital release GDPR guidance for health and social care – IT Governance Blog
ZFS vs. OpenZFS
HolisticInfoSec™: toolsmith #131 - The HELK vs APTSimulator - Part 1
General Data Protection Regulation (GDPR) guidance - NHS Digital
How to clone a Dell Optiplex 7050 M.2 NVME Hard Drive with Clonezilla and an External USB HDD – jasoncoltrin.com
Google Dorks List 2018 For Ethical Hacking and Penetration Testing
The Importance of a Growth Mindset in a Technology First World – Nicole Welch
DSC Resource Kit Release February 2018 | PowerShell Team Blog
Active Directory Passwords – Who is Right? – The Personal Blog of Sean Goodwin
The best Linux distro for gaming in 2018 | TechRadar
How to fix loose outlets - The Silicon Underground
Vulnerability management best practices - The Silicon Underground
Email Reminders for PowerShell Tasks
Rules for Radicals - Wikipedia
Seth's Blog: Reversing Alinsky's rules
A Healthcare Minute: Why Interoperability Is Crucial
Running Systems » Blog Archive » Oracle important patches
We need fewer ITSM processes » Optimal Service Management
ITIL processes aren't processes | The IT Skeptic
Get started with KVM & Kubernetes
Introduction to Quantum Computing – Microsoft Faculty Connection
SQL Updates Newsletter – January 2018 – SQL Server Updates and Lessons Learned
Problems With Your Raspberry Pi? Try These 4 Fixes
Spectre and Meltdown attack explained, simply, for non-programmers – The Pensieve
ID-entify - Search for information related to a domain (Emails, Domains, Information on WEB technology, Type of Firewall, NS and MX records) - KitPloit - PenTest Tools for your Security Arsenal ☣
U.S. GAO - Cybersecurity Workforce: Urgent Need for DHS to Take Actions to Identify Its Position and Critical Skill Requirements
DSHR's Blog: DNA's Niche in the Storage Market
FOSDEM - video recordings
Using Terraform taint and Kubernetes cordon To rebuild nodes with no service interruption -- Prefetch Technologies
Creating Kubernetes pods with your favorite OS to test new features -- Prefetch Technologies
Researchers ported the NSA  EternalSynergy, EternalRomance, and EternalChampion to Metasploit - Security AffairsSecurity Affairs
How to configure a Mikrotik router as DHCP-PD Client (Prefix delegation) | Robert Penz Blog
Can You Spot the Social Engineering Techniques in a Phishing Email? | OPSWAT Blog
Zero-K
Equifax breach may have exposed more data than first thought
Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy - KitPloit - PenTest Tools for your Security Arsenal ☣
Centralized Firewall Control script
Developing an effective cyber strategy – Microsoft Secure
Overview of Petya, a rapid cyberattack – Microsoft Secure
Six Ways IT Service Providers Can Protect Their Clients from Ransomware
Massachusetts attorney general adds online data breach report portal
BLEAH - A BLE Scanner For "Smart" Devices Hacking - KitPloit - PenTest Tools for your Security Arsenal ☣
Every NHS Trust assessed for cyber resilience has failed on-site assessment – IT Governance Blog
What documentation do I need to achieve cyber resilience? – IT Governance Blog
5 ways ITIL can benefit your organisation – IT Governance Blog
How to write a GDPR data protection policy – IT Governance Blog
Think GDPR Won’t Affect Your U.S. Company? Guess Again
The GDPR: Your best friend (but you know that)
50+ Useful Cyber Security Online Courses You Should Explore [Updated]
Hospital Hit With Cryptocurrency Mining Malware
Partners HealthCare Breach: Why So Long to Confirm?
Apple, Cisco Strike Partnerships for Cyber Insurance
Beginner Guide to IPtables
Payload Processing Rule in Burp suite (Part 2)
Engagement Tools Tutorial in Burp suite
Tennessee Hospital Hit With Cryptocurrency Mining ...
Ticking Time Bombs in Your Data Center
Windows Server - Service not starting with 'Error 1067: The process terminated unexpectedly' - Blog dbi services
Dark Side Ops I & 2 Review Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
Ansible - Generating Inventory From DNSMasq Leases - EverythingShouldBeVirtual
UQDS: A software-development process that puts quality first | Opensource.com
Hey DBA, fix it, but don't touch it! | The ORACLE-BASE Blog
New open source platform offers secure, self-hosted collaboration
Hard Olympic Security Choices: What to Watch for in Pyeongchang - Lawfare
Add a New AWS Account to an Existing Organization from the CLI - The IT Hollow
The Cuckoo’s Egg Decompiled Online Course – Chris Sanders
Turn Any CLI into a Function with OpenFaaS
AG Healey Launches Online Portal for Data Breach Reports | Massachusetts News | US News
Stacer - Linux System Optimizer and Monitoring - KitPloit - PenTest Tools for your Security Arsenal ☣
First look at the new DSP Toolkit shows additional requirements for healthcare organisations – IT Governance Blog
Mastering Security in the Zettabyte Era
Managing ‘Shadow IT’ Risks in Healthcare Settings
Prevent Files And Folders From Accidental Deletion Or Modification In Linux - OSTechNix
Jon Masters On Understanding Spectre & Meltdown CPU Vulnerabilities - Phoronix
GDPR – Six key stages of the data protection impact assessment (DPIA) – IT Governance Blog
Rise in cyber attacks leads to cyber insurance business soaring – IT Governance Blog
Tutorial: Use personal gmail with @yourdomain.com
Meltdown/Spectre Status for Red Hat and Oracle | Linux Journal
CapAnalysis | PCAP from another point of view
Importing OVA container into Proxmox (Step-by-Step) ~ Binary Heartbeat
Azure Governance - Eric’s Azure Blog
Unattended installation of VM images with Packer
Healthcare Reference Checking Software
Microsoft Word - GDPR Checklist for Third Party Agreements _Final_.docx - GDPR-Checklist-for-Third-Party-Agreements__Final_.pdf
Using s3cmd and other Amazon S3-compatible apps with Azure Blob Storage | Microsoft + Open Source
Logjam: PFS Deployment Guide
Steps to GDPR Compliance: Vendor Management - EMEA Blog
SSL Hardening of Wildlfy 8.2 Undertow – Vijay Konnackal
An Introduction to GDPR: Why Third Party Security Will Be Critical
Important information about Microsoft Meltdown CPU security fixes, antivirus vendors and you
Cleveland Clinic names Ed Marx new chief information officer | Healthcare IT News
dokuhebi (Tom Albrecht) · GitHub
Benefits of cloud computing | IBM Cloud
Download Windows 10 Enterprise (1709, 16299) ISO x64 / x86 Free via Official Links
Who’s behind Amazon in IaaS cloud revenue? Not Microsoft - TechWorld
Scanning firewalls for differences in IPv4 and IPv6 rules | Sebastian Neef - 0day.work
Healthcare IT Systems: Tempting Targets for Ransomware - IEEE Spectrum
What's new in SQL Server 2017 presentation | James Serra's Blog
Data Virtualization vs Data Warehouse | James Serra's Blog
Using a Yubikey for GPG and SSH | Sebastian Neef - 0day.work
Don't format, overwrite before you sell! - Recovering data from 2nd hand HDDs | Sebastian Neef - 0day.work
Writing my first shellcode - iptables -P INPUT ACCEPT | Sebastian Neef - 0day.work
Reference architecture for enterprise reporting in Azure | James Serra's Blog
Is the traditional data warehouse dead? | James Serra's Blog
Azure Backup Calculator: Estimate Your Monthly Backup Costs - Agile IT
Cloudyn: Cloud Management Platform & Cloud Cost Optimization Tool
Healthcare Exchange Standards: Apple should have a HEART
Grey-collar - Wikipedia
FFIEC Cybersecurity Awareness
FY16-UW-GBY---IT-Strategic-Plan-2014-17-DK.pdf
Experimental Amazon S3 API support for Backblaze B2 Cloud Storage Service
Network Diagram: An Important Tool for Effective Time Management
43.7. SELinux Policy Overview
Troubleshooting SELinux Issues on CentOS and Red Hat - Serverlab
SELinux/Tutorials/How is the policy provided and loaded - Gentoo Wiki
PCI DSS and the Network Diagram
Network Diagrams: Drawing Overlay Network Layers — EtherealMind
SELinux/Tutorials/Creating your own policy module file - Gentoo Wiki
The Global Consciousness Project
Postman | API Development Environment
CSA Guidance V2.16 - csaguide.pdf
Three ways to align security programs to enterprise strategy | CSO Online
Alternatives to Bastille Linux: system hardening with Lynis
The 5 Best Free MP3 Tag Editors
Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices - 1801.05583.pdf
An Unofficial Raspberry Pi Blog: How to Setup Remote Desktop from a Windows Machine to your Raspberry Pi - Step by Step Guide
Pricing - Remote device management
Raspberry Pi + Apache - MitchTech | MitchTech
remote device management, even over cellular data connections
Who's in the Zone? A Qualitative Proof-of-Concept for Improving Remote Access Least-Privilege in ICS-SCADA Environments - zone-qualitative-proof-of-concept-improving-remote-access-least-privilege-ics-scada-environments-38205
Cyber Hygiene.pdf
Microsoft Word - CYBER HYGIENE.docx - Cyber-Hygiene.pdf
Cybercrimelaw
Recovering from rm -rf on a datafile | Raheel's Blog
Medical Imaging Devices Are Vulnerable To Cyber-Attacks - Information Security Buzz
BSIMM8 Study Reinforces Benchmarking as a Critical Exercise in Early Stages of Software Security
Five steps to GDPR compliance - Help Net Security
Consensus Assessments Initiative Questionnaire v3.0.1 (9-1-17 Update) - Cloud Security Alliance : Cloud Security Alliance
Cyber Security Lectures by Mateti
Pro Tip: PowerShell DSC Events to Monitor – GoateePFE
PowerShell Desired State Configuration: The Basics - Simple Talk
The 11 most difficult IT hires today | CIO
Provide Cross Region Low-latency Service based on Azure VNET Peering – Wu Shuai's Blog
Examining Average Student Loan Balances by State – Robert Kelchen
Setting up a new vSphere Server – Notes from MWhite
The paradigms of programming | the morning paper
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer | the morning paper
Windows Meltdown and Spectre Patches Impact Rockwell Software Users - The Automation Blog
BBSs and early Internet access in the 1990ies | Fun with virtualization
PowerShell for Programmers: What happened to my operators? – Kory Thacher
Operating System Best Practice Configurations for SQL Server – Don Castelino
Volunteer Senior Management Committees Part 3 of 3 | People Centre
Volunteer Senior Management Committees Part 2 of 3 | People Centre
Volunteer Senior Management Committees Part 1 of 3 | People Centre
Good engineers – I. M. Wright’s “Hard Code”
The Windows 10 Link List – PowerInTheShell
Qwikie Paint Touch Up Kit | Cool Tools
Donvier Manual Ice Cream Maker | Cool Tools
What Are Those Hieroglyphics on Your Laptop Charger? | Hackaday
How I Record My Conference Talks
An accessible overview of Meltdown and Spectre, Part 1 | Trail of Bits Blog
How cybersecurity pros can improve their LinkedIn profiles: 4 tips - TechRepublic
Estimating the Cost of Internet Insecurity - Schneier on Security
Does Canada Even Have a Huge Piracy Problem? - Motherboard
6 Potential Security Gaps in File Transfer Process for Critical Infrastructure | OPSWAT Blog
ICMPExfil - Exfiltrate data with ICMP - KitPloit - PenTest Tools for your Security Arsenal ☣
Evilgrade - Modular Framework To Take Advantage Of Poor Upgrade Implementations By Injecting Fake Updates - KitPloit - PenTest Tools for your Security Arsenal ☣
RDPY - Remote Desktop Protocol in Twisted Python - KitPloit - PenTest Tools for your Security Arsenal ☣
PiDense - Monitor Illegal Wireless Network Activities (Fake Access Points) - KitPloit - PenTest Tools for your Security Arsenal ☣
A major cyber attack is a matter of when, not if – IT Governance Blog
5 reasons why business continuity management is essential to your organisation’s cyber security – IT Governance Blog
NIS Directive consultation feedback published – how to comply – IT Governance Blog
List of data breaches and cyber attacks in January 2018 – IT Governance Blog
How to create your PCI DSS charter – IT Governance Blog
IOActive Labs Research: Security Theater and the Watch Effect in Third-party Assessments
FBI official highlights importance of SMB cybersecurity
GDPR will bring 'sea change' to email tracking, website monitoring
Two paths to meeting GDPR training requirements
Top 10 operational responses to the GDPR: Data inventory and mapping
Uber CISO to testify over 2016 data breach
Publishers need a data opt-out ahead of GDPR
RSA web con: Breach notification in the GDPR era
The Five Secrets to Making Security Awareness Work in 2018
Convert Virtual Machine to Raw Images for Forensics (Qemu-Img)
Post Exploitation Using WMIC (System Command)
IoT: Moving to Security by Design - HealthcareInfoSecurity
Digital Forensics Investigation through OS Forensics (Part 3)
Digital Forensics Investigation through OS Forensics (Part 2)
Digital Forensics Investigation using OS Forensics (Part1)
Allscripts Lawsuit: What Makes It Different? - HealthcareInfoSecurity
The Unpatched Mind - How to Get Mental Security in A Digital Landscape
Rationalizing the Security Stack - HealthcareInfoSecurity
$3.5 Million Penalty for Five Small 2012 Breaches
How to Delete Root Mails (Mailbox) File in Linux
It's Time to Make Student Privacy a Priority | Electronic Frontier Foundation
Third-party Security Questionnaires Are Security Theater
GDPR keeping you up? There’s another monster hiding under the bed… | CSO Online
Top 7 open source project management tools for agile teams | Opensource.com
Healthcare cybersecurity spending to exceed $65B over the next 5 years | CSO Online
Healthcare’s Secret Weapon for Securing the IoMT | CSO Online
Is your cloud service provider ready for HIPAA? | CSO Online
4 things CISOs should stress to the board of directors about cloud security | CSO Online
7 Little-Known Facts About IT Pros | APMdigest - Application Performance Management
Cisco CCNP SWITCH Topics – neckercube.com
How to Install Oxidized for Network Configuration Backup – neckercube.com
Open Source turns 20: Here’s how it all started
Retrospection and the Future: Still Studying for the CCIE Lab – neckercube.com
General Network Challenges, and IP/TCP/UDP Operations – neckercube.com
CCIE Flash Card Deck for R&S v5.1 – neckercube.com
Learning the 802.11 Standard - Airheads Community
A history of low-level Linux container runtimes | Opensource.com
My AWS Certified Solutions Architect Professional Exam – Prep Tips and Exam – Ather Beg’s Useful Thoughts
How to Become a Better Networking Engineer « ipSpace.net by @ioshints
How I created PowerShell.cool using Flow, Azure SQL DB, Cognitive Services & PowerBi | SQL DBA with A Beard
Cuckoo’s Egg – Week 8 Notes – Chris Sanders
Cyber Security Threats To Watch Out For In 2018 | Purple Gri...
Router Rebooter Eliminates Hassles | Hackaday
3 ways that the European Union is changing the way Companies write software in 2018
Global Resistor Shortage, Economics, and Consumer Behavior | Hackaday
IBM i PTF Guide, Volume 20, Number 4, The Spectre Of Meltdowns - IT Jungle
Isolating SQL Performance Issues due to slow Disk IO subsystem – Don Castelino
Rapid, Secure Patching: Tools and Methods | Linux Journal
How to Use Continuous Release (CR) Repository in CentOS
SolydXK – A New Distro for Your Collection - OS Radar
Mycroft Mark II: The Open Source Answer to Amazon Echo and Google Home That Doesn’t Spy on You
Building a Business KPI Dashboard
From Solo-Preneur to Manager-Preneur
How to Run Your Service Like a SaaS
Making Progress, Profitably
The Mindset Shifts That Took Me From Freelancer to Productized Business Owner
Turn Distractions Into Opportunities
Self-Limiting Habits of Entrepreneurs
Machine Learning Andrew Ng - Week 4 - Big Data Beard
Productizing by Not Selling Talent
How Surveying Your Audience Changes Everything
How to Land Your First Customers When You're Unknown
Are You Working On The Right Thing?
Content Marketing That Runs Without You
A Bootstrapper's Formula For Hiring Your First Employee
Taming Metrics
A Trust-Based Sales Funnel
What Do The Best Podcasts Get Right?
Balancing Focus, Commitment, and Shiny New Ideas
How to Setup a New Podcast (Step-by-Step Instructions)
The Cascading To-Do List (how to get BIG things done)
The Six Month Plan
Should Designers Learn to be Marketers?
Japanese Culture, Food Exchange With Kentucky Still Going Strong : The Salt : NPR
5 Essential Settlers of Catan Sites and Apps for Tips, Tricks, Strategy, and More
Seth's Blog: "Where did you go to school?"
Taking an Honest Look at Your Data Health | Nuix
Turning Metrics Analysis into Story Telling
The Value Mindset... Which SaaS Apps Do You Pay For?
Make a Plan. Execute. Repeat.
The Importance of Defining Customer Personas (I Finally Get it Now)
When You're Unhappy With a Contractor's Work...
SweetProcess: How We're Validating The Product
Meet My Mistress, SweetProcess!
Extremely Fast MySQL Backup and Restore Using Mydumper/Myloader | DotLayer
Report: Number of cyber incidents doubled in 2017, yet 93 percent could easily have been prevented
ToolsWatch.org – The Hackers Arsenal Tools Portal » Black Hat Arsenal Top 10 Security Tools as Voted by the Audience
Your instant Kubernetes cluster
Synchronize a directory structure with Ansible | Velenux Home Page
IT Service Management and Unified Monitoring: Getting From Here To There | APMdigest - Application Performance Management
Infoga - Email Information Gathering - KitPloit - PenTest Tools for your Security Arsenal ☣
How to Create a Docker Image | Linux.com | The source for Linux information
Psychological Issues in the Security Industry · System Overlord
How to shut down an Azure Stack system. – Azure Field Notes Blog
To the information tecnology and beyond! : Windows Server 2016: Recently added DC do not work, inexistent SYSVOL
Update to Disable Mitigation against Spectre, Variant 2
GDPR coming in 4 months, but only 38% of UK businesses are aware of it - TechRepublic
A Cryptocurrency Theft Bigger Than Mt. Gox Just Happened In Japan - Motherboard
Serious ‘category one’ cyberattack not far off – warns security chief – Naked Security
MalwareJake: Top three considerations when limiting local administrator rights
Securosis - Blog - Article
Intel Building New Silicon to Mitigate Meltdown and Spectre Flaws
Kyoto University, Fujitsu launch research project to advance medicine through use of AI - Japan Today
How to manage cyberbiosecurity risks before a malware attack strikes - TechRepublic
Why cybersecurity should be treated like a disease - TechRepublic
Spectre and Meltdown: Cheat sheet - TechRepublic
Backup Aruba config using Expect | Nbctcp's Weblog
Allscript still recovering from SamSam ransomware attack
Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) - KitPloit - PenTest Tools for your Security Arsenal ☣
Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible - KitPloit - PenTest Tools for your Security Arsenal ☣
Data transfers under the GDPR after Brexit – IT Governance Blog
How an ISMS can ease the strain on CISOs – IT Governance Blog
Can healthcare organisations address their challenges with a single cyber resilience plan? – IT Governance Blog
NHS Wales suffers “widespread failure” of IT systems – IT Governance Blog
Investigating Microsoft BITS Activity - SANS Internet Storm Center
Communication is key when responding to a cybersecurity incident
Blockchain in Healthcare: The Potential and Limitations
Salary Survey 2018: An all-new Salary Survey 75 - CertMag
Facebook to hand privacy controls to users ahead of EU law
Commission releases extensive GDPR guidance
2018 reform of EU data protection rules | European Commission
GDPR is changing DPAs, too
Are the BSDs dying? Some security researchers think so | CSO Online
Financial Impact of Cloud Failure Could Hit $2.8B ...
Expect More Cybersecurity 'Meltdowns' - HealthcareInfoSecurity
Poland's proposed GDPR exemptions spark outrage
2017 Breach Barometer Annual Report / Protenus
​Linux and Intel slowly hack their way to a Spectre patch | ZDNet
How to Encrypt Files with Tomb on Ubuntu 16.04 LTS
Security Chaos Engineering: A new paradigm for cybersecurity | Opensource.com
Fall seven times, stand up eight." —Japanese proverb
Automating DR Testing & Scripting a Rubrik Recovery Plan v2.0 – Virtually Sober
Monitoring Windows Services Sates with Log Analytics – System Center Central – Cloud & Virtualization Complete Guide
Retailers Require New Cloud-Based Technology to Stay Competitive | APMdigest - Application Performance Management
Record ransomware volumes seen in 2017
7 leadership rules for the DevOps age | The Enterprisers Project
Business Language | Don Jones
Gertrude Elion, DNA Hacker | Hackaday
BizTalk Health Monitor 4.2 is publicly available – BizTalkHealthMonitor
Cuckoo’s Egg – Week 7 Notes – Chris Sanders
Best Practices When Versioning a Release - via @codeship | via @codeship
Lack of soft skills holds IT staff back from leadership roles
Troy Hunt: We're Doing an All New Series on Pluralsight: Creating a Security-centric Culture
6 Ways to Take Control of Your Career Development If Your Company Doesn’t Care About It
Organizations blame their own staff for cloud security incidents
Storage Performance Benchmarking with FIO - THE SAN GUY
Build an Excellent Coffee Roaster With a Satisfyingly Low Price Tag | Hackaday
The Perils of Tape » NetWorker Information Hub
Pet - A Simple Command-line Snippet Manager - OSTechNix
Windows 10 Creators Edition New Keyboard Shortcuts – jasoncoltrin.com
Setup Guacamole Remote Desktop Gateway on Ubuntu with one script – jasoncoltrin.com
Linux Digital Forensics Web Resources – jasoncoltrin.com
Security – Blue Team – Building a security project on a budget – jasoncoltrin.com
Installing Kali Linux on ProxMox – Building a Penetration Test Lab – Part 2 – jasoncoltrin.com
Creating bootable Windows USB from Linux
EnhanceIO block cache – howto and benchmark
Tips for optimizing disk performance on Linux
Sysadmin Open Source Landscape
Building a penetration test lab – Part 1 – jasoncoltrin.com
Clonezilla – identify original disk size of clone .img image by looking at flat files – jasoncoltrin.com
Network Weathermap – Network Map Tool
Cheap SSD drives: Where to buy them - The Silicon Underground
Killing stuck process | Nbctcp's Weblog
[Analysis] Full Duplex Capture in SCADA and Industrial Control Networks (by Thomas Tannhäuser and Alexander Pirogov)
Famous cryptographers’ tombstone cryptogram decrypted – Naked Security
SNMP-Brute - Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script - KitPloit - PenTest Tools for your Security Arsenal ☣
How an ISO 27001 Foundation course can help build your career path – IT Governance Blog
Organisations need to prepare for “cyber shocks” – IT Governance Blog
Beginners Guide to Burpsuite Payloads (Part 1)
9 Steps to More-Effective Organizational Security
Stuxnet: the father of cyber-kinetic weapons | CSO Online
Intel tells customers to stop using its faulty Spectre patch
6 ways hackers will use machine learning to launch attacks | CSO Online
How to Block USB Storage Devices in Linux Servers
Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs - KitPloit - PenTest Tools for your Security Arsenal ☣
How to remove Windows.old folder | Remko Weijnen's Blog (Remko's Blog)
Spectre attacks: exploiting speculative execution | the morning paper
Meltdown | the morning paper
DashAsBinSh - Ubuntu Wiki
Troy Hunt: Streamlining Data Breach Disclosures: A Step-by-Step Process
The Life of Kenneth: Off-the-Grid Raspbian Repositories
SwishDbgExt - Incident Response & Digital Forensics Debugging Extension - KitPloit - PenTest Tools for your Security Arsenal ☣
Allscripts recovering from ransomware attack that has kept key tools offline | CSO Online
Testing for New Japanese Era – I'm not a Klingon ( )
Ensuring HTTP Strict Transport Security (HSTS) Compliance without System Modification – Powershell Automation – Michael Hansen (CSA/ASA)
PowerShell for Programmers: Basic Syntax – Variables, Objects, and Data Types – Kory Thacher
Azure CLI Image Copy Extension – allows you to copy virtual machine images between regions with just one command. – Microsoft Faculty Connection
Serious about security? Check out Azure Security Center – Microsoft Press blog
Troubleshooting Performance Issues with Cloud Services (PaaS) – Data Collection – Microsoft Azure Cloud Integration Engineering
Spectre mitigations in MSVC | Visual C++ Team Blog
socat as a handler for multiple reverse shells · System Overlord
Top 20 OpenSSH Server Best Security Practices - nixCraft
10 bad DevOps habits to break | The Enterprisers Project
How to deploy TripleO Overcloud (Controller, Compute) on CentOS 7 VMs
macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments - KitPloit - PenTest Tools for your Security Arsenal ☣
U.S. GAO - FDA Medical Device Reviews: Evaluation is Needed to Assure Requests for Additional Information Follow a Least Burdensome Approach
Use PowerShell to create a bootable USB drive from a Windows 10 or Windows Server 2016 ISO – Mike F Robbins
Securosis - Blog - Article
The Tale of the Free-Net, the Cheap Way Dial-Up Users Got Online - Motherboard
The Story of the Trackball, Canada's Earliest Gift to Computing - Motherboard
Spectre and Meltdown: How Cache Works | Hackaday
Finding Out Your Microsoft Office Licence Version | PeteNetLive
The Idiot adds Two Factor Authentication to Proxmox – Jon Spraggins
How TCP Works - MTU vs MSS (by Chris Greer)
Ransomware shuts down Greenfield's Hancock Regional Hospital
The Japanese words for "space" could change your view of the world — Quartz
How to select the right Qualified Security Assessor – IT Governance Blog
Podcast: Ready, set, now go GDPR
How Microsoft tools and partners support GDPR compliance – Microsoft Secure
Security Breaches Don't Affect Stock Price - Schneier on Security
Some Basic Rules for Securing Your IoT Stuff — Krebs on Security
Weekly podcast: Meltdown and Spectre SCADA problems, Apple text bomb and WEF cyber risks – IT Governance Blog
Patch your vulnerabilities now or risk punishment under the GDPR – IT Governance Blog
Is your organisation at risk from a cyber attack? – IT Governance Blog
7 ways ISO 20000 can benefit your organisation – IT Governance Blog
Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems – Microsoft Secure
Amazon seeks HIPAA compliance lead
A technician's view of the GDPR and consent interfaces
The real costs of a data breach – IT Governance Blog
How to write an ISO 22301-compliant business continuity policy – IT Governance Blog
Survey: Nurses, administrators confident organizations can handle breaches
Nahra: Key issues for 2018 privacy and security checkup
$17.2 Million Settlement for Breach Case Involving HIV Info
Post Exploitation in Windows using dir Command
Forensic Investigation of Nmap Scan using Wireshark
3 Years of Consulting: Settling into An Unexpected Career
Is Healthcare Ready to Comply With GDPR? - HealthcareInfoSecurity
Why Some Healthcare Entities Pay Ransoms - HealthcareInfoSecurity
Where to Find Security Holes in Serverless Architecture
Understanding Supply Chain Cyber Attacks
Termux
Which CISO 'Tribe' Do You Belong To?
Living with Risk: Where Organizations Fall Short
Doh!!! The 10 Most Overlooked Security Tasks
A newcomer's guide to the dark web | CSO Online
Contractor hacks former employer, destroys and corrupts data | CSO Online
Listening to the echoes of cybersecurity history | CSO Online
6 reasons you’re failing to focus on your biggest IT security threats | CSO Online
Full disk encryption: do we need it? | CSO Online
What is Zero Trust? A model for more effective security | CSO Online
Spectre and Meltdown explained: What they are, how they work, what's at risk | CSO Online
4n6k: Forensics Quickie: Methodology for Identifying Linux ext4 Timestamp Values in debugfs `stat` Command
SQL Server on Linux and logging
Charlie Munger’s Life as a Financial Independence Blueprint — My Money Blog
Intel admits Spectre patch problems also affect newer Core chips
Linux Foundation Certified Engineer (LFCE) Exam Review #LinuxFoundation @linuxfoundation #Linux #CentOS @sandervanvugt @tecmint #vExpert – vMusketeers
Virtualization The Future: VMFS5 vs VMFS6
Spectre and Meltdown – How to check patches are applied correctly? | viktorious.nl – Virtualization & Cloud Management
How to Check and Patch Meltdown CPU Vulnerability in Linux
EU GDPR and personal data in web server logs – Ctrl blog
Why DevSecOps matters to IT leaders | The Enterprisers Project
VCDX181.com - Supporting TLS v1.2 with PowerShell...
Ansible - IP Sets and DShield Block List - EverythingShouldBeVirtual
Powershell Script to Create Collections with Folder Structure – Cloud & Virtualization Complete Guide
Guider - A System Wide Linux Performance Analyzer
Collaboration in ownCloud/nextCloud with EtherPad and EtherCalc – – Unixblogger –
SPARTA - Network Penetration Testing GUI Toolkit
Kernelci.org automated bisection
Meltdown and Its Networking Equivalents « ipSpace.net by @ioshints
Best Practices Analyzer for Active Directory Domain Services | Microsoft Docs
How to install and setup Docker on RHEL 7/CentOS 7 - nixCraft
How to use Fio (Flexible I/O Tester) to Measure Disk Performance in Linux | WPMojo
Amplify - NGINX Monitoring Made Easy
Daily Mantra [SHIFT]
More microcode madness – VMware recommends NOT patching | JonKensy.com
NBlog - the NoticeBored blog: NBlog January 15 - protecting information in the cloud
My AWS Solution Architect Associate exam experience | viktorious.nl – Virtualization & Cloud Management
Spectre and Meltdown, what do we know about real-life performance impact so far? -
Meltdown and Spectre side-channel attack risk mitigation information from processor, server, and software vendors | TinkerTry IT @ Home
DSHR's Blog: It Isn't About The Technology
RFCrack - A Software Defined Radio Attack Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
DNSExfiltrator - Data exfiltration over DNS request covert channel - KitPloit - PenTest Tools for your Security Arsenal ☣
Splitting 835 Healthcare Claim Payment | Tallan's Technology Blog
Find file names and URL of Windows 10 feature updates on WSUS | >_
Cloud Native Part 6: Security - via @codeship | via @codeship
More Business Travel Tied to More Signs of Anxiety & Depression, Health Risks
Spectre and Meltdown on Oracle Public Cloud UEK - Blog dbi services
Meltdown and Spectre flaws loomed large over CES
AWS Security Checklist & Best Practices | Cloud Astronaut
Intel Microcode for Spectre/CVE-2017-5715 – Real performance loss in ZFS | JonKensy.com
Nutanix Cloud Connect and S3 Encryption - JBcomp.com
XenApp and XenDesktop Service Architecture Poster | Ask the Architect
PowerShell One-Liner to Audit Print Jobs on a Windows based Print Server – Mike F Robbins
Useful links about Meltdown and Spectre | Techbrainblog
The Idiot installs the QEMU agent on a Windows 10 VM on Proxmox – Jon Spraggins
Cuckoo’s Egg – Week 6 Notes – Chris Sanders
How to Emulate Android Apps on Linux
8 Android Settings You Should Change Right Now
Add Table of Contents to Markdown
Vagrant - Fixing Opentable Basebox looking for Windows Plugin
Docker - Getting Started On Windows
Docker - Mounting Windows Directories in Containers
Docker - Running Container As a Service
A Few Thoughts About Nonprofits and Digital Transformation in 2018 | Beth's Blog
Machine Learning - Andrew Ng Week 2 - Big Data Beard
Favorite Windows Shortcuts
Presentation Environment Setup
Vagrant Part 6 - Behind A Proxy Server
Vagrant Part 5 - Installing Your Software
Vagrant Part 4 - Install Boxstarter
Vagrant Part 3 - Provisioning With Chocolatey
Vagrant Part 2 - Provisioning Introduction
Vagrant Part 1 - Easy Virtual Machine Management
U.S. GAO - Information Technology: Agencies Need to Involve Chief Information Officers in Reviewing Billions of Dollars in Acquisitions
The 348,296th Article About Cryptocurrency | Hackaday
First Light: The Story of the Laser | Hackaday
Justin James
Seth's Blog: Getting paid what you deserve
Justin James
100 Outstanding Pieces of Audio for 2017 – Bello Collective
Sixty free lectures from Princeton on bitcoin and cryptocurrencies. Total time 13hr 20min. Links in post. : Bitcoin
Think Intel ME was big? Meet Intel's new flaws: Meltdown and Spectre – Marksei
Spectre and Meltdown: Attackers Always Have The Advantage | Hackaday
Getting a Handle on Meltdown Update Impact, Stay Tuned for Spectre | Hackaday
Meltdown Code Proves Concept | Hackaday
sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) - KitPloit - PenTest Tools for your Security Arsenal ☣
Why you can’t cash out pt 3: Bitcoin is not a Ponzi scheme! It just works like one | Attack of the 50 Foot Blockchain
GSEC vs. CISSP – The Personal Blog of Sean Goodwin
Better GIAC Testing with Pancakes | tisiphone.net
How to increase Linux security by disabling USB support - TechRepublic
These are the cybersecurity concerns that keep execs up at night - TechRepublic
Don't forget to go the 'last mile' on cybersecurity initiatives - TechRepublic
Healthcare groups can be "perfect storm" of vulnerability to hackers - TechRepublic
Wi-Fi security overhaul coming with WPA3 – Naked Security
cSploit Android - The most complete and advanced IT security professional toolkit on Android - KitPloit - PenTest Tools for your Security Arsenal ☣
Spectre/Meltdown on Oracle Public Cloud UEK - PIO - Blog dbi services
Will technology companies be ready for the NIS Directive by May 2018? – IT Governance Blog
Upcoming webinar: GDPR compliance: getting everyone in the organisation on board – IT Governance Blog
What you need to know about data flow mapping under the GDPR – IT Governance Blog
ACE - Automated, Collection, and Enrichment Platform - KitPloit - PenTest Tools for your Security Arsenal ☣
Salamandra - Spy Microphone Detection Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
SNMPwn - An SNMPv3 User Enumerator and Attack tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Anubis - Subdomain Enumeration And Information Gathering Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Wapiti 3.0.0 - The Web-Application Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
When Did IT Practitioners Lose Their Curiosity? « ipSpace.net by @ioshints
Book Review: Clean Architecture | Adventures in the programming jungle
Storaji - A Free, Modern Lightweight Inventory Management System
Cybersecurity: Time for a New Definition - Lawfare
How to Install Snipe-IT Asset Management Software on Debian 9
Raspberry Pi Zero WH SBCs Are Now Available with Professionally Soldered Headers
The unexpected benefits of ISO 27001 – IT Governance Blog
Essential guidance to prevent business continuity disasters – IT Governance Blog
Understanding PCI compliance auditing – IT Governance Blog
IOActive Labs Research: SCADA and Mobile Security in the IoT Era
GDPR: What US Healthcare Entities Need to Know
Rising Attack Vector for Industrial IoT: Smartphone Apps
3 more little-known secrets about cloud security | CSO Online
Board cybersecurity field trips | CSO Online
How to Configure Suricata IDS in Ubuntu
Patch Now or Risk GDPR Fines Later, Regulator Warns
8 simple ways to promote team communication | Opensource.com
A Step in the Right Direction: House Passes the Cyber Vulnerability Disclosure Reporting Act | Electronic Frontier Foundation
Markets Rise and Fall: Is Your Portfolio Ready For Both? — My Money Blog
How to write a job description for a chief information security officer | CSO Online
Thinking Smartly About Smart Contracts | DennisKennedy.Blog
CISOs' Cyber War: How Did We Get Here?
'Back to Basics' Might Be Your Best Security Weapon
Encrypt Tablespaces – Multitenant | EzDBA – BLOG
Oracle Linux patches for Meltdown and Spectre information – Oracle 48
Akiee - Rockiger
Spectre and Meltdown, Oracle Database, AWS, SLOB - Blog dbi services
Benchmarking Linux With The Retpoline Patches For Spectre - Phoronix
This is what a 50-qubit quantum computer looks like
Automating the detection of Mimikatz with ELK – JP
ADRecon - Tool Which Gathers Information About The Active Directory - KitPloit - PenTest Tools for your Security Arsenal ☣
LaZagne v2.3 - Credentials Recovery Project - KitPloit - PenTest Tools for your Security Arsenal ☣
How to achieve an effective risk assessment – IT Governance Blog
Ed Amoroso on CISOs' Challenges in 2018 - HealthcareInfoSecurity
Network Packet Forensic using Wireshark
How to develop a robust cyber security policy – IT Governance Blog
What Global Manufacturers Need to Know About Security in the Cloud
Serious Meltdown and Spectre Flaws Make CPUs Exploitable
Hack the Basic Penetration VM (Boot2Root Challenge)
TCP & UDP Packet Crafting with CatKARAT
Spectre? Meltdown? F*CKWIT? Calm down and make yourself some tea
Apple fixes the Meltdown and Spectre flaws in Macs, iPhones, and iPads
Bitcoin proving big hit in Japan - Japan Today
Errata Security: Some notes on Meltdown/Spectre
Errata Security: Why Meltdown exists
Errata Security: Let's see if I've got Metldown right
How to Assess a Vendor's Data Security | Electronic Frontier Foundation
Google Online Security Blog: More details about mitigations for the CPU Speculative Execution issue
Spectre and Meltdown: What you need to know going forward | CSO Online
Vulnerability Management: The Most Important ...
The hackers are coming: 6 cloud computing trends you will see in 2018 | CSO Online
The Top Four Exception Tracking Services - via @codeship | via @codeship
Improve SAP BW Performance by Applying the Flat Cube | Running SAP Applications on the Microsoft Platform
How the Cloud Delivers Greater ROI than On-Prem IT Solutions | ProfitBricks Blog
Radiology Roundup: Insights on Emerging Trends
5 Trends that Will Shape Radiology in 2018
DSHR's Blog: Meltdown & Spectre
New Tool – Disk Hogs | Keith's Consulting Blog
Justin James
Open Source with Christopher Lydon - Christopher Lydon in conversation on arts, ideas and politics
GitHub - ossu/computer-science: Path to a free self-taught education in Computer Science!
Real World Computing: Archiving Mailboxes in the Office 365 World
Analyzing credit card transactions using machine learning techniques – 2 – David Vassallo's Blog
Selecting a Cloud Provider - Code as Craft
3 New Year's Rituals for Nonprofit Professionals To Begin 2018 with Clarity | Beth's Blog
Bullet Journal - The Analog System for the Digital Age
2017: Year of the data breach
Ex-NSA contractor will plead guilty to stealing 50TB of data
Podcast 370 - Cord Cutting Special - Todd Klindt's SharePoint Admin Blog
Mapping the VCDX Defense Genome Part 3: Is All Flash a Trap?! – vMusketeers
About CPU bug aka #Meltdown / #Spectre | >_
Making Ubuntu on Windows a bit more Authentic (by fixing the font)
Get the content of the WindowsUpdate log as an object | >_
BakAndImgCD - home
Docker Security & Container Security Platform | Twistlock
Xamarin Android Player - Xamarin
Building a NAS
Linux resolutions for 2018 | Network World
The Best Free Microsoft Office Calendar Templates for the New Year
IPv6 Address Primer | manski's blog
Attacking Read-Only Domain Controllers (RODCs) to Own Active Directory – Active Directory Security
Windows Incident Response: WindowsIR 2017
Tuning Windows 10 Part 4: Deploying the golden image -
5 keys to create a killer CLI in Go
Packet Crafting with Colasoft Packet Builder
How to keep ahead of evolving cyber threats – IT Governance Blog
Writing effective scripts using VMware PowerCLI | Adventures in a Virtual World
Setting up a Used Tyan S7012 - My Wired House
Why Employers Must Stop Requiring College Degrees For Middle-Skill Jobs
BlueMaho v090417 - Bluetooth Security Testing Suite - KitPloit - PenTest Tools for your Security Arsenal ☣
Healthcare Exchange Standards: HIE Future is Bright - stepping into 2018
Guide: 1356/1366 Xeon Aftermarket Heatsink Selection/Installation | ServeTheHome and ServeThe.Biz Forums
+++
Heatsink for Tyan s7012 inside Supermicro SC826 | ServeTheHome and ServeThe.Biz Forums
Tyan s7012
4 tips for achieving better ISO 27001 audit results – IT Governance Blog
What’s New in Performance: vSphere 6.5 | Ryan Birk – Virtual Insanity
“The Spaceship” 2.0 | PeterMarks.info
Capita legs
Spaceship Modifications | PeterMarks.info
Security Planner
vSphere Troubleshooting Series: Part 6 – Network Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 5 – Storage Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 4 – Virtual Machine Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 3 – vSphere Installation Troubleshooting | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 2 – vSphere Troubleshooting Tools | Ryan Birk – Virtual Insanity
vSphere Troubleshooting Series: Part 1 – Introduction | Ryan Birk – Virtual Insanity
In defense of job titles - SysAdmin1138 Expounds
Six healthy and delicious cookbooks to start the new year off right, top picks under $30 | 9to5Toys
SQL Vulnerability Assessment now available for SQL Server 2012 and up | SQL Server Security Blog
SQL Server DBA Morning Health Checks – Sam Lester – SQL Server & BI Premier Field Engineer
Building a vSphere 6.5 Home Lab
2017’s biggest cybersecurity facepalms
Fsociety Hacking Tools Pack - A Penetration Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
TeamworkIQ: Automate Processes With Intelligent Checklists. Far Easier Than Workflow Software.
DHCP Penetration Testing
OpenStack basics: An overview for the absolute beginner - OpenStack Superuser
HTTP Security Headers – JP
Using Elastic Curator To Clean Up ELK – JP
GitHub - elastic/curator: Curator: Tending your Elasticsearch indices
Your Mind's Software is More Important Than Its Hardware
How to Find All Failed SSH login Attempts in Linux
2017 Year in Review: The Rise of Kubernetes in the Cloud
Step-by-Step Guide to Doing a Balance Transfer on Credit Cards
Understanding Complexity – Bitgenics
CSIRO PUBLISHING | Journal of Primary Health Care
Cynefin framework
How to Solve the Most Common Dishwasher Problems
A tool to help dashboard creation - virtual red dot
WPHardening v1.6 - Fortify the security of any WordPress installation - KitPloit - PenTest Tools for your Security Arsenal ☣
5 Trends Cybersecurity Practitioners Must Address in 2018
2017: The Year of Breaches, Failing PII, and the Voice Movement - Pindrop
How To Navigate Directories Faster In Linux - OSTechNix
High Value Scenarios – 4-Step Load Test – Chris’s Performance Testing Blog
White House Website Moves to WordPress From Drupal
Cyberattack forces New York State hospital to run on downtime procedures
DSHR's Blog: Why Decentralize?
Casteyanqui.com | Electric Vehicles
Distributing Operational Knowledge Across a Team - via @codeship | via @codeship
4 Years After Target, the Little Guy is the Target — Krebs on Security
19 Keto Lunches That Will Help You Stick to Your Resolutions
The Disconnect Between Cybersecurity & the C-Suite
Password reset - Tiny Tiny RSS
Hunting Rogue Access Points with the ESP8266 | Hackaday
How to Configure Linux for Children - Make Tech Easier
Beyond the Repository: Clinical Benefits of a VNA
Twinax - Cheap, Cheerful and Annoyingly Chubby - MovingPackets.net
Auditing Kubernetes for Secure Configurations - Blog | Tenable™
Kubernetes 101 Fundamentals
Even With the Cloud, Client Security Still Matters · System Overlord
Why Healthcare Cybersecurity Spending Is Rising
Tutorial on how to create a paper and digital offline Bitcoin wallet with Linux - LinuxConfig.org
PiKarma - Detects Wireless Network Attacks - KitPloit - PenTest Tools for your Security Arsenal ☣
Temperature and Humidity Sensor | Nbctcp's Weblog
Happy IR in the New Year! - Securelist
Fancy Labels and References in LaTeX – texblog
Viewing YUM variables using python - mikep
Approaches to International Cyberlaw: A View from Israel - Lawfare
Restore Corrupted USB Drive To Original State In Linux - LinuxAndUbuntu - Linux News | Apps Reviews | Linux Tutorials HowTo
How to Install Attendize on Ubuntu 16.04 – RoseHosting Blog
Building a Hacking Kit with Raspberry Pi and Kali Linux
The Role of Change Management in Maximizing Health IT Investment
Get Inspired to Transform Enterprise Imaging [eBook]
Let Enterprise Imaging Tell the Whole Patient Story
Protect Your Network With a Bastion Host in Just 3 Steps
Username Anarchy - Username Tools For Penetration Testing - KitPloit - PenTest Tools for your Security Arsenal ☣
Qubes OS - A Security-Oriented Operating System - KitPloit - PenTest Tools for your Security Arsenal ☣
Imaging Technology: 6 Traits Radiologists Should Demand from Vendors
NHS steps up its cyber security defences – how are you preparing for the NIS Directive? – IT Governance Blog
GDPR Report: Many organisations have already appointed a DPO – IT Governance Blog
HOWTO: Automate One-A-Day Photography – Please Work
How to Effectively Use Storytelling in Sales
Blog
Accenture-Cyber-Risk-Convergence-Of-Operational-Risk-And-Cyber-Security.pdf
hit-ehr-nist-sp1800-1c-draft.pdf
CISOs Play Rising Role In Business
Load Balancing Medical Imaging & Information System Protocols - Medical_Imaging_Systems_Deployment_Guide.pdf
PACS of the Future Tested, Successful | Medical Imaging Talk Blog
Draft_v7 - dttl-fsi-TransformingCybersecurity-Infographic-2014-02.pdf
Cognitive Risk Framework for Cybersecurity part II | The GRC Bluebook
Cognitive Risk Framework for Cybersecurity | The GRC Bluebook
"Mystery" Buyer Revealed: Swiss National Bank's US Stock Holdings Rose 50% In First Half, To Record $62BN | Zero Hedge
The Swiss National Bank Owns $80 Billion In US Stocks - Here's The Catch | Zero Hedge
Test Driving Docker Function as a Service (FaaS)
Check Adobe Flash version Internet Explorer (Active-X) on Server 2012/2016 and Windows 8.1/10 - renshollanders.nl
DOS Attack Penetration Testing (Part 2)
BruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts default creds on found services) - KitPloit - PenTest Tools for your Security Arsenal ☣
DexterPOSH's Blog: Test connectivity via a specific network interface
DexterPOSH's Blog: PowerShell : Nested Remoting (PSRemoting + PSDirect)
How to use WinRM & PowerShell with Jenkins
DexterPOSH's Blog: Vagrant using Hyper-V
Setting the Default Wallpaper for Windows 10 during ConfigMgr OSD – smsagent
DexterPOSH's Blog: PowerShell : Retry logic in Scripts
A CIO Discusses Top 2018 Security Challenges in Healthcare
DexterPOSH's Blog: PowerShell + AD + Pester : create new user using template Part 2
DexterPOSH's Blog: PowerShell + AD + Pester : Create new user using template - Day 1
Parsing the WindowsUpdate.log using PowerShell and regex -
PowerShell – easily posting scripts to a website while maintaining syntax highlighting by copying as HTML | blog.bjornhouben.com
Create and reuse a powershell scriptblock - LazyWinAdmin
Troubleshooting ELK Elasticsearch & Logstash Pt 1 of 2 - Syspanda
Troubleshooting ELK Elasticsearch & Logstash Pt 2 of 2 - Syspanda
Security Awareness Training: Step-By-Step - Syspanda
Logstash Master Script for ELK Health monitoring - Syspanda
Collecting and sending Windows Firewall Event logs to ELK - Syspanda
Brocade SAN Switch commands that prove to be very useful | 50mu - about storage
Free Dell EMC trainings | 50mu - about storage
Useful EMC VMAX CLI commands | 50mu - about storage
Return of the Borg: How Twitter Rebuilt Google's Secret Weapon | WIRED
Graphite
Prometheus - Monitoring system & time series database
Script Synchronize all WSUS servers
Installing and Configuring WSUS with Powershell – smsagent
Securing Picture Archiving and Communication System | NCCoE
Difference Between kVA and kW | Difference Between
microsoftramblings – Stuff I'm trying to figure out about Microsoft products, mainly SCCM (ConfigMgr)
Patching Production servers with WSUS & Powershell - Syspanda
Force WSUS to Synchronize Now from PowerShell – PowerShell, Programming and DevOps
GOSINT - Open Source Threat Intelligence Gathering and Processing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
GOSINT
Virtual machine application runs slower than expected in ESXi (1018206)
WSUS - Server Clean Up Using Powershell - TechyGeeksHome
Function Router -- A "CDN" for Serverless, function as a service, functions, lambda, openwhisk
Function as a Service for Docker – Chanwit Kaewkasi – Medium
Automated WSUS Maintenance - PowerShell Script (Update 1.6)
Walkthrough: Building a Windows 10 1709 (Fall Creators Update) Reference Image with Microsoft Deployment Toolkit – Stick To The Script!
From Zero to 10 – Windows 10 Deployment Round-up – Stick To The Script!
PowerShell: Create Active Directory Users In Bulk (Update 1.5) – Stick To The Script!
How to easily Check your SPN and Delegation settings for SQL Server in an Active Directory environment – A Windows System Admin's Blog
Fixing the randomly stopping WsusPool IIS Application pool and Windows Updates failed 0x80244022 error – A Windows System Admin's Blog
Get a list of users in Active Directory who have not logged in for specified number of days using PowerShell – A Windows System Admin's Blog
How to allow an Active Directory Certificate Authority to generate Certificates with a Subject Alternative Name attribute – A Windows System Admin's Blog
sysadvent: Day 25 - How to choose a data store for the new shiny thing
Use GMail to send system mails on Debian · The Hacking Memento
Building And Installing Rockbox · The Hacking Memento
SW N-Central Trial Form - Gilfoyle
GitHub - MasashiTeruya/Install-WSUS: This is trivial powershell module to install WSUS(Windows Server Update Services).
PowerShell: Automated WSUS Maintenance (Update 1.6) – Stick To The Script!
WSUS – A Windows System Admin's Blog
Free Tools Library - SDM Software | Configuration Experts
How to check the PowerShell version & install a new version – Mike F Robbins
Setting up a Jekyll workflow on windows · Michael McKenna
VESA Announces DisplayHDR Specification: Defining HDR Capabilities In Performance Tiers
NVIDIA's AI will help GE speed up medical image processing
How to retrieve currently applied GPOs on your local machine using WMI via Windows Scripting Host ( WSH ) – Azure Active Directory Developer Support for MS Graph and AAD Graph
Secure Coding Standards | The CERT Division
Mitigating the Insider Threat - Building a Secure Workforce - fissea-conference-2012_mahoutchian-and-gelles.pdf
Insider Threat Best Practices | The CERT Division
GitHub - google/kubeflow: Machine Learning Toolkit for Kubernetes
The Housing Bubble Blog » A Repeat Of An Earlier Situation
Bluepot - Bluetooth Honeypot - KitPloit - PenTest Tools for your Security Arsenal ☣
@ISACA Volume 24 | 29 November 2017
Access denied to Administrative (Admin) shares in Windows 8 – 4sysops
Windows 7 Access Denied For Administrator | Think Like A Computer
Security Education in Uncertain Times: 2017 in Review | Electronic Frontier Foundation
PowerShell – Using psexec to automate UI tasks on remote machines – Codingbee
veewee/installation.md at master · jedi4ever/veewee · GitHub
DOS Attack Penetration Testing (Part 1)
Audit/Assurance Programs
A New Utility for Diagnosing and Repairing Problems with the WMI Service
(5) T312 Burping for Joy and Financial Gain Tim lanmaster53 Tomes - YouTube
Group Policy and WMI, A Wonderful Combination - Simple Talk
(5) Tips and Techniques to Adopt GDPR using COBIT 5 - YouTube
A Machine Learning Tutorial with Examples | Toptal
What's New in Visual Paradigm?
TheHive Project
Edward Snowden Introduces Baby Monitor for Spies | Hackaday
iPod 5th gen SSD upgrade - My Wired House
What is Pulp, Candlepin, Foreman, and Katello – Justin Garrison – Medium
ServerMonkey Specials | Save Your Banana Peels! | ServerMonkey.com
Install Katello on CentOS 7 | Lisenet.com :: Linux | Security | Networking
Deployment Research > Research
Reviewing auditd logs with Spacewalk | devops-blog
Taskwarrior - What's next?
Advice on building Docker images on Windows | devops-blog
Spacewalk vs. Katello | devops-blog
osquery Across the Enterprise – Palantir – Medium
Ins and Outs of Anonymous Access | IT Pro
16 Tips for Creating Better Network Diagrams
Error Message Explained: User Profile Service Failed the Logon • Helge Klein
Group Policy - GPResult Examples - The Sysadmins
Driver Automation Script - Automate Driver Downloads/Installation in MS Intune
How to Back Up and Restore a MySQL Database
David Clunie's Blog: How many (medical image exchange) standards can dance on the head of a pin?
Kea With MySQL Cluster Backend – Test Report | Internet Systems Consortium
Netflix's move to Amazon EC2 - PrudentCloud
Docker Blog Series Part 5 – Understanding new container management features in Service Fabric – Monub
SQL Server High Availability Options
PACSHealth® :: Home
WhatWaf - Detect And Bypass Web Application Firewalls And Protection Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
GOWPT - Go Web Application Penetration Test - KitPloit - PenTest Tools for your Security Arsenal ☣
JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Wazuh - Open Source Host and Endpoint Security - KitPloit - PenTest Tools for your Security Arsenal ☣
CALDERA - Automated Adversary Emulation System - KitPloit - PenTest Tools for your Security Arsenal ☣
OWASP ZAP 2.7.0 - Penetration Testing Tool for Testing Web Applications - KitPloit - PenTest Tools for your Security Arsenal ☣
wildPwn - Brute forcer and shell deployer for WildFly (JBoss AS) - KitPloit - PenTest Tools for your Security Arsenal ☣
Linux Expl0rer - Easy-To-Use Live Forensics Toolbox For Linux Endpoints - KitPloit - PenTest Tools for your Security Arsenal ☣
CryKeX - Linux Memory Cryptographic Keys Extractor - KitPloit - PenTest Tools for your Security Arsenal ☣
How to See Which Group Policies Are Applied to Your PC and User Account
MyDLP
OpenSOC · GitHub
Key Notes on Data Protection in the Cloud   | Trevor Templar
Four mistakes that can kill virtual machine performance
SOMAP.org - Information Security Governance, Risk and Compliance Tool
Mohannad hussain dicom and imaging tools
PacsOne Server DICOM 3.0 Conformance Statement
Journal Paper Format - 22.pdf
Avast open-sources its machine-code decompiler
2011-dcca-basic-10010160.pdf
Starting an InfoSec Career – The Megamix – Chapters 4-5 | tisiphone.net
Moving a LVM Partition from Proxmox to VMWare, lvdisplay mapped size changed, why? | ServerfaultXchanger | QueryXchanger
Readings | Ethics and the Law on the Electronic Frontier | Electrical Engineering and Computer Science | MIT OpenCourseWare
Plant-astic Plant Based Meal Plan | Whole Foods Market
How to get Antivirus information with WMI (VBScript) – Decrypt my World
Insider Threat Mitigation Guidance - insider-threat-mitigation-guidance-36307
Baldrige Cybersecurity Excellence Builder v1.0 March 2017 - baldrige-cybersecurity-excellence-builder-v1.0.pdf
The curious Kabri | Catching up on the IT industry after years in Enterprise IT
On Attending DefCon – Jon Spraggins
Metadefender: A More Private Alternative to VirusTotal | OPSWAT Blog
Setting up Kali Linux in Docker on Windows 10 – Positive Security
Windows Security Center: Fooling WMI Consumers | OPSWAT Blog
GitHub - modulogrc/modSIC: Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerabilities based on OVAL-Definitions. It's an open-source service specialized in distributed network assessments.
Nemsec Cyber Security
Compliance Features in Office 365 | Office 365 Platform Service Description
The curious Kabri | Completely free IT training resources to help diversify your IT career
DICOM introduction and free software
Easy Keto Lasagna - Hey Keto Mama
5 Minute Spicy Tuna Rolls - Hey Keto Mama
Fhir tooling (grahame)
Home - Radiolab
Nasuni-2015-State-of-Cloud-Storage-Report.pdf
Nasuni-White-Paper-State-of-Cloud-Storage-2013.pdf
Kong - Open-Source API Management and Microservice Management
CISSP QOTD
8 Largest Group Purchasing Organizations for Hospitals
mozilla/ssh_scan - A SSH configuration and policy scanner
Using ElastAlert to Help Automate Threat Hunting – JP
The Weirdest Programming Principles You've Never Heard Of
How Should International Law Treat Cyberattacks like WannaCry? - Lawfare
The IT Security Lessons from 2017
Active/Passive MySQL High Availability Pacemaker Cluster with DRBD on CentOS 7 | Lisenet.com :: Linux | Security | Networking
HeRM's - A Commandline Food Recipes Manager - OSTechNix
Slideshow-Deslidefier
How to create mobile-friendly documentation | Opensource.com
sysadvent: Day 22 - Building a secure bastion host, or, 50 ways to kill your server
Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
List of data breaches and cyber attacks in December 2017 – 33.8 million records leaked – IT Governance Blog
A List of Machine Learning (Ab)use Cases
Replace broken hard drive in software RAID1 « Technical blog on UNIX, Linux, Android etc.
Grabber! Like a Petit Pimouss'
4 ways Companies can make remote working successful
Basic Python Script to Log in to Website Using Selenium Webdriver | Lisenet.com :: Linux | Security | Networking
Must use, must know WinDbg commands, my most used – benjamin perkins
Wrapping up a year in healthcare: WannaCry, NHS Digital and the General Data Protection Regulation (GDPR) – IT Governance Blog
Oracle Licensing (R)evolution
New Year’s resolutions for CISOs | CSO Online
2017 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
Cyber security professionals lack the training to complete their daily tasks – IT Governance Blog
Be a More Effective CISO by Aligning Security to ...
What are the current pain points of osquery? | Trail of Bits Blog
NBlog - the NoticeBored blog: NBlog December 21 - auditor independence [LONG]
Monitoring Home Power Consumption for less than $25
How to Talk to Your Family About Digital Security | Electronic Frontier Foundation
Cybersecurity tips that are cost-effective and efficient
How To Tell If Your Linux Server Has Been Compromised
Linux Foundation Certified Systems Administrator (LFCS) Exam Review #LinuxFoundation @linuxfoundation #Linux #CentOS @sandervanvugt @tecmint #vExpert – vMusketeers
2018 Application Performance Management Predictions - Part 3 | APMdigest - Application Performance Management
2018 Application Performance Management Predictions - Part 2 | APMdigest - Application Performance Management
2018 Application Performance Management Predictions - Part 1 | APMdigest - Application Performance Management
sysadvent: Day 20 - Regarding the Responsibility of Systems Administrators
The 10 Best Cybersecurity Books Everyone Should Read
Windows unquoted search path fix - The Silicon Underground
Malware hit these 3 verticals the hardest in 2017 - TechRepublic
Troy Hunt: Fixing Data Breaches Part 3: The Ease of Disclosure
Troy Hunt: Fixing Data Breaches Part 2: Data Ownership & Minimisation
Troy Hunt: Fixing Data Breaches Part 1: Education
Analyse Cisco ASA Firewall Logs with Graylog | Lisenet.com :: Linux | Security | Networking
How to use Apache reverse proxy as Load Balancer - LinuxTechLab
Why Siemens sees data privacy as a competitive advantage
Healthcare Security: Going Beyond ComplianceWebinar.
HHS Attempts to Clear Up HIPAA Confusion on PHI Release
Understating Guide of Windows Security Policies and Event Viewer
Key steps to GDPR compliance – Part 3 – IT Governance Blog
Free ISO 27001 resources – IT Governance Blog
Creating a culture of security: Part 2 | CSO Online
7 cyber security predictions for 2018 | CSO Online
Automate OVM deployment for a production ready Oracle RAC 12.2 architecture – (part 02) - Blog dbi services
Automate OVM deployment for a production ready Oracle RAC 12.2 architecture - (part 01) - Blog dbi services
Book Recommendation: Oracle Database Upgrade and Migration Methods
How to Properly Enable HTTPS on Nginx with Let's Encrypt on Ubuntu 16.04/17.10
Real World Computing: The Year in Review (2017)
SEI CERT Oracle Coding Standard for Java - SEI CERT Oracle Coding Standard for Java - Confluence
SEI CERT Coding Standards - Secure Coding - Confluence
Healthcare Risk Management Key Area in New HITRUST Program
Disposable Infrastructure Part 1: Building Your Vagrant Control Node
SPIE_200204117_Workstation.pdf
GitHub - zentralopensource/zentral: Zentral is a framework to gather, process, and monitor system events and link them to an inventory.
House committee calls on HHS to improve medical device cybersecurity with supply chain transparency | FierceHealthcare
Best Practices for Securing Active Directory | Microsoft Docs
Why Metrics Must Guide Your DevOps Initiative | APMdigest - Application Performance Management
Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot – Active Directory Security
Ten Commandments from Entrepreneurial 'Evangelist' Guy Kawasaki - Knowledge@Wharton
GitHub - morph027/pve-iso-2-pxe: Create PXE bootable Proxmox installation
VDiscover: large-scale vulnerability discovery using Machine Learning
SOMAP.org - Security Officers Management and Analysis Project
Using PowerShell to disable or remove SMB1
Using PowerShell to test whether hotfixes is installed
Slides, demos and videos from PowerShell Conference Europe 2017
janegilring (Jan Egil Ring) · GitHub
Cross-platform Lightweight Performant Host Visibility
How to Tune Java Garbage Collection | CUBRID blog
How to Get Notified When Your Ubuntu Box Needs Security Updates
Framework Overview ITGIG (update) - 05_Implimenting_NIST_Cybersecurity_Framework_Using_COBIT5_Tom_Conkle.pdf
All About Stuff: webMethods and other servers Java Memory Settings
SMART C-CDA Scorecard
Sokanu
GitHub - RSS-Bridge/rss-bridge: The RSS feed for websites missing it
Key Steps to GDPR Compliance – Part 2 – IT Governance Blog
GDPR Overview
Penetration tests could have spared NHS from WannaCry – IT Governance Blog
Mandatory documentation for ISO 22301 – IT Governance Blog
ISO 22301
JBoss Performance Tuning part 1
JBoss AS 7 Performance tuning
Open Source and Enterprise Architecture: JVM Performance Tuning
Web design and development articles and tutorials for advent ◆ 24 ways
COBIT 5 for cyber security: want to know more? – IT Governance Blog
WMI, Query Windows SecurityCenter2
The Mirth Open Source Portal
COBIT vs ITIL vs TOGAF: Which Is Better For Cybersecurity?
Running Systems » Blog Archive » Connecting EMC/NetApp shelves as JBOD to a Linux machine
Vendor Management in the Spotlight – The Personal Blog of Sean Goodwin
Book Review: The Book of Five Rings – The Personal Blog of Sean Goodwin
My CISSP Success Story – The Personal Blog of Sean Goodwin
Memory Tuning for Java Application Servers | rsingh
Packbot-P Summary Design and SOW - ML-advice.pdf
Virtual Machine Optimization - Userful Support
Information Security Travel Guide: Tips for Traveling
Home - Arachni - Web Application Security Scanner Framework
en – NetApp Monitoring Blog
SANS Digital Forensics and Incident Response Blog | Automated Hunting of Software Update Supply Chain Attacks | SANS Institute
WinRM problems – Luka Gros
Enable nested virtualization on Google Cloud | Open-Source Routing and Network Simulation
Significant Changes Coming to NIST Cybersecurity Framework
An introduction to Joplin, an open source Evernote alternative | Opensource.com
How to Easily Boost Ubuntu 16.04/17.10 Network Performance by Enabling TCP BBR
How to Transfer Your Steam Games From One PC to Another | iceflatline
How to optimize your cloud strategy – Azure Government Cloud
Comparing cloud vs on-premise? Six hidden costs people always forget about
Install SQL Server 2017 Using PowerShell Desired State Configuration and SqlServerDsc – PowerSQL
joeware – never stop exploring… :) » Blog Archive » Active Directory… 18 Years Old… But Do Your App Vendors and Developers Even Know How To Use It Properly?
What You Need To Know About The Intel Management Engine | Hackaday
6 open source home automation tools | Opensource.com
Monitoring Tomcat with Nagios Core and jmx4perl | Lisenet.com :: Linux | Security | Networking
A few cybersecurity predictions for 2018 | CSO Online
5 tips for better NGINX security that any admin can handle - TechRepublic
Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job
Docker : My First Steps | The ORACLE-BASE Blog
8 Critical 401(k) Questions You Need to Ask Your Employer
How To Detect And Find Hidden Cameras In Your Airbnb Rental - foXnoMad
OpenCV Never Forgets a Face | Hackaday
ize it by match
vSphere Permission cleanup - LucD notes
Even unmanaged EdgeMax EdgeRouters can be managed with new UNMS (Ubiquiti Network Management System) free beta, no UniFi required! | TinkerTry IT @ Home
A Fistful of Dongles: The Glaring Omission in Your Incident Response Planning
Technical Professions Progress from Magical to Boring
Wordpress: Redirect HTTP to HTTPS in Apache | UITS Linux Team
Downloading SharePoint Patches with PowerShell - Todd Klindt's SharePoint Admin Blog
Henry Ford Health System data breach compromised data of nearly 20,000 patients
Security Onion Configuration in VMware
Antifragile Management and the End of the Annual Performance Review » Public Libraries Online
Why is IT Security winning battles, but losing the war...? - Balabit Blog
Mecklenberg, N.C. county officials consider paying cyberattacker's ransom demand
Cybersecurity’s Dirty Little Secret
Testssl.sh - Testing TLS/SSL Encryption Anywhere on Any Port
How to manage firewallD (on CentOS 7 and all the other distro) – Marksei
SQL Vulnerability Assessment Available in SSMS - Thomas LaRock
PLCs in Your Browser | Hackaday
2 Easy Ways to Encrypt Dropbox on Ubuntu 16.04/17.10 (Desktop & Server) | LinuxBabe
When is a 10-bit A/D an 8-bit A/D? | Hackaday
Authenticate Oracle database users against AD, in practice – Oracle 48
How to use DNSenum to scan your server's DNS records - LinuxConfig.org
Cloudian Announces HyperFile, Makes Object Better | penguinpunk.net
An Introduction to Machine Learning through Microsoft ML – Microsoft Faculty Connection
Stability and Change – Why and How to adopt WaaS. – PowerInTheShell
Cloud Native Part 3: DevOps - via @codeship | via @codeship
Visualizing your Solutions: Mind Maps and Wireframe Diagrams – DiscoPosse.com
Encryption’s role in GDPR compliance and cloud data security | ITProPortal
Kaspersky Security Bulletin: Review of the Year 2017 - Securelist
Cybersecurity for Electronic Devices | US-CERT
Holiday Traveling with Personal Internet-Enabled Devices | US-CERT
On the Demise of Linux Journal - Noah Meyerhans
In practice: How customers are using Shielded Virtual Machines to secure data | Windows Server Blog
The best kept secret in cybersecurity for banks | CSO Online
The Effectiveness of Tools in Detecting the 'Maleficent Seven' Privileges in the Windows Environment - effectiveness-tools-detecting-maleficent-seven-privileges-windows-environment-38220
WebGoat Teaches You To Fix Web Application Flaws In Real-time - OSTechNix
Disrupting The Computer Industry Before it Existed: Rear Admiral Grace Hopper | Hackaday
Seth's Blog: Reading at work
Roll-up Board - Visual Studio Marketplace
Protecting Your Website From Application Layer DOS Attacks With mod_evasive
6 steps for GDPR compliance | CSO Online
What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
Cybersecurity professionals aren’t keeping up with training | CSO Online
Index of /docs/Slides/2017
Changing Cybersecurity Regulations that Global Financial Services Firms Need to Know About | CSO Online
5 computer security facts that surprise most people | CSO Online
Department of Defense contractors must implement IT security controls by December 31 | CSO Online
JPCERT/CC Blog: Research Report Released: Detecting Lateral Movement through Tracking Event Logs (Version 2)
The first text message was sent 25 years ago
Sopranica
sysadvent: Day 2 - Shifting Left Securely With inSpec
GitHub - cluberti/VDI: Repository for VDI scripts
Doc Searls Weblog · Requiem for a great magazine
GitHub - peteheist/irtt: Isochronous Round-Trip Tester
Seth's Blog: Your soft skills inventory
Netapp Ontap 9.3 Simulator | SYSADMINTUTORIALS IT TECHNOLOGY BLOG
Cuckoo’s Egg – Week 3 Notes – Chris Sanders
Build a SNES Classic with an Android TV Box
(My) CSSLP Notes – Software Deployment, Operations, Maintenance and Disposal | Adventures in the programming jungle
CSSLP
Monthly Security Patch Program for the vCenter Server Appliance - VMware vSphere Blog
sysadvent: Day 1 - Comfortably Numb - or - “How Corporate Analgesia is Actively Harming You”
GitHub - f4exb/sdrangel: SDR Rx/Tx software for Airspy, BladeRF, HackRF, LimeSDR, PlutoSDR, RTL-SDR, SDRplay RSP1 and FunCube
A look back at cybersecurity in 2017 | CSO Online
First US Federal CISO Shares Security Lessons Learned
Insider threat — Chemours employee steals trade secrets | CSO Online
5 Free or Low-Cost Security Tools for Defenders
Protect your name: how to secure DNS servers? | CQURE Academy
Configuring Quad9 on pfSense – Linux Included
Quad9 – First Thoughts & Benchmarks – Linux Included
IAB Europe releases GDPR user consent technical standard
Automate End-to-End Latency Measurements « ipSpace.net by @ioshints
IDS, IPS Penetration Testing Lab Setup with Snort
WiFi Hacker- WiFi Hacking Software – InfoSecHotSpot
Why You Need a Cybersecurity Incident Response Plan (And How to Create One)
How long to study for CISSP - The Silicon Underground
Upgrade your SQL Server to scale before adding new hardware – MSSQL Tiger Team
ASP.NET Session State with SQL Server In-Memory OLTP | SQL Server Database Engine Blog
Programmatically Creating and Signing Word Documents – Andrew Coates ::: MSFT
Guest Blog | A Mobile DevOps Retrospective, Part III: Measurement, the Last Mile – Visual Studio App Center Blog
This Goal Setting Trick Will Help You Stop Procrastinating
Raible Designs | A Stressful, but Rewarding, Trip to Devoxx Belgium and Morocco
Building a Frankenstein Tablet | Enginoor
Are you ready for containers in your office?
8 Low or No-Cost Sources of Threat Intelligence
Cloud Native Part 2: In Practice - via @codeship | via @codeship
Cloud Native Part 1: Definition | via @codeship
How to Extract Content from VMDK Files
The 10 concerns keeping the C-suite up at night going into 2018 - TechRepublic
Kaspersky Security Bulletin - Story of the year 2017 - Securelist
NBlog - the NoticeBored blog: ISO27k internal audits for small organizations
Developers Can Do More to Up Their Security Game: ...
The Infosec Introvert Travel Blog | tisiphone.net
AWS re:Invent 2017: Serverless Architectural Patterns and Best Practices - ARC401 - WoodITWork.com
AWS re:Invent 2017: Security Anti-Patterns: Mistakes to Avoid - FSV301 - WoodITWork.com
Who Was the NSA Contractor Arrested for Leaking the ‘Shadow Brokers’ Hacking Tools? — Krebs on Security
6 fireable offenses that could cost CISOs their jobs
Antivirus vendors have your data. Can they handle GDPR?
4 Ways to Speed Up SSH Connections in Linux
HDMI 2.1 is here with 10K and Dynamic HDR support
​Linus 'Linux' Torvalds gives security developers guidance | ZDNet
IoT lottery: finding a perfectly secure connected device - Securelist
Evil Tester: What is Agile Testing? The Books List
It’s Bash Scripts All the Way Down (more on CLI versus API) « ipSpace.net by @ioshints
Practical KRACKs - Koen Van Impe - vanimpe.eu
What I learned by attending FOR610: Reverse-Engineering Malware / part 1 - Koen Van Impe - vanimpe.eu
Coinmon - Check Cryptocurrency Prices From Commandline - OSTechNix
Basic Security Tools for Your Risk Management Program
Use Philips Hue as an IDS - Koen Van Impe - vanimpe.eu
Green tea cat-shaped bread - Japan Today
Monitor your Raspberry Pi cluster with Prometheus and Docker
Serverless Kubernetes home-lab with your Raspberry Pis
Using ELK as a dashboard for honeypots
Service, function and capability (again) – Tom Graves / Tetradian
What Is Function-as-a-Service (FaaS)?
Function-as-a-Service Market is Expected to Exceed more than US$ 7.50 Billion By 2021 | Medgadget
Configuring iptables to log network traffic - Alex Scoble's IT Notes - An Information Technology Blog
Management Methods | Management Models | Management Theories
What Is Function-as-a-Service? Serverless Architectures Are Here!
Kubernetes: Fission: Serverless Functions as a Service for Kubernetes
Functions as a Service (FaaS)
Functions as a Service (OpenFaaS) | faas
Functions as a service: the rise of serverless architecture
Introducing Functions as a Service (FaaS)
[Project Description] Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector | CSRC
Automating WSUS 2016 Installation with PowerShell - Petri
Generating patch compliance report from WSUS with PowerShell – microsoftramblings
PowerShell meets WSUS | JeffOps
Opensource PACS | Rady's Inspirations
Active Directory Logon Script – Luka Gros
PowerShell Server Inventory, Part 3: Viewing the Inventory using a UI | Learn Powershell | Achieve More
PowerShell Server Inventory, Part 2: Collecting and Sending Data | Learn Powershell | Achieve More
PowerShell Server Inventory, Part 1: SQL Database Build | Learn Powershell | Achieve More
GitHub - proxb/ServerInventoryReport: A set of scripts to create an inventory report using PowerShell, SQL and WPF
How to install Windows Server features using PowerShell – Server 2012 R2 update
WSUS | Learn Powershell | Achieve More
How to get a list of every WSUS update using PowerShell | The Angry Technician
WSUS–PowerShell Reporting – Luka Gros
Generating HTML Reports in PowerShell – Part 1 – Azure Field Notes Blog
Dockerizing all the things: Running Ansible inside Docker container – Rule of Tech
PowerShell – Remove the WSUS client settings from the registry | JeffOps
PACS Replacements Part 3 – PACS Acceptance Testing « PACS People
ISACA CGEIT training (Certified in the Governance of Enterprise IT) Courseware
Q&A: The Ethics of Using Brain Implants to Upgrade Yourself - IEEE Spectrum
Using Emerging Threats Suricata Ruleset to Scan PCAP
Understanding IoT Security (Part 1 of 3): IoT Security Architecture on the Device and Communication Layers - DZone IoT
Understanding IoT Security (Part 2 of 3): IoT Cyber Security for Cloud and Lifecycle Management - DZone IoT
Securing the Workspace Part 2: A few security basics for your Workspace -
Bruce Charlton's Notions: Universal institutional bloating, the British Disease (caused by micro-managing bureaucracy = totalitarianism)
Punctuation Rules Around Quotation Marks
Samurai stroll - Japan Today
How to Encrypt USB Drive on Linux Using VeraCrypt - LinuxBabe.Com
How to Install MKVToolNix 9.6.0 on Ubuntu 16.04 and 16.10 via PPA
How to Integrate Collabora Online Server with Nextcloud on Ubuntu 16.04
Tips / Solutions for settings up OpenVPN on Debian 9 within Proxmox / LCX containers | Robert Penz Blog
WannaCry happened and nobody called me during my vacation – I tell you why | Robert Penz Blog
Implementing IoT securely in your company – Part 3 | Robert Penz Blog
Implementing IoT securely in your company – Part 2 | Robert Penz Blog
Implementing IoT securely in your company – Part 1 | Robert Penz Blog
How to Install and Use Prey to Protect Your Ubuntu Linux Laptop from Theft - LinuxBabe.Com
A security expert built an unofficial Wikipedia for the dark web
Using Telegraf, InfluxDB and Grafana to Monitor Network Statistics · Lindsay Hill
Healthcare BYOD Security Embraces Cloud, Biometric Authentication
VMWare Security Model
Quad9 9.9.9.9 might be a good Google Public DNS 8.8.8.8 alternative, claims better privacy and features DNSSEC, DNS Benchmark indicates better speeds | TinkerTry IT @ Home
AsciiCam: Make ASCII Art with your Phone | Hackaday
Rehoming the Hyperconverged Home Lab – Virtually Sober
Downloading all the 78rpm rips at the Internet Archive | Richard WM Jones
Keeping a work notebook | Richard WM Jones
TempestSDR: An SDR tool for Eavesdropping on Computer Screens via Unintentionally Radiated RF
Why Quality Customer Service Always Starts with a Smile
STIG Compliance with SCAP and DCM in Configmgr - AnthonyOnAzure
Configmgr SQL Server Sizing and Optimization - AnthonyOnAzure
How many disks can you add to a (virtual) Linux machine? | Richard WM Jones
Risk, Process, and Balance – Russell Ballestrini
Securely publish Jenkins build artifacts on Salt Master – Russell Ballestrini
Minikube – Russell Ballestrini
Selenium grid on Kubernetes – Russell Ballestrini
Configuration Management and the Golden Image – Russell Ballestrini
The Three Deployment Management Strategies – Russell Ballestrini
Configuration Management vs Remote Execution – Russell Ballestrini
Postfix Salt State Formula – Russell Ballestrini
How to reset HP iLO Lights-Out User and Password Settings with IPMItool – Russell Ballestrini
Understanding Salt Stack user and group management – Russell Ballestrini
Tips for getting pull requests approved – Russell Ballestrini
My top five suggestions for an independent developer creating a new product or service – Russell Ballestrini
Create your own fleet of servers with Digital Ocean and salt-cloud – Russell Ballestrini
Add a custom header to all Salt managed files using pillar and jinja templates – Russell Ballestrini
How to save hundreds of dollars on groceries without clipping coupons – Russell Ballestrini
How to rescue logs and config from a failed Citrix NetScaler App Gateway – Russell Ballestrini
Block cipher lab – Russell Ballestrini
Career development is a game of chutes and ladders – Russell Ballestrini
How to capture HTTPS SSL TLS packets with wireshark – Russell Ballestrini
PowerShell – Find the appropriate network packet (MTU) size
PowerShell – Is hyperthreading enabled? | JeffOps
vCenter (VCSA) and using Let's Encrypt for SSL Certificates
Security Professionals: Yes we appear vulnerable but that attack vector will never happen – Russell Ballestrini
Hacker Olive Oil Lamp Crafted From Home Materials – Russell Ballestrini
A system administrators guide to installing and maintaining multiple python environments – Russell Ballestrini
Python Image Grabber pig.py – Russell Ballestrini
virt-back: restoring from backups – Russell Ballestrini
A Deep Dive into InfluxDB - via @codeship | via @codeship
Darktable for Windows using Vagrant - ZenCoffee Blog
The Life of Kenneth: Creating an Autonomous System for Fun and Profit
Seth's Blog: Five contributions
Healthcare Exchange Standards: HIE Future is bright - Automated not Manual
Understanding Guide to Nmap Firewall Scan (Part 1)
3 Pillars of Cyberthreat Intelligence
2017 Hacker Holiday Gift Guide · System Overlord
10 Best LaTeX Editors For Linux
A.J. Baime on Truman’s “Completely Different Avenue of the American Dream” » Public Libraries Online
Azure Stack Validation Environment – Part 3: Subscriptions – AzureCAT Guidance
SharePoint Performance Issue – Ahmed Amin
How to create a self-signed SAN certificate, wildcard certificate vs SAN – benjamin perkins
DevOps for Data Science – DevOps Maturity – Carpe Datum
Cloud Computing + Modern DevOps == Productivity Gains – Make it better
Azure Stack Validation Environment – Part 5: Putting it all together – AzureCAT Guidance
How we made backups faster with SQL Server 2017 – MSSQL Tiger Team
Azure Stack Validation Environment – Part 1: Overview – AzureCAT Guidance
Wednesday Featured Forums: SQL Server – Forum Ninjas
5 Lessons to Become a Really Good Self-Taught Programmer
The 50 Cool Uses for Live CDs
12 Raspberry Pi Christmas Projects You Can Make in a Day
Three things I learned at Devoxx
As I See It: The Pros and Cons of Doing Nothing - IT Jungle
Install Windows 10 on Surface 1TB with MDT | Keith's Consulting Blog
Becoming Your Own ISP, Just for Fun | Hackaday
Continuous Network Container Security for Docker Containers - NeuVector
Beautiful blue Raspberry Pi 3 goes on sale, but you (probably) can't buy it
Why you should consider applying for grad school right now - 80,000 Hours
MHA - Mail Header Analyzer - KitPloit - PenTest Tools for your Security Arsenal ☣
Four Ways to Protect Your Backups from Ransomware Attacks
Shadow IT: The Invisible Network
NBlog - the NoticeBored blog: NBlog November 14 - 50 best infosec blogs
Implementing SPF, DKIM, and DMARC – Linux Included
Testing SPF, DKIM, and DMARC – Linux Included
NHS needs to develop cyber-sec culture to reap benefits of digitisation
GitHub - vanhoefm/krackattacks-scripts
SANS Digital Forensics and Incident Response Blog | 4 Cheat Sheets for Malware Analysis | SANS Institute
Supplementing Windows Audit, Alerting, and Remediation with PowerShell
Data Mining in the Dark: Darknet Intelligence Automation
The State of Honeypots: Understanding the Use of Honey Technologies Today
Threat Predictions for Industrial Security in 2018 - Securelist
Threat Predictions for Connected Health in 2018 - Securelist
New product aims to help with GDPR's 'right to be forgotten'
GDPR guidance at your fingertips
General Data Protection Regulation (GDPR) – The Cloud Security Alliance (CSA) has prepared various tools and resources to help both enterprises and cloud service providers comply with the GDPR.
Is Google Cloud network really better than AWS network ? – Gabe's Blog
Top Takeaways From the Healthcare Security Summit
A CISO Sizes Up Healthcare Security Threats for 2018
Here's How To Get Solid Browser Security [Update 2017]
Matchup: GDPR and New Zealand's Privacy Act 1993
Analysis: How Malware Creators Use Spam Emails to Maximize Their Impact
House Committee Urges HHS Action on Medical Device Risks
Errata Security: Your Holiday Cybersecurity Guide
Wisconsin Statewide Health Information Network
Healthcare Exchange Standards: Extra software/transaction details in FHIR AuditEvent / ATNA Audit Message
How to Leverage the Rosetta Stone of Information ...
20 Years of Protecting Intermediaries: Legacy of 'Zeran' Remains a Critical Protection for Freedom of Expression Online | Electronic Frontier Foundation
Security Education Companion
New Guide for Political Campaign Cybersecurity Debuts
3 Ways to Retain Security Operations Staff
We're Still Not Ready for GDPR? What is Wrong With Us?
121 Pieces of Malware Flagged on NSA Employee's ...
Death of the Tier 1 SOC Analyst
White House Releases New Charter for Using, ...
Moving Application Authentication to the Operating System
Fred Kwong: The Psychology of Being a CISO
Insider Threats: Red Flags and Best Practices
2017 Has Broken the Record for Security Vulnerabilities
Employee training remains the best first line of defense against cybersecurity breaches | CSO Online
What is penetration testing? The basics and requirements | CSO Online
The CIO should report to the CISO | CSO Online
Ransomware damage costs predicted to hit $11.5B by 2019 | CSO Online
Hacker John Draper banned from DefCon for sexual misconduct
The cybersecurity skills shortage is an existential threat
Bay Dynamics Risk Fabric puts vulnerabilities in context | CSO Online
GDPR: How to Make it a Competitive Advantage | CSO Online
Building A Perfect Sysmon Configuration File | CQURE Academy
11 top tools to assess, implement, and maintain GDPR compliance | CSO Online
Should we wait for Oracle 19? – Upgrade your Database - NOW!
Proxy over SSH on Windows, Mac or Linux – – Unixblogger –
What’s the difference between a ‘Malicious Threat’ and a ‘Careless Insider’? - Balabit Blog
How to force Windows to start downloading the Windows 10 update files | VentureBeat
The Thanksgiving Reader by Seth Godin
7 useful bcc/BPF performance analysis tools for Linux | Opensource.com
How To Kill The Largest Process In An Unresponsive Linux System - OSTechNix
How to improve ROI on automation: 4 tips | The Enterprisers Project
How to Create Your Own NAS Storage with Openmdediavault
Boot Linux ISO From Android Phone - LinuxAndUbuntu - Linux News | Apps Reviews | Linux Tutorials HowTo
How to setup Quad9 DNS on a Linux
Raspberry Digital Signage | Binary Emotions
Banana Backups | Linux Journal
Four Hidden Costs and Risks of Sudo Can Lead to Cybersecurity Risks and Compliance Problems on Unix and Linux Servers | Linux Journal
InsecRes - A Tool to Find Insecure Resources on HTTPS Sites
How to audit NTLM? | >_
Beyond passwords: how human behavior is the next step for security - Balabit Blog
Pentagon left public intelligence gathering data on exposed server
Sending netdata metrics through syslog-ng to Elasticsearch - Balabit Blog
Top 5 Student Loan Debt Tips - Law and Daily Life
Debian and the GDPR
Cli.Fyi - Quick And Easy Way To Fetch Information About IPs, Emails, Domains And Lots More - OSTechNix
The 10 Easiest Ways to Keep Ubuntu System Clean
adcli – Easy Way To Join RHEL/CentOS System To Active Directory Domain
Sysadmin 101: Patch Management | Linux Journal
Harnessing the Power of Cloud Securely
/r/netsec's Q4 2017 Information Security Hiring Thread : netsec
Sr. Information Security Vendor Assurance Analyst at UPS • JOFDAV
CISO Manifesto: 10 Rules for Vendors | LinkedIn
Cyber-Security, the Continuous Life-Cycle (Part II) | LinkedIn
The Life-Cycle Process of a Security Gap (Part 1) | LinkedIn
A CISO's Seven Fundamentals | LinkedIn
The Strange Art of Writing App Release Notes - IEEE Spectrum
PowerShell Gallery | PSWindowsUpdate 1.6.1.1
Software Updates | Bloomberg Professional Services
A newbies guide to ELK - Part 1 - Deployment - mwpreston.net
The Best PCB Design Software For Linux - Linux notes from DarkDuck
Upgrade VMware ESX from the command line | Velenux Home Page
Terraform - vSphere - CentOS 7 Customization Issues - EverythingShouldBeVirtual
FaaS & Serverless – Vendor lock-in or not? Consider the cost of the full application lifecycle – Karim Vaes
Getting your feet wet with Docker and Containers – Low End Box
Cuckoo’s Egg – Week 1 Notes – Chris Sanders
First impressions of KeyChest – A new TLS certificate expiration tracker – Ctrl blog
Baking SSDs: The SSD oven trick - The Silicon Underground
INFOSEC NIGHT: Best Practices for Keeping Your Home Network Secure (10/12) - Unallocated Space
The 10 command(ment)s of Docker (NAV on Docker #6) – Freddys Blog
20 Sed (Stream Editor) Command Examples for Linux Users
CentOS / RHEL : How to collect sosreport
Install Debian 9 (Stretch) via PXE Network Boot Server
All you need to know about sosreport tool - Kernel Talks
How to easily merge PDF documents under Linux – – Unixblogger –
The only responsible Encryption is End-to-End Encryption -
How are teams currently using osquery? | Trail of Bits Blog
The Year of the Modern Attack Surface - Blog | Tenable™
The Future of SecOps: Behind the 8 Ball
Top 5 cybersecurity mistakes IT leaders make, and how to fix them - TechRepublic
Report: 40% of IT security leaders don't change default admin passwords - TechRepublic
Securing Open RDP Ports – Linux Included
Equifax breach gives IT $87.5 million reminders to apply critical security patches - TechRepublic
Homeland Security team remotely hacked a Boeing 757 | CSO Online
A National Cybersecurity Action Plan is a Serious Priority – The #CyberAvengers
FDA Official Dispels Medical Device Security Myths
Routing packets from a VLAN through a VPN with Ubiquity routers (Unifi Security Gateway or Edge Router Lite) | stewart a.
Michigan to implement 211 cybercrime hotline
Switzerland to become a secure haven for the world's data | Swiss Economics
Me on the Equifax Breach - Schneier on Security
NBlog - the NoticeBored blog: NBlog November 10 - one step at a time
Former CISO: Knowledge of cyber should be requirement to join board of directors
Tennessee city hit with ransomware, $250K demanded
The Private Sector's Responsibility in Preventing a Catastrophic National Cyber Attack
Mitigating and eliminating info-stealing Qakbot and Emotet in corporate networks – Windows Security blog
Is the 1.6TB Paradise Papers exposé a leak or a hack? – Naked Security
"Paradise Papers" breach reveals offshore tax secrets, U.S. commerce secretary's Russian ties
Simple exploit can be used to disable Brother printers remotely – Naked Security
Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks
Beverly Hills Security Summit ~ Cyber Thoughts
Securing Health IT Value ~ Cyber Thoughts
Healthcare Exchange Standards: Healthcare use of Blockchain thru creative use of Smart-Contracts
UK Cybersecurity Center Issues 'The Dark Overlord' Alert
Notes and Analysis on the 2017 Verizon DBIR Report
Documentum xPlore: Tuning of JVM for high throughput and low CPU usage
What are shielded virtual machines and how to set them up
Convert ANSI (terminal) colours and attributes to HTML
Desktop Upgrade 2017
Exploring Big Data: Course 3 – Introduction to NoSQL Data Solutions – Sam Lester – SQL Server & BI Premier Field Engineer
DailyTech - PiJuice – The Portable Power Supply for Raspberry Pi
ZooKeeper vs. Doozer vs. Etcd | devo.ps
MINIX: the OTHER operating system in your Intel computer – Marksei
Pictures from Thursday at Devoxx
Pictures from Wednesday at Devoxx
Pictures from Tuesday at Devoxx
Pictures from Monday at Devoxx
Friday Hack Chat: Fundamentals Of RF | Hackaday
How OpenChain can transform the supply chain | Opensource.com
Why the cloud doesn't work for all businesses [Q&A]
We've reached the cloud computing tipping point
[Part 1] NAScrate - the budget for the budget NAS | Keyboard meet head
DeployHappiness | Finding Computers with a Broken Trust Relationship
Openchain - Blockchain technology for the enterprise
90 percent of IT pros worry about public cloud security
Solix launches free GDPR readiness tool
Using Plaster To Create a New PowerShell Module | SQL DBA with A Beard
Why zero knowledge may be your fast track to GDPR compliance
Siemens Teams Up with Tenable
net-automation/ansible/week2 at working · kceltyr/net-automation · GitHub
ansible-examples/LLDP-to-Graph at master · ipspace/ansible-examples · GitHub
Will GDPR Usher in Big Changes for Healthcare Security?
When Ransomware Strikes: 7 Steps You Can Take Now ...
12 famous (and infamous) IT security disasters | CSO Online
What is the cyber kill chain? Why it's not always the right approach to cyber attacks | CSO Online
The risk of okra | CSO Online
IPv6 Primer for Deployments
Battle Scars from OpenStack Deployments
Kubernetes on OpenStack: The Technical Details
Slicing Scientific Data | Linux Journal
PoE, PoE+ and Passive POE | Linux Journal
OpenStack 'Pike' Focuses on Basics Instead of Gee-Whiz New Features | IT Pro
OpenStack Pike Debuts Updated Open-Source Cloud Platform
New Features Coming in the OpenStack Pike Cloud Platform
OpenStack Growing Both Public and Private Cloud Footprint
Improve your bash/sh shell script with ShellCheck lint script analysis tool – nixCraft
How to Deploy 800 Servers in 8 Hours
Can OpenStack Beat AWS in Price
PowerShell module: Export your computer configuration - Syst & Deploy
Powershell Tool : Compare two computer configuration - New Version - Syst & Deploy
Get rid of "WARNING! Your cache is running out of filedescriptors" in Squid Proxy - LinuxTechLab
OpenStack Summit Sydney Day 1 Keynote
Wassenaar, Cybersecurity, and Why European Officials Get Better Lunches than Americans - Lawfare
Crunchyroll website hack tried to infect visitors with malware (updated)
InfoSec Handlers Diary Blog - Securing SSH Services - Go Blue Team!!
Applied Crypto Hardening
Cloud Security: Defense in Detail if Not in Depth
Seattle Woman Says Her Identity Has Been Stolen 15 Times Since Equifax Data Breach | HuffPost
CPO to CISO: Four Steps for Privacy Professionals to Get Security Savvy - CPO Magazine
The Krack Wi-fi Vulnerability Explained in Plain Terms
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Safe
Jennings Aske on Getting Serious About Medical Device Security
WiFi Exploitation with WifiPhisher
10 Scariest Ransomware Attacks of 2017
On the Luxury of Abandoning a Nice Corporate Job for the Freedom of Freelancing
AT&T Cybersecurity Report
Does understanding the cost of IT really matter? | Virtual Me
KVM - VM Templates - EverythingShouldBeVirtual
Generating/Executing Terraform Plans Using Ansible - EverythingShouldBeVirtual
Ansible - MAAS Management - EverythingShouldBeVirtual
Learn Micro Services Monitoring - Vagrant Provisioned Using Ansible - EverythingShouldBeVirtual
InfoSec Handlers Diary Blog - Auditing SSH Settings (some Blue Team, some Red Team)
5 Reasons CISOs Should Keep an Open Mind about ...
Hacking Airwaves with Fruit Part 1: WiFi Pineapple Mark IV Basics - EH-Net Online Mag
HHS continuing to push for health care cyberthreat sharing
PwC study: Many companies are not prepared to handle cyberattacks
The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
Beginner Guide to Classic Cryptography
Building the Airplane in Mid-Flight: Bringing Cyber Security Structure to Special Operations Units
NBlog - the NoticeBored blog: NBlog November 3 - audit sampling (LONG)
Today You’re Being Hacked - How To Choose Secure Settings
Healthcare Orgs in the Crosshairs: Ransomware Takes Aim
Creating a Logging Infrastructure
Harbor™ by VMware®
OCR: Mobile Devices Still Pose Security Risk to Health Data
How to Install LineageOS on Raspberry Pi - Make Tech Easier
Easy guide to secure VNC server with TLS encryption - LinuxTechLab
How to create a Hydrogen drumkit for fun and profit | Opensource.com
OnionShare - A Tool To Share Any Size Of Files Securely And Anonymously | 2daygeek.com
SQL Updates Newsletter – October 2017 – SQL Server Updates and Lessons Learned
12 emerging IT job titles with a bright future | The Enterprisers Project
Analyzing Song Lyrics | Linux Journal
The Handbook of Japanese Beans
Changes in RHEL 7 Security Technical Implementation Guide Version 1, Release 3 - major.io
My VM is lighter (and safer) than your container | the morning paper
PASS SUMMIT 2017 - SQL Server Security - Blog dbi services
(My) CSSLP Notes – Software acceptance | Adventures in the programming jungle
wildfly | panticz.de
An Opinion in Defence of NATs
Testing the Waters: How to Perform Internal Phishing Campaigns | Linux Journal
How To Check Installed Linux Kernels - OSTechNix
Using the Correct Tool for the Job
Are you a Tool or Rain Maker? - The Matrix has you...
Hilton data breaches lead to $700,000 penalty
Cisco ASA: Prioritise RDP Traffic | PeteNetLive
Occupy the cloud: distributed computing for the 99% | the morning paper
The Four Values of a Devops Transformation | via @codeship
SQL Server on Linux on Docker quick and easy – Orrin Edenfield
Four in five companies aim to change the way they manage IT security in the next year
Blade Server Options for VMware vSAN ReadyNode » Blades Made Simple
What’s new in SSHGuard 2.1 – Ctrl blog
A Guide to Attacking Domain Trusts – harmj0y
A Masscan Tutorial and Primer
The Equifax Breach – A Cyber WTF Moment - Blog | Tenable™
5 questions to ask your CEO about cybersecurity | CSO Online
State-sponsored cyberattacks are now the preferred method of warfare | CSO Online
When Is Cybersquatting Illegal? - Law and Daily Life
NAIC Model Law passes | CSO Online
An AI detected colorectal cancer with 86 percent accuracy
http://www.itsmf.org.hk/eng/event35/Carl_COBIT_ITIL_for_Change_Mgmt.pdf
HP lost key historical archives in California's wildfires
TBS Structured Wiring Jacket Colors
Where to Put Structured Wiring Wall Jacks
RJ11 Phone to RJ45 Jack
How to Declutter Your Home Office – BizSpark Australia
Personal Countersurveillance (I): Facial Recognition - Security Art Work
How to debug Windows Crash Dump – BSOD – MILOSZENGEL.com
IT That Should Just Work: Backup and Restore ESXi Host Configuration
Melissa Hathaway on The Future of Cybersecurity - Lawfare
​How To Create An Efficient Kanban Board/Process | Purple Gr...
How to block executables from APPDATA – MILOSZENGEL.com
​VeriSM is it the future of IT Service Managemen | Purple Gr...
IT That Should Just Work: Windows Server 2016 Licensing Explained
Difference between antivirus and antimalware - The Silicon Underground
Intel NIC vs Realtek networking - The Silicon Underground
IT security hindering productivity and innovation, survey shows
Depositions Instead of Searching for Responsive Email? – Bow Tie Law
The Best Meeting Ever » Public Libraries Online
LEAP#352 Decoding ACARS – tardate 2017
The QUIC transport protocol: design and Internet-scale deployment | the morning paper
CIO Dashboard » Top 10 Metrics for a New CIO
Signature-Based Detection With YARA
Quick guide to SIAM
Managing ESXi Firewall with vSphere client, PowerCLI.
The (Amateur) Data Science Body of Knowledge – Carpe Datum
The Five Minute* Guide to Machine Learning – Carpe Datum
The Data Scientist’s Computer – Carpe Datum
Investigation: WannaCry cyber attack and the NHS
Investigation: WannaCry cyber attack and the NHS - National Audit Office (NAO)
Cisco's Talos Intelligence Group Blog: Threat Spotlight: Follow the Bad Rabbit
Lecture Notes on Cryptography
Experience SQL Server 2017: Start your journey here – SQL Server According to Bob
LogFileParser with PowerShell – PowerInTheShell
MSSQL Penetration Testing with Metasploit
Microsoft Azure Notebooks - Online Jupyter Notebooks
Why Only Use One Controller When You Can Use ALL Of Them? | Hackaday
A Short Guide to Motherboard Parts and Their Functions
How to Split a Huge CSV Excel Spreadsheet Into Separate Files
Building a Home Lab for Offensive Security & Security Research · System Overlord
Detecting Bad Rabbit Ransomware - Blog | Tenable™
Using chef, terraform and vCenter
Our 20 most popular pieces of research - 80,000 Hours
Bad vs. Less Bad Security Reporting: CoreML vs. Ships
Bad Rabbit ransomware - Securelist
Canada's 'super secret spy agency' is releasing a malware-fighting tool to the public
Announcing the vSphere 6.5 Topology and Upgrade Planning Tool - VMware vSphere Blog
Managing Cyber Security in Today’s Ever-Changing World
IOActive Labs Research: Embedding Defense in Server-side Applications
Reaper: Calm Before the IoT Security Storm? — Krebs on Security
Panama Papers-style leak may follow breach of offshore law firm Appleby
NBlog - the NoticeBored blog: NBlog October 27 - Equifax cultural issues
5 paths to a career in cybersecurity – Naked Security
Equifax Was Warned - Motherboard
Comprehensive Guide to Sniffing
The Price Of Compliance: Study Uncovers GDPR Costs 10/26/2017
Congressional Committee Wants Nuance to Share NotPetya Details
Medical Device Security: What Really Works? - HealthcareInfoSecurity
Cyber Security=Brand ProtectionWebinar. - HealthcareInfoSecurity
The Equifax Data Breach: A UK Perspective - HealthcareInfoSecurity
How a Medical Device Vulnerability Can Compromise Privacy
Why you should care about concurrency – Gabe's Blog
Download the ISMG Faces of Fraud Industry Survey
"TorWitness" Docker Container: Automated (Tor) Websites Screenshots - /dev/random
Why Patching Software Is Hard: Technical Challenges
Why Patching Software Is Hard: Organizational ...
BadRabbit ransomware attacks multiple media outlets | CSO Online
How Sutton’s Law applies to cybersecurity today | CSO Online
How much will non-compliance with GDPR cost you? | CSO Online
Measuring cyber resilience – a rising tide raises all ships | CSO Online
A Checklist for Securing the Internet of Things
3 Steps to Reduce Risk in Your Supply Chain
Navigating the General Data Protection Regulation with data maps | CSO Online
Insider threats: the 4 vulnerabilities you’re missing | CSO Online
3 Must-Haves for IoT Security: Learn, Segment & Protect | CSO Online
(My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Requirements | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Design | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Implementation | Adventures in the programming jungle
(My) CSSLP Notes – Secure Software Testing | Adventures in the programming jungle
(My) BruCON 2017 Notes (2) | Adventures in the programming jungle
(My) Brucon 2017 notes (1) | Adventures in the programming jungle
Sales Tax Rates in Major Cities, Midyear 2017 - Tax Foundation
Top 5 Tips for Sales Engineers & Seeking Wisdom – Virtually Sober
For a dollar, an AI will examine your medical scan
InfluxData (InfluxDB) | Time Series Database Monitoring & Analytics
General thoughts about patching | rootpool
Empty homes | rootpool
Stricter Data Regulation Is on the Way: Are You Ready? -- Virtualization Review
Ditch Your HDDs For ACloudA Gateway - ESX Virtualization
Equifax data breach is also being investigated by UK officials
CSO Online Daily Dashboard | CSO Online
How to install and use ReaR (Migration & Recovery tool) on CentOS 7 / RHEL 7
Bad Rabbit Used Pilfered NSA Exploit
FDA Spells Out When Medical Device Modifications Need Review
Flashing TM-AC1900 to RT-AC68U ~ Bay Area Tech Pros
World's Most Common Industrial Control Protocol Dates From 1979
InfoSec Needs to Embrace New Tech Instead of Ridiculing It
Ransomware in Healthcare: Time for Vigilance - HealthcareInfoSecurity
Differences between PSU / BP and RU / RUR
How to roll your own backup solution with BorgBackup, Rclone, and Wasabi cloud storage | Opensource.com
Using Cron with EMC VNX and Celerra - THE SAN GUY
Create Network Diagram from LLDP Neighbor Information « ipSpace.net by @ioshints
A Sample Makefile for Publishing Blog Articles
Think Carefully Before Signing Up For a High Deductible Health Plan
Infrastructure Monitoring with TICK Stack - via @codeship | via @codeship
Report GPOs with Script References | Alan's Blog
An Overview of the Security Ecosystem in Programming - via @codeship | via @codeship
Desired State Configuration(DSC) for SQL Server ***Update 2 – Troy Ault's Blog
Query Store Best Practices for Mission Critical or Busy SQL Server | Vikas Rana
The new dynamics of strategy: sense-making in a complex and complicated world | the morning paper
Seth's Blog: Price vs. cost
SQL Server 2016 Express SP1 – Always Encrypted – Premier Developer
KRACK vulnerability breaks encryption over every Wi-Fi networks – Marksei
Why Setting IT Priorities Is So Important - IT Jungle
GTD Infographic
Why Hospitals Need Better Data Science
More Than Digital Dirt: Preserving Malware in Archives, Museums, and Libraries
Find native memory leaks in Java
Shrink VirtualBox VDI files with TRIM | Erik Wramner
How to create a “heatmap” graph network visualization – David Vassallo's Blog
What is an Business Continuity Plan? (BCP) | Tom Smyth's Blog
Why Outsource your Information Technology? | Tom Smyth's Blog
What is an IT Strategic Plan and what does it contain? | Tom Smyth's Blog
Responding to KRACK: What You Need To Know - Blog | Tenable™
Update to Pentest Metasploit Plugin
Sysinternals Sysmon 6.10 Tracking of Permanent WMI Events
Basics of Tracking WMI Activity
Getting Gigabit Networking on a Raspberry Pi 2, 3 and B+ | Jeff Geerling
5 steps leaders can take to improve cybersecurity in their organization - TechRepublic
Virtualization The Future: VMware Certification Tracks Defined
HIPAA Compliance: Self-Insured Company Reports Breach
How to install and use Uncomplicated Firewall in Ubuntu - TechRepublic
Meet Bill Pollock, founder of No Starch Press | Opensource.com
Install a Centralized Log Server with Rsyslog in Debian 9
How To Display Date And Time In History Command | 2daygeek.com
What Next Now the KRACK Smoke is Clearing? - MovingPackets.net
What Cybersecurity Standard Will a Judge Use in Equifax Breach Suits? - Lawfare
Cyber Operations and the Draft NDAA: Analyzing Section 1621 (and SecDef's Objections) - Lawfare
Getting started with Logstash | Opensource.com
KRACK Vulnerability: What You Need To Know | Electronic Frontier Foundation
Top 5 cybersecurity facts, figures and statistics for 2017 | CSO Online
The Costs of Failing to Maintain Important Machinery
InfoSec Handlers Diary Blog - Baselining Servers to Detect Outliers
Blood Test Results Exposed in Cloud Repository
How GDPR is impacting the way privacy is done
Privacy and security of telehealth must be addressed
Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update
Build it right with NIST’s Cybersecurity Framework | CSO Online
NICE Cybersecurity Workforce Framework | NIST
CSO Online Daily Dashboard | CSO Online
Errata Security: Some notes on the KRACK attack
RPM Post-Upgrade Scripts · Lindsay Hill
War Stories: Always Check Your Inputs · Lindsay Hill
DragonFlyBSD: DragonFly BSD
Japanese women rank the otaku obsessions they can most forgive in a partner - Japan Today
Microsoft’s internal bug database was hacked in 2013
Boost Your Business with These 10 Foods
Are your employees snooping on your corporate network?
Understanding AWS Tenancy - The IT Hollow
KRACK WPA2 Vulnerability Announced - Upgrade Now - MovingPackets.net
https://blog.scottlowe.org/2017/10/17/rock-stars-builders-janitors/
default listener port – Laurent Schneider
Don’t Worry About KRACK - Lawfare
Project Management Apprenticeships Change the Face of that Career
6 hard truths IT must learn to accept | CIO
Templates - Journals, CVs, Presentations, Reports and More - Overleaf
Some Tools of a PFE – PowerInTheShell
8 Fantastic Facilitation Playbooks for Designing Productive Nonprofit Meetings | Beth's Blog
JSON Resume
Top 20 Windows Server Security Hardening Best Practices | securitywing
OnePlus opens up about its secret data collection and promises an opt-out opportunity
Intro to Rebuild, a new and open source management framework | Opensource.com
Microsoft has contractually committed to CJIS regulations in 60% of the United States! – Azure Government Cloud
10 bad habits network administrators should avoid at all costs - TechRepublic
An Introduction to vSphere Security Hardening
My CompTIA Cloud SME experience – vMusketeers
HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework
InfoSec Handlers Diary Blog - It is a resume - Part 1
The Perfect Meeting Blueprint (Templates Included)
Global Security Intelligence Report | Microsoft
Famous malware threats: Where are they now?
3 truths for IT leaders navigating intense change | The Enterprisers Project
Reduce the max cookie lifetime from decades to days in Firefox – Ctrl blog
RIPE plays with 1.1.1.1 and 1.2.3.4 following APNIC allocation - PacketLife.net
Army Credentialing Opportunities On-Line Home
Cybersecurity Canon : Cybersecurity Canon
Moving from SSAE 16 to SSAE 18: Upcoming Changes to SOC 1 Audits
Server Room Tour • PC-Addicts
Hvper – One Page Internet
From the Canyon Edge: How many people in the world use Ubuntu? More than anyone actually knows!
What Is CamperForce? Amazon's Nomadic Retiree Army | WIRED
Major cyber-attack will happen soon, warns UK's security boss | Technology | The Guardian
Cipherli.st - Strong Ciphers for Apache, nginx and Lighttpd
SC's Dependency Problems | Management & Mobility content from Windows IT Pro
User Behavior Analytics | Bottomline Technologies
Add SSL certificate for RDP sessions — Mapledyne Ideas
blog.kristinlgriffin.com: Minimum Certificate Requirements for Typical RDS implementation
SAN Certificates: Subject Alternative Name – Multi-Domain (SAN)
GitHub - iadgov/Secure-Host-Baseline: Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. iadgov
GitHub - EnclaveConsulting/SANS-SEC505: Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505
Removing Self-Signed RDP Certificates | Ask Premier Field Engineering (PFE) Platforms
Getting In-Control - Combining CobiT® and ITIL® for IT Governance and Process Excellence
ILSpy is the open-source .NET assembly browser and decompiler.
What is the AllJoyn Router Service on Windows 10? - 404 Tech Support
BadNets: Identifying vulnerabilities in the machine learning model supply chain | the morning paper
Windows Server 2012 R2 stuck in reboot cycle due to failed updates - Oliver MarshallOliver Marshall
Getting to grips with NFSv4.1 and Kerberos - CormacHogan.com
How to disable a Wi-Fi card from the command line - Oliver MarshallOliver Marshall
How to install OpenVAS 9 on Ubuntu 16 LTS - Oliver MarshallOliver Marshall
How to easily update your VMware Hypervisor from 6.5.x to 6.5 Update 1 Express Patch 04 (ESXi 6.5U1EP04)
Checking you are up to date with PowerCLI - Virtu-Al.Net
6 Steps to Finding Honey in the OWASP - Dark Reading
10 Major Cloud Storage Security Slip-Ups (So Far) ...
Docker compose: what is it? How can you use it? – Marksei
Listen Notes: Best podcast search engine & podcast database
Do You Really Need Long-Term-Disability Insurance? : Shots - Health News : NPR
Equifax Hack Brings Renewed Attention To The Credit Reporting Industry : NPR
Ben's Laptop Buying Guide | b3n.org
Download Assistant for RUs, RURs, BPs, PSUs, Patch Sets and Releases
Barking Up The Wrong Tree: The Benefits of Being Mostly Optimistic
Digital Identity Guidelines Authentication and Lifecycle Management
Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification
Why Cloud Security Is a Shared Responsibility
IRS suspends Equifax contract
Equifax, TransUnion Websites Served Up Adware, Malware
Equifax breach included 10 million US driving licenses
RTV (Reddit Terminal Viewer) – A Simple Terminal Viewer For Reddit
Orgs must demand cyber accountability, Pace University CyberStorm
Former Congressional IT pro Awan wiped phone before FBI arrest
Leveraging the Multi-Stakeholder Nature of Cyber Security
Users aren't the weakest link in cybersecurity: 3 tips for IT leaders - TechRepublic
CoreOS Controls Multi-Cloud Container Environments via Tectonic 1.7
Turn Your Ansible Playbook into a Bash Command « ipSpace.net by @ioshints
Musing: Network Fabrics Of History — EtherealMind
More Accurate IT Acronyms | The Networking Nerd
Post Exploitation in VMware Files with Meterpreter
MS-SQL Penetration Testing lab Setup
Bill Proposes Medical Device Cyber Framework, Guidelines
Redefining the Role of HHS CISO - HealthcareInfoSecurity
GDPR and the Regulatory Impact on Vendor Risk
Equifax Hackers Stole Info on 693,665 UK Residents — Krebs on Security
Equifax Credit Assistance Site Served Spyware
Cyber Security in the Workplace Is Everyone’s Obligation
How to Comply With New York's Cybersecurity Regulation
How to set up a Postgres database on a Raspberry Pi | Opensource.com
How to Make Windows Better? Make It Chocolatey! | Linux Journal
10 layers of Linux container security | Opensource.com
The Top 10 Factors that Influence Your Salary - Datamation
Big bank finds open source pays off
Options to check and alert the vcenter certificate expiration | Techbrainblog
Desired State Configuration(DSC) for SQL Server ***Update – Troy Ault's Blog
Cyber attacks are as serious as terrorism, says UK's GCHQ
Google Video Quality Report
INFOSEC NIGHT: Best Practices for Keeping Your Home Network Secure (11/12) | Unallocated Space
Foreman and Puppet 5 – the Hard Way – Thin Light
Resetting vSphere 6.x ESXi Account Lockouts via SSH – DiscoPosse.com
5 Awesome Tips to Troubleshoot vMotion
PowerCLI: List all Windows VMs and OS Versions – nerdybynature
Happy Ada Lovelace Day! | Hackaday
Log Management: Graylog Vs ELK – JetRuby – Medium
PowerShell Switch type never $null | Keith's Consulting Blog
Netstat, SS and RHEL 7 / CentOS - NixPal | Server Administration & Outsourcing Solutions, Database Server. Email Server Management
Performance Regression Analysis with Performance Co-Pilot [video] - RHD Blog
Exploratory Performance Analysis with Performance Co-Pilot
What are the costs of data outages, downtime in healthcare?
Project management: A surefire way to kill your software product | TechBeacon
FTC Releases Alerts on Protecting Against Identity Theft
S.E.C. Says It Was a Victim of Computer Hacking Last Year - The New York Times
5 NFC Security Issues to Consider Before Your Next Contactless Payment
5 big challenges facing CIOs and IT leaders in 2015 (part 1) - mrc's Cup of Joe Blog
Top 10 concerns for CTOs, CIOs and IT leaders in 2017 | HPE
Building a Security Operations Center (SOC)
Disable Certain Package Updates using YUM in RHEL / CentOS / Fedora
vOneCloud: The Open Replacement for vCloud
Operating system market share
cobbler/quickstart-guide.rst at master · cobbler/cobbler · GitHub
Getting Started with Cobbler – Thin Light
Jan-Piet Mens :: Configuration management with Ansible
Clickable HTML network diagrams with draw.io | The Packetologist
drawio
Microburst: Update on the HTML Home Network Diagram - MovingPackets.net
Introduction to Cloud Computing - Router Freak
Lab Setup for VOIP Penetration Testing
BruCON Network 0x09 Wrap-Up - /dev/random
How to make your cybersecurity resume stand out: 5 tips - TechRepublic
The Reason Business Doesn't Take InfoSec Seriously
Preparing for GDPR compliance: Where you need to be now and how to get there | CSO Online
5 Big Challenges Facing CIOs and IT Leaders in 2017 | TayganPoint Consulting Group
The 3 Most Frustrating Challenges IT Security Teams Face
Verizon Wireless Internal Credentials, Infrastructure Details Exposed in Amazon S3 Bucket | Threatpost | The first stop for security news
CalCom Software- Server hardening and compliance automation
Packer - Easily build machines images for multiple platforms with the same configuration
StratusLab :: Example CentOS Kickstart File
What can I use for fully automatic VM creation/deployment? : linuxadmin
HL7 Data Interfaces in Medical Environments
HL7 Data Interfaces in Medical Environments: Attacking and Defending the Achille's Heel of Healthcare
HL7 Data Interfaces in Medical Environments: Understanding the Fundamental Flaw in Healthcare
Create Trusted Remote Desktop Services (RDP) SSL Certificate - Derek Seaman's Blog
Equifax CEO out after massive data breach - Business Insider
The Grey Corner: List comprehension one liners to extract info from nmap scans using Python and libnmap
Set advanced settings on all VMs in a cluster – Noam's scripting blog
PowerShell overview and introduction | DiabloHorn
DOTmed.com - Making the business case for compliance
Healthcare Exchange Standards: IHE IT Infrastructure Technical Framework Supplements and Technical Framework Volumes Published.
How to create a CentOS 7 KVM image with Packer | Velenux Home Page
The age of temping: Staffing employment explodes in the Upstate
GitHub - OSSIndex/DevAudit: Open-source, cross-platform, multi-purpose security auditing tool
PowerCLI: One-Liner to get VMs, Clusters, ESX Hosts and Datastores | ICT-Freak.nl
GitHub - cobbler/koan: koan - kickstart over a network
How We Use AWS, Ansible, and Packer to Make Deployment Awesome | Branch Blog
Immutable Deployments and Packer
Continuous Deployment of Golden Images with Packer and Semaphore - Semaphore
Modelio Open Source - UML and BPMN free modeling tool
New Email Security Guidelines to Combat Phishing Threats
HCIBench
Equifax Breach Fallout: Your Salary History
AutoUpdate on OpenWRT based box (also works on LEDE) · StevenBlack/hosts Wiki · GitHub
Autonomous Database - Blog dbi services
LEDE/OpenWRT — Multiple SSIDs – LEDE/OpenWrt & IoT – Medium
LEDE/OpenWRT — How to enable Client Isolation
How to upgrade TP-WDR3600 from OpenWRT to LEDE | Tech Tutorials
Quick Reference : IIS Application Pool – Rohith's blog
Understanding Guide to ICMP Protocol with Wireshark
Death of the Life Long Job | People Centre
7 deadly sins of documentation | Opensource.com
Ransomware Attack Cuts Access to X-Rays at Surgery Center
Traceroute Lies! A Typical Misinterpretation Of Output - MovingPackets.net
101 Free VMware Tools
Engaging Patrons with Library Podcasts » Public Libraries Online
A century of science: globalization of scientific collaborations, citations, and innovations | the morning paper
How hard is Security+? - The Silicon Underground
Our computers are fundamentally insecure. Here's why that could lead to global catastrophe. - 80,000 Hours
Equifax was aware of vulnerabilities prior to data breach
Zero Day Initiative — VMware Escapology – How to Houdini the Hypervisor
Introducing nzyme: WiFi monitoring, intrusion detection and forensics
HHS’s New 5-Year Strategic Plan Includes Cyber Goals
8 Tough Questions Every CISO Should Be Ready to Answer
Ransomware Will Target Backups: 4 Ways to Protect ...
Adopting minimalism in your docs | Opensource.com
Save time with Ansible without writing a line of code | Opensource.com
Security Tools (Top 100) - Linux Security Expert
Security Architecture Blueprint
CySAFE for business
ISO/IEC 15504 - Wikipedia
ISO/IEC 21827:2008 - Information technology -- Security techniques -- Systems Security Engineering -- Capability Maturity Model® (SSE-CMM®)
Open Source in the Customer Portal - Red Hat Customer Portal
Check MK – Write your own check – steinkogler.org
CMMI® for Development
Equifax Amassed Salary Details for People at 7,100 Companies - Bloomberg
Using Clover UEFI boot with Sierra on Proxmox – Nicholas Sherlock
The difference between containers and virtual machines | HPE
Configuring the Free CCNA Workbook GNS3 Topology | Free CCNA Workbook
GitHub - symfony/symfony-installer: The Symfony Installer
GitHub - Brockway/ESA-Process-Maturity: Tools to measure the maturity of Enterprise Security Architecture processes
GitHub - OWASP/ASVS: Application Security Verification Standard
GitHub - episki/episki
Capability Maturity Model Integration (CMMI) Version 1.2 Overview
Top 10 Common Misconceptions About Application Whitelisting
Powercli VM hardening script
Quick Tip – Using the CLI to upgrade to a specific VM virtual hardware version in vSphere 5.5 | virtuallyGhetto
Script: PowerCLI: Upgrade VMs to New Tools and Hardware Level Version [SHIFT]
PowerShell script for ESXi hardening – vrealize
@ISACA Volume 20 | 4 October 2017
Arkangel | MSS Platform | Hitachi Systems Security
Setting up Packer, ovftool and Apache web server on a CentOS virtual machine · sdorsett.github.io
Minimal Linux with Packer and Vagrant - Research-IT
document classes - Preparing cheat sheets - TeX - LaTeX Stack Exchange
How to make cheat sheets in Latex? - Stack Overflow
GitHub - docker/packer-centos-7: Packaging instructions for VM appliances
Creating an automated CentOS 7 Install via Kickstart file
DSHR's Blog: Not Whether But When
Cyber risks are being created by departments outside IT
PowerShell Cheat Sheet
WaaS – Official Rings and asking for Feedback – PowerInTheShell
Little’s Law and How It Impacts Load Testers  – Chris’s Performance Testing Blog
Are Websites Using Your CPU for Cryptocurrency Mining?
DSHR's Blog: OAIS & Distributed Digital Presevation
uchida/packer-centos packer template to build centos by @uchida - Repository | DevHub.io
World’s Largest Telescope Stopped by LED | Hackaday
Fraudsters Exploited Lax Security at Equifax’s TALX Payroll Division
Haunted By Data
EPIC - EPIC Urges Congress To Hold Equifax Accountable, Update Data Protection Law
Auditing Databases with Nessus - Blog | Tenable™
Experian Site Can Give Anyone Your Credit Freeze PIN – InfoSecHotSpot
New Oracle Security book - Oracle Incident Response and Forensics
Equifax data breach may be state-sponsored
3 billion Yahoo accounts affected by 2013 breach – Naked Security
SQL Server 2017 RTM is available!
ODA X7 - Blog dbi services
Oracle 18c RU and RUR for pioneers and followers - Blog dbi services
Premium Bare Metal Servers and Cloud Hosting - Packet
SAP Backs Kubernetes, Boasts Commitment to Open Source | Data Center Knowledge
How Oracle Is Moving to Kubernetes and Cloud Native Computing
How to kill your network with Ansible
Three Advances Make Magnetic Tape More Than a Memory - IEEE Spectrum
IRS hands fraud prevention contract to Equifax despite massive hack
Former Equifax CEO blames breach on one IT employee
9 Signs Your Identity Was Stolen
VMware support log size issue and workaround (VCSA ). | Techbrainblog
Powercli script to validate the basic vSphere Hardening | Techbrainblog
Ben's Law | The Cost of Being Interrupted | b3n.org
GDPR is a set of security best practices, not a burden
How to properly implement identity and access management
Interesting List of Windows Processes Killed by Malicious Software - /dev/random
[SANS ISC] The easy way to analyze huge amounts of PCAP data - /dev/random
Rice Straw Animal Sculptures from the 2017 Wara Art Festival | Spoon & Tamago
Google Vizier: A service for black-box optimization | the morning paper
How to troubleshoot slow performance after moving to azure due to network latency – Azure SQL Database Support
Roslyn Primer – Part I: Anatomy of a Compiler | The Visual Basic Team
Appendix F - Personal observations on the reliability of the Shuttle by R. P. Feynman
For everyone to benefit from technology, we need to ensure the free flow of information - Microsoft on the Issues
Vermont attorney general fines company $264K for exposure of Social Security numbers
WannaCry and NotPetya: Who, what, when and WHY?
63% of SMBs increased security spending, but more than half still experienced breaches - TechRepublic
66% of SMBs would shut down or close if they experienced a data breach - TechRepublic
The hacker playbook: How to think and act like a cybercriminal to reduce risk (notes from Microsoft Ignite 2017) | CQURE Academy
Are Data Center REITs a Good Investment? -- The Motley Fool
Why auditing your documentation is a must | Opensource.com
Aaron Toponce : 1,000 Books Read In One Year? No, Not By A Long Shot
Google Online Security Blog: Behind the Masq: Yet more DNS, and DHCP, vulnerabilities
[SANS ISC] Investigating Security Incidents with Passive DNS - /dev/random
Ousted Equifax CEO Faces 3 Congressional Hearings
Incident Response Insights from US Army Medicine CISO
8 Electrical Blackout Essentials Every Home Needs
Legislature to beef up computer security – Hudson Valley 360 – InfoSecHotSpot
Equifax breach shows signs of a possible state-sponsored hack
The Cyberlaw Podcast: Equifax and the Upside of Nation-State Cyberattacks - Lawfare
7 Ways Exercising Can Help You Succeed as an Entrepreneur
How to Use the ZFS Filesystem on Ubuntu Linux - Make Tech Easier
Using a 40Gb to 10Gb Breakout Cable on NX-OS - Mostly NetworksMostly Networks
HP Enterprise let Russia review the Pentagon's security software
Equifax will warn 2.5 million additional hacking victims by mail
PipeWire - Improved Audio & Video Handling on Linux
Smart tattoos turn your skin into a health tracker
GNS3 Labs for CCNA: Getting Started with GNS3 - Intense School
CCNA-Security Study Blog » GNS3 Lab
Our journey with devices.. what will the future bring us, what will our workplace be? -
CCNA Training » CCNA FAQs & Tips
Free CCNA Workbook | CCNA Labs, Practice Exams and More!
GNS3 network simulator for CCNA - Router Freak
.patch_storage » Peasland Database Blog
Apple: don't use Face ID on an iPhone X if you're under 13 or have a twin | Technology | The Guardian
Proxmox Import/Export OVA | Nbctcp's Weblog
Upgrade ESXi 6.0 to 6.5 | Nbctcp's Weblog
GitHub - future-architect/vuls: Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
rapid7/ metasploitable3 - a VM for metasploit. - Proturk Security Blog
How to Configure HSRP on a Cisco Router (with GSN3 lab) - Router Freak
CCNA Training » Practice CCNA GNS3 Labs
GitHub - chafey/orthanc-vagrant: Vagrant VM configuration for the Orthanc DICOM server
GitHub - chafey/dicomWeb: Information about DICOMWeb - API's, implementations, etc
Script Modify VM Advanced Setting using PowerCli
Data Breach Statistics by Year, Industry, More - Breach Level Index
EPIC - Electronic Privacy Information Center
Napalm Network Automation
How to Buy a Used Linux Container - Crunch Tools
ckan – The open source data portal software
Activiti BPM Software Home
EMR Integration for Medical Devices: The Basics (UPDATED) | Medical Connectivity
Security/Guidelines/OpenSSH - MozillaWiki
Hardening ssh Servers
Privileged Access Workstations | Microsoft Docs
OpenSSH — Harden the World 0.1 documentation
Security & Privacy Risk Assessment | Online Trust Alliance
Guide to better SSH-Security - Cisco Support Community
Linux and Unix cheatsheet: Remove weak ciphers from SSH Server
Sameh Attia: Cipher Security: How to harden TLS and SSH
What Are Application Containers And How Do I Secure Them?
Complexity kills marketing and sales. Keep it simple! - Proven Website Tips and Lifehacks
ssh - OpenSSH default/preferred ciphers, hash, etc for SSH2 - Information Security Stack Exchange
Bad SSH2 cipher spec error - comp.security.ssh
ssh2-enum-algos
sshscan
Cipher Scanner for SSH download | SourceForge.net
ScanSSH - Scanning the Internet for SSH Servers
Hunting Pastebin with PasteHunter | Tech Anarchy
Subnet Cheat Sheet | UITS Linux Team
GitHub - arthepsy/ssh-audit: SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
cmdref.net - Command Reference [cmdref.net - Command Reference]
Testing Cumulus Linux with Serverspec - Cumulus Networks Blog
Installing Check_MK agent on Windows host remotely | geekdudes
DB-Engines Ranking - popularity ranking of database management systems
The Economy: Contents
OpenVAS
Handy Tool for Converting KVM / VMware Images to Hyper-V | Ben Armstrong’s Virtualization Blog
Building a Raspberry-Pi Stratum-1 NTP Server
GitHub - dev-sec/chef-ssh-hardening: This chef cookbook provides secure ssh-client and ssh-server configurations.
NESTED VIRTUALIZATION | virtuallyGhetto
Nested Virtualization - Proxmox VE
PageSpeed Examples Directory
Nested KVM in VMware ESXi |
Performance Cheat Sheet
Basics of IPv6 Addressing « ipSpace.net by @ioshints
Monitoring Using Prometheus — Rahul Sinha
GitHub - p0bailey/packer-templates: AWS and Virtuabox packer templates for CentOS(6.8-6.9-7.3) Ubuntu(14.04-16.04) Debian(8)
Error #1009 vSphere Web Client - David Hill
Network Documentation Tool - IT Infrastructure Inventory Software
A Useful PowerShell Script to Document Your Active Directory Environment
Configuration Management with Windows PowerShell Desired State Configuration (DSC)
Scripts for Automatic System Administration
What should I ask a candidate for sysadmin role in the interview? : sysadmin
Configuration Files - a pattern for windows batch scripts – tardate 2017
A Comparison of Linux Container Images - Crunch Tools
Container Health Index grades as used inside the Red Hat Container Catalog - Red Hat Customer Portal
osTicket :: Support Ticket System | osTicket
ckan – The open source data portal software
HIPAA Privacy and Security Assessment Compliance Services Checklist
Building a Homelab VM Server - Silly Bits
GitHub - INSANEWORKS/centos-packer: CentOS 6 / 7 x64 + VirtualBox / VMWare for Packer Template
The evolution of continuous experimentation in software product development | the morning paper
Maximize productivity with a large UHD 4K display (40” or more) – Premier Developer
Calculus in 20 Minutes | Hackaday
Which disk controller to use for vSAN - Yellow Bricks
PIN code is a much safer way for you to lock your Android device
FTP Pivoting through RDP
Vendor’s Ex-Employee Allegedly Shut Down Medicaid System
How Health Entities Can Tap DHS Tools for Cyber Skill-Building
Report: Equifax Subpoenaed by New York State Regulator
Filling your data lake with log messages: the syslog-ng Hadoop (HDFS) destination - Balabit Blog
CISOs Offer Soup-to-Nuts C-Suite Strategy
Equihax: Identifying & Wrangling Vulnerabilities
Here’s What to Ask the Former Equifax CEO
Cybersecurity Insurance | Homeland Security
Equifax mea-culpas with free credit “locks” forever – Naked Security
Ignorance of Cyber Vulnerability Is No Excuse | CSO Online
In Equifax Data Breach, Three Hard Lessons in Risk | CSO Online
Practical Advice on Identity Theft and Removing Unauthorized Accounts — My Money Blog
Identity Theft, Credit Reports, and You | Kalzumeus Software
3 Python web scrapers and crawlers | Opensource.com
Announcing the dbi OpenDB Appliance - Blog dbi services
Why going to gym multiple times a week is actually a bad thing? - Proven Website Tips and Lifehacks
The Equifax Breach: Getting From Talk to Organized Response - Lawfare
7 Fun Podcasts for Kids (That Parents Love, Too)
Packet radio lives on through open source software | Opensource.com
You Need Configuration Management. Really. (Thwack) - MovingPackets.net
Collect SSH Keys with Ansible « ipSpace.net by @ioshints
WannaCry ransomware explained: What it is, how it infects, and who was responsible | CSO Online
CBS's Showtime sites silently used Monero Miners on user's browsers
Exploring the Air Gap Myth
Equifax CEO retires
Do's and Don'ts of Securing a Domain Name
Bitdefender Ransomware Recognition Tool – Bitdefender Labs
San Francisco sues Equifax over poor cybersecurity practices
Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards
Fast Food Chain Sonic Drive-In Investigating Possible Card Breach
EHR Certification Changes: Risks for Healthcare Providers
Google Online Security Blog: Broadening HSTS to secure more of the Web
Do CISOs Need to 'Dumb Down' Cybersecurity for Boards?
Trojanized CCleaner Investigation: Lucky Break
vRealize Operation 6.6 “hidden” enhancement | KISSTIBOR.info
10 Ways to Troubleshoot Poor VM Performance
How to get started with Network Virtualisation and NSX
Vanguard Thoughts: Pros and Cons from a 15-Year Client-Owner — My Money Blog
15 Veggie Noodle Dishes That Will Make You Forget About Pasta
Security Tools to Check for Viruses and Malware on Linux | Linux.com | The source for Linux information
SEC Chair Wants More Cyber Risk Disclosure From Public Firms
Is a 15-Year Mortgage a Good Idea?
Errata Security: 5 years with home NAS/RAID
Will the Equifax Data Breach Finally Spur the Courts (and Lawmakers) to Recognize Data Harms? | Electronic Frontier Foundation
FBI's Freese Shares Risk Management Tips
How to Install Ubuntu via PXE Server Using Local DVD Sources
Being Compliant is Not Being Secure - Your Business is Still at Risk!Webinar.
21 ss Command Examples In Linux
The Importance of HTTP Strict Transport Security (HSTS) - RootUsers
Configure Firewall Rules for Multiple Profiles Using Group Policy - RootUsers
8 digital skills we must teach our children | World Economic Forum
What made Porting Microsoft SQL Server to Linux to be the right move after all – Slava Oks's WebLog
How to reset IE11 to default configuration via a script? – We know IE!
An Introduction to Solid State Relays | Hackaday
Peter Block on small group working (Gurteen Knowledge)
Building a 12V 110Ah battery bank using 80 32650 LiFePO4 cells « Dangerous Prototypes
Kitchen Soap – Invited article in IEEE Software – Technical Debt: Challenges and Perspectives
Welcome to the Sapiezoic – Jon Udell
The Electronics Markets of Ho Chi Minh City, Vietnam | Hackaday
Cuban Embassy Attacks and The Microwave Auditory Effect | Hackaday
Cybercrime is costing each business a whopping $11.7M a year, report says - TechRepublic
Cyber Security and Data Integrity Problems Within the GAMP 5 Validation Process
Equifax Data Breach Prompts Calls For Tougher ...
How I come up with topics for my blog posts - SharePoint Maven
Gluster » Storage can make your digital transformation—or break it
Organizations unprepared for the ransomware onslaught
Ransomware attacks affect five percent of SMBs
Healthcare sector accounts for most cyber security incidents
NBlog - the NoticeBored blog: NBlog September 24 - five-step bulletproofing?
Redboot malware leaves researchers wondering if its a ransomware or wiper
Deloitte Breach Affected All Company Email, Admin Accounts
Time to Embrace a Security Management Plane in the Cloud | CSO Online
Who decides when you need to update vulnerable software? (Equifax)
How to Install and Configure Jenkins Server on CentOS 7 to Automate Your WordPress Tasks
How to find disk I/O latency with ioping monitoring tool on Linux – nixCraft
Maximizing IT’s Impact with Microsoft 365 Powered Devices – Enterprise Mobility and Security Blog
Am I a DBA 3.0 or just an SQL*DBA? - Blog dbi services
23 Hardening Tips to Secure your Linux Server
Golden walk - Japan Today
Celebrating the completion of the most advanced subsea cable across the Atlantic - The Official Microsoft Blog
GitHub - jturgasen/my-links: A collection of OSS tools and handy links
GitHub - rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources
AUTOMATED SECURITY HARDENING OF RED HAT ENTERPRISE LINUX V5 IN ACCORDANCE WITH DISA STANDARDS
Security Compliance Manager (SCM)
Top 10 Security Hardening Settings for Windows Servers and Active Directory
NIST Cybersecurity Framework Impacting Your Company?
Wekan — open-source kanban
Welcome to COSO
Updated COSO framework will help audit committees comply with SOX
Defining a Baseline for Improvement | BPMInstitute.org
Apache jclouds® :: Home
COSO Framework 2013 & SOX Compliance
SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners
SAS 70, SSAE 16, SOC and Data Center Standards | Data Center Knowledge
SOC 1 & SOC 2 Preparation Checklist | The SSAE 18 Reporting Standard - SOC 1 - SOC 2 - SOC 3
The Cyborg Institute — Cyborg Institute
HIPPA PCI-DSS Policy Mapping Table
Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards
Meeting Compliance Efforts with the Mother of All Control Lists (MOACL)
Sarbanes-Oxley Information Technology Compliance Audit
CIS Controls
Hitask - Easy Project and Task Management for Teams
check_mk/cisco_checkconfigsecurity at master · reca/check_mk · GitHub
Cyberstates 2017
2017 IT Industry Job Market & Salary Trends Analysis | Cyberstates by CompTIA
17 pen testing tools the pros use | CSO Online
HP unveils its insanely upgradeable Z-class workstations
Exxact Corporation
Using GPUs in KVM Virtual Machines
Secure Deployment Guide for NetScaler MPX, VPX, and SDX Appliances
The NeXT Years: Steve Jobs before His Triumphant Return to Apple | Low End Mac
Cybersecurity Firms Underwhelm Despite Increased Investor Interest
Why Equifax’s error wasn’t hiring someone with a music degree
Learn Linux System Auditing with Auditd Tool on CentOS/RHEL
How To Use Ping, fping, and Gping For Varies Purpose In Linux | 2daygeek: Linux Howtos, Tutorials, Guides, Linux Tips & Tricks
How to Query Audit Logs Using 'ausearch' Tool on CentOS/RHEL
Equifax has been sending customers to a fake phishing site for weeks – Naked Security
OSSIM: CIS Critical Security Controls Assessment in a Windows Environment.
Cheat sheet: How to become a cybersecurity pro - TechRepublic
Health IT & Cybersecurity: 5 Hiring Misconceptions ...
Equifax Data Breach: The Essential Protection Guide to Secure Your Data
Powershell Functions for tags | Virtual Me
832 TB – ZFS on Linux – Configuring Storage: Part 3 | JonKensy.com
832 TB – ZFS on Linux – Setting Up Ubuntu: Part 2 | JonKensy.com
832 TB – ZFS on Linux – Project “Cheap and Deep”: Part 1 | JonKensy.com
Calibrate Your Monitor - The Lone Sysadmin
Linked - Tesla Remotely Extended The Range Of Drivers In Florida For Free... And That's NOT A Good Thing
Veritas can reach APAC customers via GDPR | ZDNet
Equifax Breach: Setting the Record Straight — Krebs on Security
How BitPaymer ransomware covers its tracks – Naked Security
Equifax hackers likely in network since March
Hackers hold entire school district to ransom – Naked Security
After massive data breach, Equifax sent victims to fake phishing site for support - TechRepublic
Equifax breach has some calling for a credit reporting industry 'rethink'
A look at how this small business is preparing for the GDPR
SEC Says Intruders May Have Accessed Insider Data ...
Equifax's May Mega-Breach Might Trace to March Hack
Canada’s Tough New Breach Reporting Regulations
SMBs Paid $301 Million to Ransomware Attackers
IDM OIM Blog: How to setup mrepo Redhat 7
How To Find Vulnerable Packages In Arch Linux - OSTechNix
What is Kubernetes? – Marksei
Cloud Design Patterns – Availability – Premier Developer
Health Insurance Premiums: Average Annual Cost $19,000 Family, $6,000 Individual — My Money Blog
FedEx estimates ransomware attack cost $300 million
Experian makes it easy for someone to undo your credit freeze
Equifax Confirms Another 'Security Incident' : The Two-Way : NPR
Following Equifax, Focus On Database Encryption - IT Jungle
Need a Night-Light? | Hackaday
The practical guide to fighting ransomware
New security platform uses live attacks to evaluate risk
Is DevOps the Best Thing to Ever Happen to Security? - Blog | Tenable™
8 best practices for managing software patches - TechRepublic
5 tips for enterprises to ensure their SMB partners don't cause a data breach - TechRepublic
A Modern Hypervisor as a Basis for a Sandbox - Securelist
Hardening Apache Struts with SELinux – DoublePulsar
PCI's Data Security Standards at a Glance
WannaCry and Hollywood hospital ransomware attacks crossed a line for some cybercriminals
Report: Negligent employees are no. 1 cause of cybersecurity breaches at SMBs - TechRepublic
Understand the dangers of OSS? Equifax means you have to
Equifax names interim CSO, CIO;
Heads roll, as it's revealed Equifax's IT team knew about web app vulnerability
Equifax Disputes Report of Undisclosed Breach From March
Security Alert: Cyber Criminals Slip Backdoor in CCleaner to Potentially Spread Malware
An intro to machine learning | Opensource.com
How to use Let's Encrypt to secure your websites | ZDNet
Why Adding Technical Experts to Boards Is Urgent
sysbench Histograms: A Helpful Feature Often Overlooked - Percona Database Performance Blog
Medical Supply Firm Hacked; Log Review Key to Detection
HHS Incident Response Will Be Scrutinized - HealthcareInfoSecurity
The 6 phases of adopting cloud security practices | CSO Online
Siemens' New ICS/SCADA Security Service a Sign of ...
Oracle 12.2 underscores appear in SPFILE - be aware when you flashback
Sizing Windows 2016, Windows 2012 and Windows 10 Virtual Machines | Ask the Architect
Upgrading Debian 8 to version 9 - Fun with virtualizationFun with virtualization
Oracle 12.2 Adaptive Features are enabled in Oracle 12.1.0.2 Windows BPs
Netool.io – A simple to use passive network port analyzer that gives you the information you need.
CentOS 7 Server Hardening Guide | Lisenet.com :: Linux | Security | Networking
On the Beauty of Python's ExitStack — Nikolaus Rath's Website
SSD Caching under Linux — Nikolaus Rath's Website
DSHR's Blog: Attacking (Users Of) The Wayback Machine
The Science Behind Lithium Cell Characteristics and Safety | Hackaday
10 Things You Always Wanted to Know About Arduino
Partner Post: Monitoring of BizTalk Server using BizTalk360 – BizTalk Team Blog
7 More Lesser-known Debugging Tactics for Visual Studio | The Visual Studio Blog
Getting Started in Offensive Security · System Overlord
Whose Fault Is It? (A brief discussion on misconceptions about Equifax) | tisiphone.net
Equifax Hit with Lawsuit
Isilon Tech Refresh - Replacing old NL400 Isilon nodes for NL410's - FastStorage
Equifax Exec Departures Raise Questions About ...
How to implement SharePoint in 5 meetings - SharePoint Maven
7 tips for Linux cluster admins to help keep auditors happy
How to avoid a GDPR compliance audit: Best practices | The Enterprisers Project
Download / use Oracle Database Security Assessment Tool DBSAT
Active Directory Access Control List – Attacks and Defense – Enterprise Mobility and Security Blog
Public cloud has forced change | Virtual Me
After Equifax Hack, Consumers Are On Their Own. Here Are 6 Tips To Protect Your Data : NPR
Equifax stock sales prompt DOJ investigation for insider trading
Equihax: One of the Most Calamitous Breaches of All Time
Equifax data breach: Time to do a 15 minute cybersecurity makeover
ROCK NSM
VMware vSphere and ESXi - Create a 'Logon Banner' | PeteNetLive
Backup and Restore of VCSA 6.5
Integrate new firewalls into Panorama via CLI | sitweak
IOIOBox
Equifax confirms up to 400,000 UK consumers at risk after data breach
Three CIO survival lessons: 'Step up or step aside'
Equifax releases details on cybersecurity breach
AdoptOpenJDK - Open source, prebuilt OpenJDK binaries
7 Cybersecurity Questions Every Leader Should Ask
Update CustomSettings.ini file remotely! | Keith's Consulting Blog
Getting started with Docbook | Opensource.com
Does Equifax Owe Victims a Duty of Care? - Lawfare
Security Communication | Washington | Clear Security Communication
On the Equifax Data Breach - Schneier on Security
What's the Difference Between Zigbee and Z-Wave? Here's Everything You Need to Know
Why the Equifax breach could force executives to finally take cybersecurity seriously - TechRepublic
Connected Medicine and Its Diagnosis - Securelist
InfoSec Handlers Diary Blog - Analyzing JPEG files
Security Communication | Washington | Clear Security Communication
Security Communication | Washington | Clear Security Communication
NBlog - the NoticeBored blog: NBlog September 13 - surveying the corporate security culture
Security Tools for the SMB and SME Segments
Equifax felled by a months-old Apache Struts vulnerability – Naked Security
BlueBorne - the Attack that Can Spread Malware without an Internet Connection
Schumer calls for resignations unless Equifax offers better identity theft protections
European Commission plans cybersecurity overhaul, giving ENISA more power
FTC announces investigation into Equifax data breach
Equifax Hackers Stole 200k Credit Card Accounts in One Fell Swoop — Krebs on Security
Gauging Equifax's Future in Wake of Massive Breach
Top Democrat Likens Equifax to Enron as FTC Launches Probe
CDDC: One Secure Screen for Classified, Secret and Public Networks
RDP Pivoting with Metasploit
Bill creating an Office of Cyber Issues in the State Department proposed
Senate bill calls for free credit freezes after Equifax breach
Open Source Summit: Securing IoT is About Avoiding Anti-Patterns
Caldwell Partners' Cyber Advisory Board Service | Linux Journal
CSC - Elmer
Penny Pinching With Open Source | The Networking Nerd
Active Data Guard services in Multitenant - Blog dbi services
Evil Tester: How to overcome Impostor Syndrome and use your brain's learning mechanisms to improve your public speaking skills
Errata Security: People can't read (Equifax edition)
What the Equifax breach means to me — an end user perspective | CSO Online
Equifax's chief security and information officers are out
Equifax: four simple steps to secure yourself – Naked Security
The Equifax Breach: What You Should Know
Penetration Testing on Remote Desktop (Port 3389)
More fallout from Equifax data breach
10 steps for US multinational employers preparing for GDPR
How to Fail Safe Your Data in the Cloud or When It’s Shared with 3rd Parties
Unsupervised Learning
Step by Step FTP Penetration Testing in Ubuntu
Are US ad tech firms ready for the GDPR?
Equifax breach exposes healthcare vendor vulnerabilities - Modern HealthcareModern Healthcare business news, research, data and events
How does the Equifax data breach affect health care?
Equifax's Colossal Error: Not Patching Apache Struts Flaw
GitHub - A-mIn3/WINspect: Powershell-based Windows Security Auditing Toolbox
Equifax’s Latest Data Breach: Argentina - HealthcareInfoSecurity
antivirus versus antimalware
Checkpoint Research Midyear Cyber Attack Trends 2017
Latest Equifax Bungle: Predictable Credit Freeze PINs
Cynic's Guide to the Equifax Breach: Nothing Will Change
Installing Kali and Metasploitable on VirtualBox » Greenjam94's Infosec Blog
AWS EC2, Default NAT, and Security Groups
The Four Things a Service Business Must Get Right
AWS IAM Security Terminology Primer
Some Quick Takeaways from the 2017 Verizon DBIR
How to Download Your LinkedIn Profile as a Resume
Vizualize.me: Visualize your resume in one click.
SSH: Practitioner Consideration Guidance download
You Can’t Protect Yourself from the Equifax Breach - TidBITS
Unpatched Open Source Software Flaw Blamed for Massive Equifax Breach
Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions - Check Point Research
New tools for healthcare Are They Right For You?
Big List of Ways To Protect Your Credit: Free Credit Monitoring, Credit Locks, Fraud Alerts, and Credit Freezes — My Money Blog
Time Tracking Software with Screenshots & Employee Monitoring
MDISS Launches ‘WHISTL’ | NH-ISAC, Inc. | Healthcare Information Sharing, Threat Intelligence, Healthcare Cybersecurity
Computer Networking — CNP3www 2014 documentation
Vulnerability & Patch Management Program (VPMP)
HL7 Data Interfaces in Medical Environments: Understanding the Fundamental Flaw in Healthcare – Linux Included
HL7 Data Interfaces in Medical Environments: Attacking and Defending the Achille’s Heel of Healthcare – Linux Included
Radiology Confronts Reality of Global Cyberattacks
Absolute vs. Relative Standard of Living: What is Enough? — My Money Blog
Guide to Enterprise Patch Management Technologies
Affordable, editable & professionally-written information security policies and standards based on NIST 800-53 and ISO 27002. Information Security Risk Assessment Template. NIST 800-53 and ISO 27002 versions for PCI DSS, HIPAA, GLBA, FACTA, MA 201 CMR 17, NIST 800-171, DIACAP, NIST Cybersecurity Framework and FedRAMP compliance.
Great Smoky Mountain Railroad
Listener valid node checking | DBA
Configuring VNCR for 11.2.0.4 Oracle RAC – Andy Colvin's Oracle Blog
Extreme slow RDP performance on Windows 2012 R2 server running on VMware ESXi - By Ulrich Krause - eknori.de
Essential Tools for Producing High Quality Podcasts on Linux - Make Tech Easier
Ben Franklin Circles | Transform Your Life, Transform Your World
GIAC Information Security Expert | GSE Certification
SOC 1 (SSAE 16/SSAE 18) and SOC 2 Overview of a Service Organization
https://www.integrigy.com/files/Integrigy_Oracle_Listener_TNS_Security.pdf
Joords Oracle DBA blog: Secure the Oracle Listener
Help your VNX storage engineer: Enable performance data logging! - FastStorage
Securezoo Articles
Terence Luk: Update: Securing Citrix NetScaler VPX to score A+ rating on SSL Labs
12 Easy, Attractive, and Free Infographic Resume Templates
10 Things You Should NOT Put on Your Resume
List of Master of Science (M.S.) in Cybersecurity Degree ProgramsCybersecurity Ventures
Automatically updating the version number in a PowerShell Module – How I do regex | SQL DBA with A Beard
Dependency Walker (depends.exe) Home Page
Understanding Medical Device Security ~ Cyber Thoughts
Cybersecurity and Medical Devices: 'Ducking Bullets'
Ransomware 1H 2017 review: Global outbreaks reinforce the value of security hygiene – Windows Security blog
How to get some free IT training resources? – vMusketeers
Almost half of IT security incidents are caused by company employees, report says
Understand how to extract hashes from SQL server logins before you regret | CQUR...
Evolution of Linux containers | Opensource.com
30 Cybersecurity Skills You Need To Become a Windows Security Pro [slide deck] |...
Aspiring Chief Information Security Officer? Here are some actionable tips from ...
Security and the Board ~ Cyber Thoughts
Insiders: The often forgotten threat ~ Cyber Thoughts
Confessions of a LinkedIn Imposter: We Are Probably Connected | CYBERSECURITY I/...
Turning Cybersecurity into a Strategic Advantage ~ Cyber Thoughts
Microsoft 365 and Enterprise Mobility + Security – Enterprise Mobility and Secur...
How to prevent phishing: 11 tips
Awards
Spafford Recognized With One of the Indiana’s Highest Honors - CERIAS - Purdue U...
IT Governance « Center for Information Systems Research - MIT Sloan School of Ma...
6 Key Slides to Include in Your IT Budget Deck | Apptio
Strategic Alignment - Venkatraman
A strategic approach to IT budgeting
Benchmarking the IT Organization
Cost benefit analysis – some practical examples
Cost-benefit analysis (CBA) - Clinfowiki
Clinfowiki
Benefit-Cost Analysis: The Concise Encyclopedia of Economics | Library of Econom...
Run, Grow and Transform the Business IT Spending: Approaches to Categorization a...
PMAP: Ordering Service | Information Systems & Computing (ISC) | University of P...
Three reasons why ISO20000 certification is NOT ITIL V3 certification | The IT S...
ITIL and ISO 20000
ISO/IEC 20000 and ITIL - The Difference Explained
What is Hardening? - Definition from Techopedia
Medical Device Patch Management Factors for Strategy and Execution
Checks to ensure fail-safe Cyber Security
Harnessing Feedback Loops to Drive Business Agility | CIO
The Agility Loop « The Talent Code
CIOnet
Microsoft Word - Conceptual Foundations of the Balanced Scorecard_3.17.10.doc - ...
What is the Balanced Scorecard?
Canadian Data Privacy Law Part 1: The Private Sector
Andy Neely: What is Servitization?
Servitization: Home
EclEmma - JaCoCo Java Code Coverage Library
Welcome to the SC Midlands Chapter of ISACA Site!
Downtime sucks! Designing Highly Available Applications on a Budget - Tekhead.it
Long Term Data Retention - What do I do? - Tekhead.it
Screensaver Operations 1.5 Released - The Grim Admin
What are the GDPR requirements? | CSO Online
Best HSA Plan Provider For Long-Term “Healthcare IRA” Investing – Morningstar — ...
sysadvent: Day 20 - How to set and monitor SLAs
How to use Vi: a minimalist guide « Tim Anderson"s ITWriting
The Technology chronicle!!!: Cloud Security - Risk factors
The Technology chronicle!!!: Cloud security - CSA domains
Dell Precision 5520 Mobile Workstation review: The Ubuntu Linux laptop for power...
A History of Open Source GIS, from Humble Beginnings to World-Changing Applicati...
How to Secure Your Linux Desktop with Iptables - Make Tech Easier
Pete Finnigan - Oracle and Oracle security information
How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 3...
How Microsoft EMS Can Support You in Your Journey to EU GDPR Compliance – Part 4...
How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 1...
How Microsoft EMS can support you in your journey to EU GDPR compliance – Part 2...
How to Install Snipe-IT (IT Asset Management) on CentOS and Ubuntu
Snipe-IT
EMD GDPR whitepaper
ME Student Page
All About Circuits - Electrical Engineering & Electronics Community
SOC Compliance - Amazon Web Services (AWS)
APWA Uniform Color Code for Marking Underground Facilities
Yocto Project | Open Source embedded Linux build system, package metadata and SD...
PMP Question of the Day - Stay focued on your studies with a daily PMP
CISSP (8 Domain) Certified Information Systems Security Professional
45 CFR Part 164 - SECURITY AND PRIVACY | US Law | LII / Legal Information Instit...
eCFR — Code of Federal Regulations
Quality System (QS) Regulation/Medical Device Good Manufacturing Practices
Studying the Effectiveness of Application Performance Management (APM) Tools for...
Healthcare Cloud Managed Services, Healthcare IT Managed Services - ClearDATA
How to Select A Managed Service Provider as a Healthcare Organization
Managed It Services for Healthcare | Continuum
IT Services for Healthcare Organizations
Managed IT Services for Healthcare
Health Care IT Solutions | Managed Services | McKesson
Need a rack? This is pretty neat. | ServeTheHome and ServeThe.Biz Forums
Planning for a PACS Implementation – Three More Tips | Freeland Systems
Eight Keys to a Successful Implementation of PACS
PACS Academy - Steps to PACS implementation
(91) Can hackers break my heart? | Marie Moe | TEDxVicenza - YouTube
Key considerations when replacing your RIS/PACS | Articles and white papers | Ra...
Open-spec, RPi-style SBC features new Rockchip RK3328
Rock64
You Can Create Your Own Ubuntu 17.04 GNU/Linux Distro Using the Latest ExTiX ISO...
SDRcon at UAS | Unallocated Space
RFP365 | Security FAQ
RFP365 | Reinventing the RFP Process
50 RFP Management Tools for Writing, Presenting and Closing Sales Proposals - Do...
7 Ways to Get Your CEO Fired | CIO
CEOs doesn"t have a manager. Rather, they have three power groups to keep happy: Investors, who are represented by the board; customers, who control revenue, and employees, who control production.
World’s largest hedge fund to replace managers with artificial intelligence | Te...
The Dangers of Hiring a Nice CEO
Mossberg: The Disappearing Computer - Recode
Walt Mossberg’
7 CEOs Give Advice to First-Timers
The most common HIPAA violation: Human error
IT Industry Research and Analysis | Center for Cyber Safety and Education
Medical Internet of Things and Big Data in Healthcare
Meet the Millennials
CookingLight.com - Making healthy taste great
Toward new possibilities in threat management
Used To Be Cool - Fowl Language Comics
4 Paint Colors That Can Boost Your Home"s Value
Gutenberg
HathiTrust Digital Library | Millions of books online
Configuring the Dell/Quest Free/Busy Connector for Lotus Notes and Exchange - Pa...
Configuring the Dell/Quest Free/Busy Connector for Lotus Notes and Exchange - Pa...
Promote a Domain Controller with Windows PowerShell
Converting directly from binary to hexadecimal (video) | Khan Academy
Converting binary and hexadecimal values
Binary, Decimal and Hexadecimal Numbers
Open library
CyberGym
CyberGym Makes Sure You Know What It Really Feels To Get Hit By A Cyberattack
HealthSaaS | The Internet of Things (IoT) Platform for Healthcare
SMART Health IT – Connecting health system data to innovators" apps
SOC 2 Audits - Design Compliance and Security, LLC
EU Compliance and Regulations for IT security Professional
SOX COMPLIANCE - LESSONS FOR EUROPEAN SUPPLY CHAIN ORGANIZATIONS FROM THE US EXP...
Ssae 18 | The SSAE 18 Reporting Standard - SOC 1 - SOC 2 - SOC 3
Prepare your ODROID-C2 from scratch – Carsten Rieger
Odroid C2 Bests Raspberry Pi 3 in Several Ways | Hackaday
Marios" ODROID (C2) Adventures
DIY Dutch Door
From the Canyon Edge: Ubuntu 16.04 LTS Security: A Comprehensive Overview
Open Security Controller: Security service orchestration for multi-cloud environ...
How to create an Internet-in-a-Box on a Raspberry Pi | Opensource.com
[Short Tip] Call Ansible or Ansible Playbooks without an inventory – /home/liqui...
Kiwix
Blockchain: 3 big implications for your company | The Enterprisers Project
4 cool facts to know about FreeDOS | Opensource.com
FinanceProfessor.com: Podcast Episodes for Finance Classes
MartinLanner.com » Install Ansible on Debian 8 (Jessie)
MartinLanner.com » Shrink qcow2 disk for Linux VM in Proxmox
The costs of manual and automated tests – 2nd Meetup Stone Tech Saturday – Ricar...
5 Tips to Nail Your Big Presentation
4 Actions to Build Financial Independence This July 4th
10 Signs of a World-Class Resume
How to Install Gitlab On Debian 9 Stretch Linux - LinuxConfig.org
Create mini Linux servers using the Odroid C2 | Linux.org
Odroid c2
Law Firm IT: Appalachian Institute of Digital Evidence First Annual Conference
Florian"s Blog » Upgrading the ADFS farm behavior level
Alan"s Blog » Blog Archive » Create an AD Drive for Specified Domain
Don K Dennison | dondennison.com
Tymbrel | Smarter Websites | Website Management Platform for Agencies
How Much Mobile Phones Have Evolved Over the Last 20 Years | Technogog
Updating TTRSS feeds | The Cra1gster
To Jumbo or Not to Jumbo? « ipSpace.net by @ioshints
Information security and the generation gap
Monthly Notes 20 – Rule of Tech
vCenter Automated Install | Technodrone
Hackable medical devices and other security threats of the Fourth Industrial Rev...
Top 10 Highlights of FDA’s Draft Guidance on Cybersecurity in Medical Devices - ...
UpGuard | Home
#5 Scheduling Nessus Scans - Top Ten Things You Didn"t Know About Nessus - Blog ...
Processing.org
Word Cloud Generator
Word Cloud
WordCram.org | open-source word clouds for Processing
Microsoft’s Local Administrator Password Solution (LAPS)
Gartner: 5 High-Priority Challenges for GDPR
Strategies to Mitigate Cyber Security Incidents: ASD Australian Signals Director...
-
Infragard
Security Conference Ranking and Statistic
Unfreeze-Change-Refreeze
Lewin"s freeze phases
Unfreeze Refreeze: A Simple Change Model
Running LAPS Around Cleartext Passwords
Microsoft LAPS Security & Active Directory LAPS Configuration Recon – Active Dir...
Number of Working Hours Per Month | Controller"s Office
Assessing IT Control Systems
Applying COSO"s Enterprise Risk Management — Integrated Framework
IT Strategy Committee (ITSC) | Technology @ Berkeley
To Steer or to Strategize –Differences between IT Steering Committees and IT Str...
OpenSCAP Remediation : isimluk
Download Local Administrator Password Solution (LAPS) from Official Microsoft Do...
Cross-enterprise Document Sharing for Imaging - IHE Wiki
IT Landscape for sysadmins
Cyber resilience – Atkins
Project Planning a Step by Step Guide
Git - git-gc Documentation
Simple Wave Generation in Python (and SciPy) | Hackaday
DIRTY CABLES: What’s in that sample pile?
13 Most Important SQL Commands Any Programmer Should Know
Kill the Exhaust, Not Your Lungs with the Fume Coffin | Hackaday
Enhancing the security of the OS with cryptography changes in Red Hat Enterprise...
Securing Industrial Control Systems Against Vulnerabilities and Malware - Blog |...
The OPM Breach Two Years Later: Four Best Practices for Cyber Operational Excell...
Master Your Security Foundation: CIS Vulnerability Management Controls - Blog | ...
DevOps or DataOps Either Way It’s Coming to SQL Server | SQLvariations: SQL Serv...
Securely encrypt single files with AES Protect
How WannaCry Survives - HealthcareInfoSecurity
Why do millennials keep leaking government secrets? - The Washington Post
Send vCenter statistics to Graphite/Gra
Why do millennials keep leaking government secrets? - The Washington Post
Healthcare Industry Cybersecurity Report - Schneier on Security
NBlog - the NoticeBored blog: NBlog June 22 - phishing myopia strikes again
NBlog - the NoticeBored blog: NBlog June 21 - a positive spin on auditing
How to configure Port Mirroring on Hyper-V? | CQURE Academy
ToolsWatch.org – The Hackers Arsenal Tools Portal » BruteSpray v1.5 – Brute-Forc...
ToolsWatch.org – The Hackers Arsenal Tools Portal » Nix-Auditor v1.1.0 – Local A...
ToolsWatch.org – The Hackers Arsenal Tools Portal » MalwareSearch – command line...
Anthem to pay record $115M to settle data breach suit
Talking Cyber-Risk with Executives - Dark Reading
KPMG: Cybersecurity Has Reached a "Tipping Point" from Tech to CEO Business Issu...
The Folly of Vulnerability & Patch Management for ICS Networks
7 elements of a successful security awareness program | CSO Online
Most General Counsels Fret over Data Security
NSA Links WannaCry to North Korea - Schneier on Security
The 4 types of cybersecurity threats and a formula to fight them - TechRepublic
NSA Insider Security Post-Snowden - Schneier on Security
10 steps for a successful incident response plan | CSO Online
Petiti - An Open Source Log Analysis Tool for Linux SysAdmins
A Pentester’s Guide to Group Scoping – harmj0y
WannaCry? You"re Not Alone: The 5 Stages of Security Grief
Top 5 cybersecurity facts, figures and statistics for 2017 | CSO Online
Polyverse
3 mistakes to avoid when learning to code in Python | Opensource.com
How to Write an MBA Thesis
How to use Ansible to manage PostgreSQL | Opensource.com
Clint Boessen"s Blog: For Each Line in Text File Do - Batch Script
How to Install Restyaboard on CentOS 7
Restyaboard
A introduction to creating documents in LaTeX | Opensource.com
Practical OpenSCAP Security Standard Compliance and Reporting
Medical Device Security Privacy Checklist » hipaaprivacy.org
Getting Started with UI Automated tests using (Selenium + Python) | ENGINEERING ...
Medical Device Security: Resources for IT Professionals: Online Safety & Securit...
Medical Device Security: Hollywood vs. Reality | Journal of AHIMA
Medical Devices Infected With WannaCry Ransomware | SecurityWeek.Com
Successful Change Management — Kotter"s 8-Step Change Model • Leadership Thought...
Insecure Medical devices are enlarging surface of attacks for organizationsSecur...
The 8-Step Process for Leading Change - Kotter International
Four Ways to Increase the Urgency Needed for Change
Four Ways to Increase the Urgency Needed for Change -- Part II
Four Ways to Increase the Urgency Needed for Change -- Part I
Standard Ebooks: Free and liberated ebooks, carefully produced for the true book...
Paessler WMI Tester | Paessler
Japanese Last Names, Surnames | japanese-names.org
Increase IIS File Upload Limits — Robert A. Owen - Musician - Network Engineer -...
Multiple Choice Strategies
Multiple Choice Test Taking Strategies
4 ways to outsmart any multiple-choice test - Business Insider
Honda halts Japan car plant after WannaCry virus hits computer network | Reuters
AI Could Test For Autism Before It Even Emerges—But It"s No Cure-All | WIRED
Windows recursive grep command-line - Stack Overflow
Exporting and Importing Sites and App Pools from IIS 7 and 7.5 | MicrosoftPro.nl
fixing The remote host closed the connection. The error code is 0x80070057
Fixing File Upload Size Limit in IIS 7 | To Hell in a Handbasket
Health Care Industry Cybersecurity Task Force Report: Analysis and Recommendatio...
Tips on Taking Multiple-Choice Tests
Amazon’s New Customer – Stratechery by Ben Thompson
YARA - The pattern matching swiss knife for malware researchers
HHS targeting outdated regs in wake of damning cybersecurity report, WannaCry | ...
Oracle Database 12c Patching: DBMS_QOPATCH, OPATCH_XML_INV, and datapatch
Rugged DevOps: Team up release, security engineers for more secure code
Rugged Software Manifesto
Information Security and Compliance Explained | FRSecure
SQL Tuning Health Check (SQLHC) | Oracle DBA Montreal
A healthy way to do an Oracle database health-check | Carlos Sierra"s Tools and ...
Gray failure: the Achilles’ heel of cloud-scale systems | the morning paper
Why your encrypted database is not secure | the morning paper
Notes from OWASP Helsinki chapter meeting #31 – Rule of Tech
Scott Forsyth"s Blog - Why is the IIS default app pool recycle set to 1740 minut...
Cyber security is more important than Brexit in boardroom talks
Writing Your College Admissions Essay? These 14 Tools Make It a Breeze
Metadata Investigation : Inside Hacking Team – SHARE LAB
Digital organizations face a huge cybersecurity skills gap | VentureBeat | Secur...
Security liability is coming for software: Is your engineering team ready? | Tec...
BA says IT collapse came after servers damaged by power problem | Reuters
How to do well in ISACA CGEIT Exam when preparation time is short - few practica...
Open-Access Medical Image Repositories - aylward.org
Medical Imaging Talk Blog: Covering News & Advancements - McKesson | News and in...
Enterprise Imaging: How to Increase the Security of DICOM Servers
Oracle Live SQL - Scripts and Tutorials
OJVM PSU | Saroj Subramanian
Computer Security Incident Handling Guide
Cyber Threat Analysis
Business Insurance News, Analysis & Articles
eRiskHub - Welcome to the eRiskHub®
Security Risk Assessment Tool | Providers & Professionals | HealthIT.gov
Guidance on Risk Analysis | HHS.gov
DOTmed.com - Discussing the FDA"s examination of third-party providers at AAMI
(Archived) The HIPAA Security Rule Toolkit - NIST
Cyber Security Self-Assessment Guidance
Cybersecurity | Homeland Security
CSIRT, Sample Policies
POLICY 604-01: CYBER SECURITY INCIDENT RESPONSE
Maine Cyber Security Center
Small Business Cyber Security Guide
Passing the CISSP Exam | Chris Neudecker is helping you learn
More study help and downloading flash streaming podcast as mp3s - Certification ...
Cyber Security Training Center, Ft. Detrick
My CISSP Experience - A Study Plan Memoir
Home | Bromium
Cyber Security Training Center, Ft. Detrick: Student Stuff !!
HR Insights Blog | Span of Control: How Many Employees Should Your Supervisors M...
The Fake News Machine: How propagandists abuse the internet
Wazuh · Open Source Host and Endpoint Security
More EMC VNX caveats – Recovery Monkey
EMC VNX Best Practices Whitepaper
Information Security: GDPR Data Breach - A Job for IT or HR ?
Interactive currency-comparison tool: The Big Mac index | The Economist
Oracle Database Security: Beyond checklists
Security Assessment Template
Cybersecurity: Make MDS2 part of the procurement process – The Journal of Health...
The Noun Project
Fixing MySQL Bug#2: now MySQL makes toast! - Percona Database Performance Blog
Open-Source Icons
OCR Issues a Cyberattack Response ‘Checklist’
Outdated operating systems triple the risk of a data breach
Risk Assessment Toolkit | HIMSS
Security Risk Assessment | Providers & Professionals | HealthIT.gov
Cybersecurity Framework Draft Version 1.1 | NIST
http://csrc.nist.gov/publications/PubsSPs.html
SOC Report Type 1 vs. Type 2 | SOC 1, 2, 3 Reporting Definitions | Assurance Con...
VA OIG: Poor IT security puts VA"s financial info at risk
VMware CPU Co-Stop and SQL Server Performance | Convergence of Data and Infrastr...
The biggest healthcare breaches of 2017 (so far) | Healthcare IT News
Why Employers and Employees Should Be Wary of BYOD
Profile of a rogue insider cyberbreach | CSO Online
What"s Involved in a New STIG Release? - PeteWhoDidNotTweet.com
ESXi DCUI Shutdown vs vCenter Shutdown of a host
Crowdsourcing application security closes the automated assessment gap | CSO Onl...
aS provider they help iden
DevOps & SecOps: The Perks of Collaboration - Dark Reading
British Airways blames IT meltdown on human error
Beginner"s Guide to SQL Injection (Part 1)
Printer Tracking Dots Back in the News | Electronic Frontier Foundation
Inside the WannaCry Ransomware Outbreak - HealthcareInfoSecurity
Cybersecurity Reconsidered: A New Look at Exfiltration
Securezoo Articles
Your Essential Guide to Cyber Liability Insurance - Heimdal Security Blog
Master Your Security Foundation: Harden Your Systems - Blog | Tenable™
NetworkSecurityUsingntopng - NetworkSecurityUsingntopng.pdf
Can"t Find Qualified People - EtherealMind
How and why to hire a CISO | CSO Online
Creating Virtual Machines in KVM: Part 1 | Linux.com | The source for Linux info...
Folder vs. Library in SharePoint - SharePoint Maven
Errata Security: How The Intercept Outed Reality Winner
Sending pfSense logs to the DShield project – Linux Included
Faster Where-Object In PowerShell | chentiangemalc
Security Onion Cheat Sheet – Chris Sanders
Search DHCP for MAC address | Nick"s IT Crap
netsh dhcp server dump | find /i”0123456789AB”
Bleeding edge: The intersection of Bitcoin and cyber-security – David Vassallo"s...
Healthcare industry most targeted by cyber attacks
Wireless pacemakers could make life easier for heart patients
Science Fiction Book Report Writing Tips | Technogog
Don"t forget latency when you calculate network performance
For Those Who Want to Lead, Read
Why Leaders Must Be Readers
ISO 38500 (ISO38500) IT Governance Standard
QuickFix: Add additional CDs (with mounts) to Packer VMs | Steph van Schalkwyk |...
Dash · Dash
Cybersecurity
Medical Device Security Considerations – Case Study
Wildcards in Windows – Jeremy Kuhne"s Blog
Understand Linux Load Averages and Monitor Performance of Linux
Big List of Scary Personal Data Websites + Opt Out Info — My Money Blog
https://mihin.org/wp-content/uploads/2013/09/Final-1Q2013-Cyber-Security-White-P...
Networked medical device cybersecurity and patient safety: Perspectives of healt...
Healthcare hearing illustrates why cybersecurity is a public safety issue | TheH...
Best Practice Process to Assure Confidence in the Transmission of Data for Mobil...
Sun Tzu"s "The Art of War" for Cybersecurity. - Infosecurity Magazine
Why am I a huge fan of COBIT? | Escoute
Blocking and Tackling Unauthorized Access: Tenable.io and the 2017 Verizon DBIR ...
Medical Devices: Care Benefits vs. Cybersecurity Risks
The Not-So-Delicate Art of Aligning Business Risk Management with IT SecurityWeb...
The best cyber security books out there, chosen by over 20 experts - Heimdal Sec...
The 27 best IT and tech memes on the Internet - Page 4 - TechRepublic
Security of medical devices ‘is a life or death issue’, warns researcher – Naked...
InfoSec Handlers Diary Blog - Analysis of Competing Hypotheses, WCry and Lazarus...
FBI Tech Tuesday: Building a Digital Defense with an Email Fortress — FBI
Why security leaders need to partner with their insurance companies | CSO Online
Get started with machine learning using Python | Opensource.com
Migrating WordPress From One Server To Another | PeteNetLive
The Advantage Of Being A Little Underemployed
The cost of cyber attacks will rise to $8 trillion in five years
Unsecured IoT devices pose major security risk
Implementing IPv6 In A Home Network - Tips & Pitfalls
Remote Desktop Software for Secure Access | BOMGAR
Cybersecurity Supply And Demand Heat Map
Build A High-Performing Team In 30 Minutes
CISSP-OpsSecurity-12 Flashcards | Quizlet
6 Principles For Building A Killer Team
7 Habits of Extraordinary Teams | Inc.com
7 Security Measures to Protect Your Servers | DigitalOcean
Automatic Security Updates: CentOS - Servers for Hackers
Testing Ansible Web App Roles with Selenium - Silly Bits
HTTP For the Good or the Bad
Setup Squid3 Proxy Server on Debian - Vultr.com
Install and Configure Squid3 Caching Proxy on Debian Wheezy
Squid Proxy Server Configuration in debian
Car chess set - Album on Imgur
3WoO: Alerting on DNS (IP Address) changes | Daniel Cid
M. E. Kabay Web Site
Advanced Search
zfsu: ZFS utils for offsite backup, retention and maintaining a slow mirror - Ph...
Gradle Build Tool
10 Useful Ubuntu Keyboard Shortcuts That You Might Not Know
InfoSec Handlers Diary Blog - File2pcap - A new tool for your toolkit!
CyberChef
British Airways IT failure cancels many flights out of London (updated)
Synopsys Report Final - medical-device-security-ponemon-synopsys.pdf
Pacemaker Ecosystem Evaluation.pdf - Google Drive
Buttercup
Homeland Security Secretary John Kelly on Battling WannaCry
Chipotle finds malware exposed credit card info across the US
SMB 2 and SMB 3 security in Windows 10: the anatomy of signing and cryptographic...
Technical notes, my online memory: Switching yubikeys
Brendan"s blog. Brendan Gregg"s professional blog
Strategies to Mitigate Cyber Security Incidents: ASD Australian Signals Director...
The Proper Ways to Discuss Salary in a Job Interview
5 Human-Centered Takeaways from the SANS SOC Survey – Chris Sanders
Hardening your web server’s SSL /TLS ciphers – Premier Developer
InfoSec Handlers Diary Blog - What did we Learn from WannaCry? - Oh Wait, We Alr...
Kentucky workers comp carrier survives ransomware | CSO Online
MolinaHealthcare.com Exposed Patient Records — Krebs on Security
Ethernet is 44 Years Old - EtherealMind
NIST SP 800-171: The Compliance Window is Closing Fast - Blog | Tenable™
DFARS
Protecting Medical Devices from Ransomware: A Critical Step
Big Settlement in Privacy Case Impacting 2 Patients, HIV Data
Medical Devices Fall Short in Security Best Practices
You Have One Year to Make GDPR Your Biggest Security Victory Ever
About ASIS NYC | New York City Chapter
Canadian Cyber Incident Response Centre (CCIRC)
Cyber Security
One-Pan Vegan Dishes For Meal Prep | SELF
minced
Leitner Portal
The Cost of Retaining Aging IT Infrastructure
ISACA® CGEIT® - Glossary (EN) Flashcards | Quizlet
cgeit -Framework Flashcards | Quizlet
M-CEITA
Minimalist Baker | Simple Food, Simply Delicious
Microsoft Security Only Quality Update
Further simplifying servicing models for Windows 7 and Windows 8.1 – Windows for...
NVMe 1.3 Specification Published With New Features For Client And Enterprise SSD...
Transformation and turnaround in cybersecurity: Healthcare payers and providers
Applying the Goals Cascade to the COBIT 5 Principle Meeting Stakeholder Needs
Why hospitals are so vulnerable to ransomware attacks - May. 16, 2017
WannaCry Ransomware Outburst
Wannacry Ransomware | Europol
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
EternalRocks
HITRUST Update Regarding WannaCry Attack on Healthcare Sector - HITRUST
Hatsize Cloud Based Training Labs - Hatsize
ORA-06512 ‘DBSNMP.BSLN_INTERNAL’ | Dbhk"s Blog
Dalai"s PACS Blog
Packer & Vagrant Tutorial: Build Virtual Machines | Codeship | via @codeship
CyberWire Podcast | ObserveIT
FDA, Industry Look for Gaps in Cybersecurity
Netcat Tutorials for Beginner
Basin Buddy | Cool Tools
Remotely disable Network Level Authentication (NLA) | Richard Skinner
psexec \\VMNAME -u VMNAME\ADMIN_ACCOUNT -p PASSWORD reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp” /f /v SecurityLayer /t REG_DWORD /d 0
Learn Anything In Four Steps With The Feynman Technique
1. Pick a topic you want to understand and start studying it. Write down everything you know about the topic on a notebook page, and add to that page every time you learn something new about it.
Seth"s Blog: Three ways to add value
Windows Defender Antivirus VDI deployment guide | Microsoft Docs
What was the IBM PS/2? - The Silicon Underground
The Need for IT Operations Agility: Lessons of WannaCry – DiscoPosse.com
WannaCry–Everything You Need to Know | Technogog
Windows AMIs Without The Tears
Using Vagrant to Build a Manageable and Sharable Intrusion Detection Lab
Provisioning Vagrant Windows Environments with PowerShell Desired State Configur...
Best Practices with Packer and Windows
HHS Ramps Up Cyber Threat Information Sharing
ToolsWatch.org – The Hackers Arsenal Tools Portal » hsecscan – HTTP Headers Scan
ToolsWatch.org – The Hackers Arsenal Tools Portal » ProcDOT v1.2 – Visual Malwar...
ProcDOT
5 Security Lessons WannaCry Taught Us the Hard Way
Linfo - Shows Linux Server Health Status in Real-Time
10 Useful Tips for Writing Effective Bash Scripts in Linux
InfoSec Handlers Diary Blog - WannaCry? Do your own data analysis.
chef-windows-hardening 0.9.0 is released · DevSec Hardening Framework Blog
College and Infosec: To Degree or not to Degree? | tisiphone.net
ICS-CERT_FactSheet_WannaCry_Ransomware - ICS-CERT_FactSheet_WannaCry_Ransomware....
How to scan for machines vulnerable to WannaCrypt / WannaCry ransomware
Security is a Shared Responsibility - Thomas LaRock
General thoughts about patching | rootpool
WannaCry - Protect Yourself | PeteNetLive
OpenStack Gets...Easier | Linux Journal
Preparing Data for Machine Learning | Linux Journal
Machine Learning Everywhere | Linux Journal
Teaching Your Computer | Linux Journal
Trump’s cybersecurity order delivers nothing but more surveillance
MISSION: CISSP - The Epic Exam Experience | Fady Adel A. Assaad | Pulse | Linked...
Player 3 Has Entered the Game: Say Hello to "WannaCry" - Cybrary
UNM4SK3D: WannaCry, Bell Canada, and CIA - Cybrary
Disable SMB v1 in Managed Environments with Group Policy – "Stay Safe" Cyber Sec...
Stop using SMB1 | Storage at Microsoft
Get VAGRANT UP and Running in No Time ― Scotch
Vagrant: What, Why, and How
How the 21st Century Cures Act Impacts Medical Device Software
WannaCrypt ransomware worm targets out-of-date systems – Windows Security
WannaCry benefits from unlearned lessons of Slammer, Conficker – Naked Security
WanaCry Shows a Operational and Human Problem
Uiwix Ransomware Follows WannaCry"s SMB-Targeting Lead
Uiwix
Performance Co-Pilot
Weekend Project: Intrusion Detection on Linux with AIDE | Linux.com | The source...
WannaCry – Jithin"s blog
Oracle Public Yum Server
RPM Command: 15 Examples to Install, Uninstall, Upgrade, Query RPM Packages
Research Overview » Electronics Research Group
S.C. Gov. Henry McMaster assembles cybersecurity task force to address holes in ...
FDA on Cybersecurity for Medical Devices
How to use Sanoid to recover from data disasters | Opensource.com
FDA Cites 12 Hospitals That Didn"t Disclose Injuries and Deaths Linked to Medica...
WannaCry Ransomware Infected Actual Medical Devices In American Hospitals
Long Before "WannaCry" Ransomware, Decades Of Cyber "Wake-Up Calls" : All Tech C...
FAQ: Are you in danger from the WannaCry ransomware? | InfoWorld
TRACIE | Healthcare Emergency Preparedness Information Gateway
HHS Update #4: International Cyber Threat to Healthcare Organizations (Revised)
HHS Update #3: International Cyber Threat to Healthcare Organizations
HHS Update #2: International Cyber Threat to Healthcare Organizations
HHS Update: International Cyber Threat to Healthcare Organizations
UPDATED: #WannaCry #WCry Ransomware: an International Cyber Threat | HIMSS
IPv6 in the IPv6 in the Department of Defense
Java Melody
Admitting Your Weaknesses And Hiring To Support Them
Eric P. Bloom: Hire to your weaknesses, not your strengths
The worm that spreads WanaCrypt0r - Malwarebytes Labs | Malwarebytes Labs
DICOM Library - Anonymize, Share, View DICOM files ONLINE
Box DICOM - Medical images for the cloud
How I accidentally stopped a global Wanna Decryptor ransomware attack | Ars Tech...
System People Practices Partners Things | The IT Skeptic
National Cybersecurity & Communications Integration Center | Homeland Security
Cyber Threat XChange (CTX) - HITRUST
The Certification Commission for Health Information Technology (CCHIT®)
Disable SMB Version 1.0 in Windows 10 - RootUsers
Steps to Enable and Disable SMBv1, SMBv2, and SMBv3 in Windows Servers
North Korea implicated as source of global cyber attack | BreakingNews.ie
Public Workshop - Cybersecurity of M...
Fusion Center Locations and Contact Information | Homeland Security
South Carolina Information & Intelligence Center (SCIIC)
Combatting the Massive Wave of WannaCry Ransomware | HL Chronicle of Data Protec...
Cloud-based Governance, Risk and Compliance Solutions
Microsoft PKI Planning and Deploying Certificate Services Part 2 | PeteNetLive
Microsoft PKI Planning and Deploying Certificate Services | PeteNetLive
PaulT : Home
Ansible Life
Car Hacking: The definitive source
One for the history books: 2016"s year in DDoS attacks
Using a Makefile with Markdown Documents · Scott"s Weblog · The weblog of an IT ...
The Maturation of Cybercrime - HealthcareInfoSecurity
NIST Issues Draft Guidance for Wireless Infusion Pumps
Security Scoring and Grading for Container Images - Red Hat Customer Portal
How 4 Types of Cyber Threats Break Your Online Security [INFOGRAPHIC] - Heimdal ...
Website Flaw Let True Health Diagnostics Users View All Medical Records — Krebs ...
FDA Ramping Up Digital Health Cybersecurity Efforts
Host Profiles CLI
Master Your Security Foundation: Know Your Software - Blog | Tenable
Install the CORE Network Emulator from source code | Open-Source Routing and Net...
Ara: ansible run analysis | Frits Hoogland Weblog
IBM Domino - The absolute definition of elegance in architecture and operation
ssh_scan - Verifies Your SSH Server Configuration and Policy in Linux
Research
vSphere 6.5 – Upload log bundles to VMware direct from the vSphere Web Client
3 Trends Driving the Need to Improve Your Third Party Cyber Risk Management (TPC...
TPCRM
Scan Website Vulnerability using Uniscan (Beginner Guide)
5 Ways to Directory Bruteforcing on Web Server
The Enterprise IoT Security Checklist for Today - and Tomorrow
GDPR: Ignore It at Your Own Risk
iso27k Toolkit
Cloning and Snapshots on vSAN when policy requirements cannot be met - CormacHog...
Orchestration with MCollective | Linux Journal
New Ansible os-, ssh- and mysql-hardening releases · DevSec Hardening Framework ...
Errata Security: Some notes on Trump"s cybersecurity Executive Order
NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Inter...
Top 3 Ways to Win the Deal with A Live Sales Demo | 3Sharp
SQL Server 2017 Showplan enhancements – Blog do Ezequiel
NHS hospitals hit by ransomware attack
One in four European businesses don"t know GDPR is coming
Gray Consulting | Re-Engineering Medical Imaging Since 1991
How to Insert a Checkmark in Microsoft Word
12 Most Useful Google Chrome Browser chrome:// Commands
How would you plan a network migration?
InfoSec Handlers Diary Blog - What Can You Learn On Your Own?
Boston Fed conference: Security still comes down to the basics | CSO Online
Is it ethical to do constant criminal background checks on employees?
Turns out, pacemaker security is terrifying
The Economics of Ransomware - HealthcareInfoSecurity
Homeland Security Issues Warning on Cyberattack Campaign
Ransomware Defense: The Do"s and Don"ts - HealthcareInfoSecurity
Best Practices for Addressing Vulnerabilities
Getting Started with Foreman: Part 3 | BeryJu.org
The Cyber-Committed CEO & Board
CEOs and boards should do these three key things:
Healthcare Breaches Hit All-Time High in 2016
How to compare SAP user roles « SAP Basis Cafe
RSUSR050
A Better Way to Measure Cyber Risks - HealthcareInfoSecurity
Stop Wi-Fi Thieves: How to Secure Your Wi-Fi From Neighbors Stealing It
SharePoint: Best practices for uploading more than 5000 items to a library/list ...
Friday Fun: Listing WMI Namespaces
IIS Services: HTTP.sys, W3SVC, WAS, W3WP, oh my! – WebApps
The Best Twitter Cybersecurity Accounts You Should Follow - Heimdal Security Blo...
InfoSec Handlers Diary Blog - The story of the CFO and CEO...
Red Hat CEO: Planning is Dead
Docker Enables Polyglot Shops - via @codeship | via @codeship
Kubernetes – Overview – Fabricio Sanchez"s Blog
Cisco and Viptela – The Price of Development Debt | The Networking Nerd
DevOps success: 4 reasons teamwork comes first | The Enterprisers Project
aldeid
Minimum Security Standards | University IT
Improving File Integrity Monitoring with OSSEC - /dev/random
How to Setup osquery to Monitor Security Threat on Ubuntu
ssh_scan: A SSH configuration and policy scanner for Linux and UNIX server – nix...
Why Remote Workers Are More Efficient Than Traditional Desk Employees - Business...
JXRay - See through your application - Home
Diagnostic Imaging Appropriateness Tools in Primary Care
Welcome to the Joint Department of Medical Imaging
JDMI | medical-imaging.utoronto.ca
Check_MK Nvidia
(52) JDMI develops Coral Viewer to replace eFilm - YouTube
JDMI’s peer review system gaining traction across province | Canadian Healthcare...
Packer templates for creating a basic malware analysis lab, as per the recommend...
Vagrant Windows Boxes and Puppet
Bento
Packer templates for building minimal Vagrant baseboxes
CGEIT - Certified in the Governance of Enterprise IT
How to Become CGEIT Certified
Vuls: VULnerability Scanner
Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
Vulners - Vulnerability Data Base
Defending against medical device hacker threat, MedCrypt CEO seizes an opportuni...
QuiO
MedCrypt - Medical Device Security as a Service
CGEIT Exam Job Practice: 2013
Employee Benefit Research Institute | EBRI
Is Intel’s Management Engine Broken? | Hackaday
RaSCSI
Cybersecurity Awareness Training | ESET
Security Awareness Training | KnowBe4
Ransomware"s biggest target is the healthcare sector
The gig economy has flipped the job market on its head
Containers are not VMs - Docker Blog
Moby
Quickly build a Windows lab with VirtualBox, Packer, Vagrant and Chocolatey | Th...
INetSim: Internet Services Simulation Suite - Project Homepage
USAFacts
VMTraining Blog: Unlocking and resetting the VMware vCenter Single Sign-On admin...
Help! Can not reset administrator password. |VMware Communities
Changing the vCenter Server database user ID and password (1006482) | VMware KB
VMware: vCenter 5.x/6.x: How to reset administrator@vsphere.local account passwo...
How to reset administrator@vsphere.local password in vCenter 5.5 | elgwhoppo"s v...
Cleaning Schedule Architecture: Building One that Works for You
pander: An Pandoc writer in R
All+you+need+is+text+–+Markdown+(via+pandoc)+for+academia+|+Sustainable+Research
Bash getopts: reading $OPTARG for optional flags? - Stack Overflow
syncope.apache.org
Official Windows 10 / 8.1 / 7 ISO Installation Media Download Links (Microsoft T...
LUKS: Add a Backup Key, Backup, Restore and Delete LUKS Volume Header
Marie Moe on Medical Device Security
Alan"s Blog » Blog Archive » ShareEnum Alternative
Rotate Oracle logs – My Linux Place
Unmount and Clean up a Wim Image using DISM
Capturing and Alerting on SQL Server Configuration Changes
Triangulation 238 The Future of the Professions
Taiga.io
Making Diagrams with graphviz
Keywhiz
2017.Canadian.Physician.Leaders.Conference.pdf
WordPress Migration: Easy as A-B-C, 1-2-3 | Microsoft Azure Open Source Developm...
There are four types of AI: Here"s how you can recognize them
HP Elitebook 8440p overheating - The Silicon Underground
We Can’t Control Devices and People, but We Can Control the Network
Evil Tester: Do you know what your framework is doing? A quick use of WebPageTes...
Evil Tester: Notes from Glenford Myers Advances in Computer Architecture
TLDR; Abstractions are not new, have never been easy, and have always been important when architecting our Systems.
Evil Tester: Notes on Structured Analysis and System Specification by Tom Demarc...
TLDR; Time unfortunately has not been kind to this - it still has moments of well worth reading but it also has sections where you hope no-one follows the instructions lest they doom the project, but the chapter on estimation is well worth reading.
7 tips for effectively rolling out emergency patches - TechRepublic
5 ways to make sure users comply with patch releases - TechRepublic
Server Side Injection Exploitation in bWapp
bWapp
How to Detect Sniffer in Your Network using shARP
shARP
7 Pieces Of Career Advice To Cybersecurity Newbies From Renowned Experts | CQURE...
Bernard Layton
SOC-as-a-Service: All the Benefits of a Security Operations Center Without the H...
What happens when a vendor doesn’t patch its software? – Naked Security
Supporting improved cyber security across health and care - NHS Digital
CERT/CC issues vulnerability advisory for "Equation Group" exploit targeting IBM...
HHS Smacks Heart Monitoring Firm with $2.5 Million Settlement
(ISC)² Delivers Recommendations to White House Chief of Staff, Urging Prioritiza...
Tracking Active Directory Operations with PowerShell Commands
What’s in my (Hacking Con) bag? | tisiphone.net
2017 Open Source Security and Risk Analysis | Black Duck Software
CHICKEN LETTUCE WRAPS recipe | Epicurious.com
Installing Gentoo Linux on ZFS with NVME Drive (Part 2) – Guy, Robot
Install Kali Linux Tools Using Katoolin In Linux - OSTechNix
katoolin
Puppet : Automate/Reset first time root password for MySQL 5.7.x – All Linux Use...
ShellCheck - A Tool That Shows Warnings and Suggestions for Shell Scripts
Remembering WDBS, the Campus Radio Station of Duke University
Fired IT workers to file discrimination lawsuit | Computerworld
Proactively Monitoring Departmental Clinical IT Systems with an Open Source Avai...
Chipotle investigating breach of payment system | TheHill
HL7D
Raspberry Pi: Top 20 projects to try yourself | IT PRO
Early Nintendo programmer worked without a keyboard | Ars Technica
Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the N...
David A. Wheeler"s Personal Home Page
Home : I Do Imaging
Where do CISOs fit in the healthcare C-suite? | Healthcare IT News
Twitter Community Management Dashboard | Twitter Marketing Tool
How can I monitor DICOM and HL7 with PRTG? | Paessler Knowledge Base
How can I monitor DICOM and HL7 with PRTG? | Paessler Knowledge Base
HHS cybersecurity center to help healthcare orgs fight cyberthreats | Healthcare...
Open Source Software - Is it a Viable Alternative for a Healthcare Institution?
Using Mind Maps instead of Test Cases ! – Ganesh’s Blog
Tuturial: mbedTLS SSL Certificate Verification with Mosquitto, lwip and MQTT | M...
Two men admit involvement in the TalkTalk 2015 hack
Air Force enlists hackers to hunt bugs in its site
34 percent of US government agencies have had data breaches in the last year
Excel Macros Help You Automate Your Spreadsheets: Here"s Where to Find Them
Dataplicity: Remotely control your Raspberry Pi
DICOM in Python: Importing medical image data into NumPy with PyDICOM and VTK | ...
Can LinkedIn"s new apprenticeship program help diversify its workforce?
Hackers exploited Word flaw for months while Microsoft investigated | Reuters
Resources | SecureState
Brewing in Beats: Collecting auditd logs | Elastic
SecureState Blog
Jon Ramsey, Chief Technology Officer for Dell SecureWorks, discussed the ways to...
“If you protect your toothbrushes with equal zeal as your diamonds, you’ll lose fewer toothbrushes and more diamonds.” You can’t protect yourself in all places at all times from all things, so it’s about making the right decisions on what to protect from whom and when.
spagobi | 100% open source Business Intelligence
Passive Optical LAN | Nokia Networks
Password Expiration - Enable or Disable - Windows 7 Help Forums
9 Easy Ways to Break a Cisco Network
Here are some common mistakes network engineers make on Cisco gear that cause unexpected outages.
VMware NSX in Redundant L3-only Data Center Fabric « ipSpace.net by @ioshints
Gigabit card only connecting at 100mbps? Here"s the fix. - The Silicon Undergrou...
Windows network security now easier with osquery | Trail of Bits Blog
augmentd | Augment Your Security
rapid7
FIRST - Improving Security Together
André de Carvalho - Software development thoughts and more...
Audit File Access and Change in Windows
Customized File Monitoring with Auditd | Linux.com | The source for Linux inform...
Welcome to our new Open Source Lead | Government technology
Building tools to provision our machines | Technology at GDS
Anna Shipman
Anna Shipman : JFDI
A Gentle Introduction to XDS-I.b – Healthcare Interoperability
Qualio: Life Sciences Compliance Platform | QMS Software
mGSD - mGSD
Healthcare Interoperability – The musings of a HealthCare CIO/CTO
Load Balancing Medical Imaging Systems: PACS, VNA, DICOM, XDS & HL7 - Loadbalanc...
ITIL news - ITIL Version 3 ITIL Version 3 UK ITIL Version 3 System ITIL Version ...
#TipOfTheDay Enable Auto-Save in Lotus Notes
Hackers are going for your healthcare data
Life on Contract: Hacking your Taxes | Hackaday
Neural Networks: You’ve Got It So Easy | Hackaday
What You Learn Hiking The Whole Appalachian Trail : NPR
etcher
Firms worldwide say GDPR could harm their business
DOCOVA.com – Migrate Notes to DOCOVA Blog Series Part 1: What gets migrated?
How High Speed Communications Networks Are Making Remote Surgery Realistic - Mot...
High-frequency trading: when milliseconds mean millions - Telegraph
Hawaii’s online gaming curse | The Outline
Lotus Notes Deployment Tool for Numerous Platforms
Cybersecurity for Networked Medical Devices Containing Offthe-Shelf (OTS) Softwa...
Quotations for CS1
Richard Pattis Home Page
How I Got Started in InfoSec – JP
Real World Computing: Using SharePoint with OneDrive as a File Server (for Ex-Do...
John"s Network Oops - As Seen On Reuters - MovingPackets.net
DOUBLEPULSAR Infections On The Rise | Rendition Infosec
Top 10 ways to achieve agile security | CSO Online
Oracle fixes Struts and Shadow Brokers exploits in huge patch release | CSO Onli...
ITIL Certifications | AXELOS
Free Certification Practice Questions - GoCertify
ITIL Practice Exam | Accelerated Ideas
itil Flashcards - Cram.com
PRINCE2 Software and Methodology led Project Support Offices
Greek Yogurt with Warm Black & Blueberry Sauce Recipe | MyRecipes
Turkey Burgers with Special Sauce Recipe | MyRecipes
Creole Tomato Salad Recipe | MyRecipes
BBQ Chicken with Peach and Feta Slaw Recipe | MyRecipes
Fresh Corn Cakes with Summer Salsa  Recipe | MyRecipes
Haricots Verts & Grape Tomato Salad & Crème Fraîche Dressing Recipe | MyRecipe...
Chicken with Sun-Dried Tomato Cream Sauce - Damn Delicious
Grilled Peach, Blueberry, and Goat Cheese Arugula Salad | Two Peas & Their Pod
Best Sausage, Cheese, and Basil Stuffed Tomatoes Recipe-How to Make Sausage, Bas...
Gyros with Greek Chicken, Tzatziki and Homemade Greek Pita Flatbread - Cooking C...
Best Strawberry Balsamic Pasta Salad - How to Make Strawberry Balsamic Pasta Sal...
Baked Macaroni and Cheese | The Country Contessa
Best Cheesy Chicken Alfredo Soup - How to Make Cheesy Chicken Alfredo Soup
Tater Tot Lasagna - Totsagna Recipe
Garlic-Knot Pizza Bake Recipe - Delish.com
Wall Street IT Engineer Hacks Employer to See If He Will Be Let Go
Some Independent Software Verification Techniques Used within the FDA Regulatory...
Risk Management and Cybersecurity for Devices that Contain Software
Latest Report on National and International Cyber Security Exercises
Report: CIA, FBI hunting for insider who gave docs to WikiLeaks | TheHill
Cyber Security Online Courses | Stanford Center for Professional Development
Stop Writing Crap Code! Or You Just Might Find Yourself in Court - Tactical Netw...
FreedomBox/Hardware/Debian - Debian Wiki
Take back your data
Education Commission of the States--Helping State Leaders Shape Education Policy
ITIL Access Management: Granting access rights to those in need | 20000Academy
Opencanary
GoJS® Diagramming Components for HTML5/Canvas, by Northwoods Software®
Learn a Python script for automating the process of publishing podcasts | Openso...
Anbox - Android in a Box
Simple Server Hardening, Part II | Linux Journal
Dealing With Real-Life, Everyday Security Threats | FOSS Force
Evil Tester: Normal is the rarest of all states
Normal is the rarest of all states
Grok the GIL: How to write fast and thread-safe Python | Opensource.com
Tarsnap - Online backups for the truly paranoid
Taskwarrior - An Easy Way to Manage TODO List From The Command Line | 2daygeek
Understanding Shell Initialization Files and User Profiles in Linux
Blogging in Markdown with Jekyll | Opensource.com
How to build a static website with Jekyll | Opensource.com
Smaller Java image using Docker multi-stage build
PowerShell Summit 2017 Demo Files
Privacy and Windows 10: Your Guide to Windows Telemetry
Better Linux Disk Caching & Performance with vm.dirty_ratio
vm.dirty_background_ratio = 5 vm.dirty_ratio = 80
Winston Salem Maker Lab: IR Volume Control for Sonos Connect AMP
Networking: Pin the Tail on the Headless Raspberry Pi | Hackaday
SQL Server Performance Baselining Reports Unleashed for Enterprise Monitoring !!...
Flying The First Open Source Satellite | Hackaday
Prisoners Build DIY Computers and Hack Prison Network | Hackaday
When you have a lot of time on your hands and little responsibility, crazy ideas don’t seem so crazy after all.
Victorians and Fiber, Louisville’s Quest For Fast Internet | Hackaday
"Do"s and Don"ts" for Dealing with Regulators
An Open Letter From Tanium’s CEO To Our Customers - Tanium Blog
Cybersecurity Startup Exposed Hospital Network Data in Demos
Five Principles for Improving Medical Device Cybersecurity
Former Employee Kept Accessing Engineering Firm"s Servers
Telehealth App Lawsuit Spotlights Privacy Questions
Master Your Security Foundation: Know Your Devices - Blog | Tenable
Cybersecurity Talk with Bernard Layton: Key factors that will get you hired in t...
Securing Medical Devices - The Need for a Different Approach - Part 2 ~ Cyber Th...
Securing Medical Devices - The Need for a Different Approach - Part 1 ~ Cyber Th...
Securing Medical Devices - The Need for a Different Approach - Part 1 ~ Cyber Th...
Installing Gentoo Linux on ZFS with NVME Drive (Part 1) – Guy, Robot
Research
Research
How to Take Action: 12 Habits that Turn Dreams into Reality
RESPONSE: 3 Hidden Lessons Behind Top Podcasts to Help Yours Stand Out – Ethan B...
Clint Boessen"s Blog: WSUS Console Freezes when the Server Cleanup Wizard
Time Tracking: A Great Strategy for Business Growth - Business Opportunities
That grumpy BSD guy: Forcing the password gropers through a smaller hole with Op...
EMC MirrorView Knowledgebook Releases 30 – 33
Home Assistant
G7 FUNDAMENTAL ELEMENTS OF CYBERSECURITY FOR THE FINANCIAL SECTOR
State of Software Security Reports | Veracode
Exclusive: Go inside a security operations center | InfoWorld
Buggy open source components still dog dev teams | InfoWorld Black Duck"s analysis found vulnerable Apache Commons Collections in 11.8 percent of applications it tested. Apache Tomcat was found in 10.1 percent of applications, but applications using vulnerable Tomcat versions on average had 11 high-risk vulnerabilities. Using a buggy version of OpenSSL meant introducing an average of 27 high-risk flaws to the application.
(ISC)² Security Transcends Technology
How Many Data Centers Needed World-Wide – Perspectives
GlobalSecurity.org - Reliable Security Information
No, millennials aren’t a bunch of job-hopping flakes
The Three Faces of Insider Threat Malicious Insider Negligent Insider Unsuspecting / Acting Insider
Azure Information Protection: Ready, Set, Protect! – Part 4: regulations and com...
Another Ransomware Attack Added to HHS Breach Tally
YoYoClouds: Infographic: 10 Questions CIOs Should Ask Before Moving To Cloud Feeling Cloudie,
Top 4 Strategies to Mitigate Cyber Security Incidents - Mandatory Requirement Ex...
Cybersecurity – The Legal Landscape in Canada
Using Packer to deploy VM"s in a Nested ESXi environment | metallic-badger.com
Packer vSphere Templates
[SOLVED] Windows 10 wont upgrade 10240 build to 1511 Build via WSUS - Windows Se...
Cybersecurity in Healthcare: Why It’s Not Enough, Why It Can’t Wait
Healthcare Cybersecurity Spend Rises: 4 Steps to a Wisely Spent Budget Congrats your now the CISO...Good luck.
IT Security Spending Trends - Feb 2016
Charts: Must-know healthcare cybersecurity statistics | Healthcare Dive
Windows Update error code list
Building Virtual Machines with Packer on ESXi 6 — Nick Charlton
Postmarket Management of Cybersecurity in Medical Devices
New cybersecurity guidelines for medical devices tackle evolving threats
How much space am I saving thanks to ReFS blockclone? - Virtual to the Core
Cybersecurity jobs are there for the taking. Are you ready? Joyce Brocaglia
Smart bandages will use 5G data to track your health
stagemonitor
Dashbuilder - Home
Freeboard
SQuirreL SQL Client Home Page
redhat - Can"t use ctrl+c to kill process in VM - Server Fault Ctrl C doesnt work. Alt-rightarrow to cycle to another terminal and kill the offending process.
Salt in 10 Minutes
saltstack-formulas iptables
Salting your LXC Container Fleet | levlaz
MSc Information Security
No ctrl character passthrough in the Web Client |VMware Communities
The Longer Story
VMWare Image Clone Problem: eth0 Renamed As eth1
IT Consulting Baton Rouge, IT Support Baton Rouge
Simple Scripts to Unlock, Lock, Pause & Resume your BitLocker Drive Encryption D...
One-upping the NES Classic Edition with the Raspberry Pi 3 and RetroPie | Ars Te...
UCI Machine Learning Repository: Detect Malacious Executable(AntiVirus) Data Set
The Electron Armory: Some Thoughts on Machine Learning Antivirus
Bootstrap
xkeyscore - RHEL7 Hardening
Agree to Terms of Service | Muddy Waters Research
Cybersecurity Vulnerabilities Identified in St. Jude Med...
ICS-CERT |
Randy Pausch’s Last Lecture: Really Achieving Your Childhood Dreams
Detecting insider threats is easier than you think | CSO Online
NBlog - the NoticeBored blog: Analog Risk Assessment method, ARA [UPDATED x2]
protect.io
Red Hat Delivers Advanced Network Automation with Latest Version of Ansible – Mi...
Understanding the Latest IT Security Employment Trend
Investigating Business eMail Compromise and Ransomware
Groups Say NIST Must Better Address Healthcare’s Cyber Needs
Cybersecurity Talk with Bruce Schneier: How to start your career in cybersecurit...
FDA warns Abbott on cybersecurity woes with St. Jude heart devices
Common Sense Guide to Mitigating Insider Threats, 5th Edition - 2016_005_001_484...
Conference on Innovative Data Systems Research (CIDR)
The Power of the Quarterly Business Review - QBR
Cmder
MSSPs add advanced threats as managed security services gain hold MSSP - Managed Security Service Provider EAAS - Experience as a Service
Former Sysadmin Accused of Planting "Time Bomb" in Company"s Database
Japan Guide - Japan Talk
Cybersecurity, hacking, hacking-resistant hardware | Homeland Security News Wire
Ask a Security Pro: Encryption Explained
Password History Analysis | Didier Stevens
MSRC-Microsoft-Security-Updates-API
RISKS TO CRITICAL INFRASTRUCTURE THAT USE CLOUD SERVICES
FAME
Frank"s Hospital Workshop
A Year in Review of Healthcare Cybersecurity Developments and Trends | HIMSS
HIMSS Healthcare and Cross-Sector Cybersecurity Reports | HIMSS
Framework to Assist Healthcare Delivery Organisations and Medical Device Manufac...
10 Steps to Cyber Security - The National Cyber Security Centre
Content of Premarket Submissions for Management of Cybersecurity in Medical Devi...
Applying 80001 - Using 80001 to Manage Medical Devices on the IT Network
Home Depot Agrees to Data Breach Settlement With Banks | Fortune.com
10 Reasons Data Centers Fail | Network Computing
A Security Risk Management Framework for Networked Medical Devices
Security Update Guide brings growing pains to Patch Tuesday
Why Auditing and Vulnerability Scanning are Different Things
Tuning auditd: High Performance Linux Auditing
A curated list of Awesome Threat Intelligence resources
Audit Daemon » ADMIN Magazine
Linux Admin Reference - Configuring Auditd in RedHat Enterprise Linux - unixadmi...
Audit Trail and Node Authentication - IHE Wiki
Understanding Interoperability with the IHE Profiles
GDPR Compliance: Technical Requirements for Linux Systems
We Tracked Every Dollar 235 U.S. Households Spent for a Year, and Found Widespre...
DevOps in a nutshell – All things Geeky
Layer 1 issue and propagating CRC errors « virtualstace.com
FRRouting OSPF
INTP vs INTJ: 5 Ways to Truly Tell Them Apart
Lights Out in Québec: The 1989 Geomagnetic Storm | Hackaday
10 Podcasts Every Photography Enthusiast Needs to Hear
Open source OTA software updates for embedded Linux | Mender
pyDash - A Web Based Linux Performance Monitoring Tool
Export SQL User Permissions to T-SQL script using PowerShell and dbatools | SQL ...
Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity |...
Setting Up Security as a Business: 3 Best Practices for Security Execs
Hunting Linux Malware with YARA - Blog | Tenable Network Security
Hard-coded passwords put industrial systems at risk – Naked Security
Are Large Teaching Hospitals At Greater Risk for Breaches?
Concise Courses | Cyber Security Training: Continuing Education
Cyber Security Conferences of 2017 | Complete List of InfoSec Events etc
Hacker Archetypes | Armed and Dangerous
Communications Cable Ratings
International Association of Privacy Professionals
Top 10 operational impacts of the GDPR: Part 1 – data security and breach notifi...
How To Install TTRSS with Nginx for Debian 7 on a VPS | DigitalOcean
Keeping focused with Admin Templates in OneNote – Microsoft Australia"s teacher ...
The internet mystery that has the world baffled - Telegraph Cicada 3301
GitLab.com meltdown, how 5 different backup strategies failed – Marksei
PowerShell & ActiveDirectory - BYOTD - Build your own test domain
regex - sed replace last line matching pattern - Stack Overflow
Steve Blank The Mission Model Canvas – An Adapted Business Model Canvas for Miss...
Why your Security Products are Inherently Insecure – DiscoPosse.com
Russia “crosses the Rubicon” with newest Shadow Brokers dump | Rendition Infosec
Easter"s End | DiscoverMagazine.com
Topic-based (issue-specific) information security policies
librecore
NBlog - the NoticeBored blog: NBlog April 7 - NZISM
Dockerizing Wordpress with Nginx and PHP-FPM on Ubuntu 16.04
Pyinotify - Monitor Filesystem Changes in Real-Time in Linux
What C-level leaders need to know about cybersecurity | CSO Online
NZ Information Security Manual (NZISM) | GCSB
File formats
HomePage -
Eclipse Software | Distribution Solutions | Epicor
Keycloak
Introduction to Keycloak
If You Don"t Know Much About Cybersecurity, You"re Not Alone
Nail that Startup Interview with these 10 Tips – BizSpark Australia
USB-Canary
The Shocking Truth About Transformerless Power Supplies | Hackaday
CTI Keynote, Cliff Stoll - (Still) Stalking the Wily Hacker - Fun with virtualiz...
Changes coming to TLS: Part Two - Red Hat Customer Portal
Changes coming to TLS: Part One - Red Hat Customer Portal
Boosting Healthcare Sector Cybersecurity: Essential Steps
GDPR Doesn"t Need to be GDP-Argh!
5 ways data classification can prevent an insurance data breach | CSO Online
Testing AnyConnect With Packet Tracer | PeteNetLive
RHEL 7 STIG v1 updates for openstack-ansible-security - major.io
IT leaders share how they quell cybersecurity attacks | CSO Online
Roast Potatoes Recipe - Allrecipes.com
Asparagus and Chicken Stir-fry Recipe | Food Network Kitchen | Food Network
Shrimp and Snow Pea Salad Recipe | Ellie Krieger | Food Network
White Papers - Preparis
“Cybersecurity in the Heath Care Sector: Strengthening Public-Private Partnershi...
“Cybersecurity in the Heath Care Sector: Strengthening Public-Private Partnershi...
“Cybersecurity in the Heath Care Sector: Strengthening Public-Private Partnershi...
The Five Stages Of Your Business Lifecycle: Which Phase Are You In?
Nartac Software - Download
Enabling Jumbo Frames in Solaris « Gopi Desaboyina Solaris Blogs
National Public Media Public Radio Audience Demographics - NPR Profiles
Svalbard Global Seed Vault - Wikipedia, the free encyclopedia
Arctic World Archive
No Sweat DIY Infographics | Beth’s Blog
CyberEdge 2017 Cyberthreat Defense Report
A Day In The Life Of A DBA Manager
Remote DBA Support & Database Management Services Provider | Datavail
VMware from HP Certification and Support | HP®
KVM Performance Limits for virtual CPU cores | Open-Source Routing and Network S...
BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker
How To View BitLocker Disk Status
A Penetration Testing Checklist For Linux Machine – Intrusion Discovery - Cybrar...
ZFS SLOG/ZIL Drive (Revisited) - Calvin Bui
To SLOG or not to SLOG: How to best configure your ZFS Intent Log
dripcap
A performance deep dive into tablespace encryption | Frits Hoogland Weblog
Texas Specialty Practice Suffers Ransomware Attack
Tips on how to get all 5 AWS certifications in 1 month – Gabe"s Blog
Temporary directory for a shell script TMPDIR=$(mktemp -d) trap "rm -rf $TMPDIR" EXIT
About Swan · Swan
How to build a smog sensor with a ESP8266 microcontroller | Opensource.com
NTPsec: a Secure, Hardened NTP Implementation | Linux Journal
Surviving guide with Ceph and Proxmox · Igor Moiseev
Downtime sucks! Designing Highly Available Applications on a Budget - Tekhead.it
Cleaning copper contacts - The Silicon Underground
Your Basic Guide to RMDs -- The Motley Fool
Windows server 2012 shows as Windows 6.3 in WSUS console – Formatting the system...
ZFS, BTRFS, XFS, EXT4 and LVM with KVM – a storage performance comparison
Security
The unique dialect of Threat Intelligence | Stephen Northcutt | Pulse | LinkedIn
Mr. Robot and the Insider - Blog | Tenable Network Security
Bring Unknown Assets and Shadow IT into the Light - Blog | Tenable Network Secur...
“You need to see it to secure it.”
The Top 50 Must-Attend Information Security Conferences | Digital Guardian
Institute for Critical Infrastructure Technology
Archimedes | Archimedes
Waclaw Chrabaszcz
Cyber Security for Defense 2017
National Health Information Sharing & Analysis Center The National Health ISAC (...
DITTA Emphasizes Its Commitment to Cybersecurity - 24x7 Magazine
DITTA
Looking at cybersecurity too.
Alom, Ilom, & Elom Part I | Fatmin
Managed Service Accounts: Understanding, Implementing, Best Practices, and Troub...
lanmaster53.com
Secure Password with PowerShell: Encrypting Credentials - Part 2 - PDQ.com
Secure Password with PowerShell: Encrypting Credentials - Part 1 - PDQ.com
Mental Models I Find Repeatedly Useful – Medium
Federal Cybersecurity Whitepapers, Case Studies, Videos | EiQ Networks
RMF and Its Place in Security Certifications: Corsec
IFSEC-Periodic-Table-of-Security-full-size.jpg (2257×1597)
Cybersecurity Startups Take in More than $8B Over 892 Deals
Scans to POAM - I-Assure
DIACAP vs. RMF - 10 Major Improvements |TechRoots Blog
CACI RMF Eagle Toolset
Remove the #DIV/0! Error in Excel
=IF(ISERROR(
Risk Management Framework
DSS / NISP Risk Management Framework (RMF) Information and Resources
DCAA - Contract Audit Manual
Healthcare Vendors Identified as the “Unlocked Backdoor to Healthcare Data"
TSP board lagging behind on cyber updates, closing audit recommendations - Feder...
SOC 2 - AICPA
TSP Section 100
Service Organization Control (SOC 2)
Turn that Pi Zero into a Streaming Camera, Step-by-Step | Hackaday
SQL Server On Linux: Core-minidumps and Breakpad – SQL Server According to Bob
6 House Repairs To Tackle | Bankrate.com
Linked - FCC: Your cybersecurity isn"t our problem
Software is Eating the Network: Going Native on Network Virtualization - The Net...
How to Create a Wifi Hotspot in Ubuntu - Make Tech Easier
How to Enable and Monitor Firewall Log in Windows PC
System Requirements for Dragon NaturallySpeaking 13
"Black box" technique may lead to more powerful AI
Aruba Instant Access Point Example Configuration Walkthrough
Creating CentOS 6.5 virtual machines with Packer and Nested ESXi | On the Edge o...
A Red Teamer’s Guide to Pivoting | Hackaday
DSHR"s Blog: Threats to stored data
Shut Up and Say Something: Amateur Radio Digital Modes | Hackaday
COMM 202: Introduction to Communication Technology
OpenIAM - Open source Identity and Access Management | Home
Firewalling on Solaris 10 | Sonia Hamilton
TechExams.net IT Certification Forums - Powered by vBulletin
Packer, where DevOps begins
Leveraging NIST Standards to Build Your Enterprise Security - Blog | Tenable Net...
Tunneling Slack traffic through ssh tunnels
Takeaways from Bruce Schneier"s talk: "Security and Privacy in a Hyper-connected...
How to stop insider threats | CSO Online
My favorite PowerShell one-liner – Poshoholic
NVD - National Checklist Program Repository
The United States Government Configuration Baseline (USGCB) - NIST
Microsoft Word - Blue Sheets and Strategic Account Planning_UiSee.doc - 6BlueShe...
TensorFlow
Secure HTTP (HTTPS) - Pulse
rtop - Tool to Monitor Remote Server over SSH | 2daygeek
Two Ways GDPR Will Change Your Data Storage Solution | Linux Journal
General Data Protection Regulation (GDPR)
Linux Laptop: Display Battery Status And Thermal Temperature From Command Line
Sizing for large VMDKs on vSAN - CormacHogan.com
Multi-tenant network challenges - Blah, Cloud.
DIY SAN/NAS – fast, reliable, shared storage, with FreeNAS and switchless 10 Gbp...
DIY SAN/NAS – quest for fast, reliable, shared storage with a twist of ZFS! (Par...
How worried should your organization be about cyber espionage? | CSO Online
Ex-IT director accused of accessing his former employer for two years – Naked Se...
pfclscan
Customer security awareness: alerting you to vulnerabilities that are of real ri...
Cyber Security – A Mega Guide to Learn Everything You Need to Stay Safe Online -...
Breach Involving Encrypted Devices Raises Questions
Hospital Breach Lawsuit Gets Class-Action Status
Moving From IT-Driven to Business-Driven Security
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Prote...
Who’d want to be a CISO? ~ Cyber Thoughts
Open19 - Home
These 10 people may be your greatest inside security risks | CSO Online
Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals - eSecurity ...
Brian Jack, chief information security officer at KnowBe4, breaks it down into its parts:
5 Ways CISOs Could Work Better with Their Cyber Insurers
7 Steps to Transforming Yourself into a DevSecOps Rockstar
Future of the SIEM
Intro to Cyber Insurance: 7 Questions to Ask
Malware Explained: Packer, Crypter & Protector - Dark Reading
Irish Soda Bread {Gluten-free}
How to list updates that have been installed on your Windows Server 2016 machine...
ISACA Certifications List | Training, Benefits, Salary and Jobs
Understanding Oracle RAC/Standby/Replication Environments
Oracle Active Data Guard Best Practices Standby For More Than Disaster Recovery
Report says ISACA certifications earn top pay premiums - Infosecurity Magazine
“ISACA certification holders can benefit from deeper career knowledge and higher pay, and their employers benefit from being able to identify an employee’s dedication to the field and commitment to ongoing professional development, as well as demonstrated proof of knowledge”, he explained.
Stay Interview Guide
Instant SQL Formatter
Reflections Upon Deception and Protean Security Tactics
Seth"s Blog: The reason we need the FDA (hint: it"s marketers)
Modern DIY FM radio | Hackaday
Enhancing your organization’s vendor risk management process. | Corl Techn...
ITIL-Checklists - IT Process Wiki
15 Top Health Systems Study
2017 | 100 Top Hospitals
Server Hardening Checklist
Debian preseed
Cyber security spending highest for financial institutions
Why ethical hacking is the top job of 2017
Intel® NAS Performance Toolkit
Cognitive Capabilities - The Future of Cyber Security
Guest Post: The “Wicked Problem” of Cybersecurity | The D&O Diary
The Power of Stay Interviews by Dick Finnegan
Home Page
Xymonton [monitors]
Alva L. Couch
Simple Day to Day Administration « The Surly Admin
NITRD
ISAO Standards Organization – Improving the Nation"s Cybersecurity Posture
Health Information & Cyber Security In Michigan
Michigan Healthcare Cybersecurity Council
Michigan Small Business Development Center Launches “Small Business, Big Threat”...
Learn a language where and when it suits you | Radio Lingua Network
Bizagi Business Process Modeling & Notation (BPMN) - Free Download
ProxBash - a bash script to manage Proxmox VE - Raymii.org
NAS performance tester (C#)
UL’s Cybersecurity Assurance Program
Cybersecurity | UL
Why Does a Small Business Need an Information Security Program? | Mike Parsons |...
Green Cloud Technologies acquires cloud services provider Cirrity - Upstate Busi...
MDDI Magazine
Federal Labs
Computer and coding books from Usborne
Negative Resistance: It Shouldn’t Make Sense! | Hackaday
Fix-a-Brick: Fighting the Nexus 5X Bootloop | Hackaday
Three penetration testing tips to out-hack hackers
Overcoming the cyber-security skills gap: experience vs qualifications
Penetration Testing in Windows/Active Directory with Crackmapexec
Crackmapexec
Hiding Shell with Prepend Migrate using Msfvenom
How to Install a Production Ready Naemon Monitoring Server
Naemon
Buku - A Powerful Command-line Bookmark Manager for Linux | 2daygeek
Shift your perspective on cybercrime to realize how well you’re doing | CSO Onli...
The True State of DevSecOps
Titan - A Command line Password Manager For Linux - OSTechNix
Museums use CT scans to take the mystery out of mummies
Combine Multiple ISO Files To Burn A Single Bootable ISO Image
How DevOps is changing the face of IT – The Microsoft India Development Center B...
Secrets of a Highly Productive CIO-CISO Relationship
3,000 Industrial Plants Per Year Infected with Malware
The Best Pi Emulation Console You Can Build | Hackaday
Fragmentation: the silent killer in security management | CSO Online
rummaging through the Government"s Attic
Automatically Organize Your Downloads Folder In Linux Using `Classifier` (Comman...
7 considerations to make when securing your Raspberry Pi | Opensource.com
systemd Sucks, Long Live systemd · naftuli.wtf
Testing Your SQL Server Backups the Easy Way with PowerShell & dbatools | SQL DB...
Tim Lord | EDUCAUSE
How to patch ESXi 5 without vCenter - ESX Virtualization
Parrot Security
The Physics and Technology of Mammography
SQL Server Case Sensitive Search: Fetching lowercase or uppercase string | My Te...
Research - Information Security Forum
UpGuard Product Features
DISA STIG Compliance for IT | Tripwire
Auto-Harden ESXi 5.x Hosts - softwareab
Guest Blog from Charles Rudolph – Practice Development Manager | The Time to Cha...
Recalbox - the micro retro gaming console
PowerShell Gallery | DNS Server STIG 1.0.0.5
Training
Malware-Traffic-Analysis.net - Traffic Analysis Exercises
About « Cloud South
Bats: Bash Automated Testing System
Baked Cheeseburger Recipe | Sargento® Sliced Colby Cheese
Automated Audit using SQLMap - OWASP
Cipher Security: How to harden TLS and SSH | Linux Journal
Secure Secure Shell
Cyber security spending to reach $90bn in 2017
Threat Horizons 2019 - Executive Summary - Threat-Horizon-2019-ES_PWS.pdf
Threat Horizon 2019: Disruption. Distortion. Deterioration - Information Securit...
OTS/SOUP Software Validation Strategies | Bob on Medical Device Software
bash - How to automatically record all your terminal sessions with script utilit...
Redirecting bash script output to syslog
exec 1> >(logger -s -t $(basename $0)) 2>&1
Bash Hackers Wiki Frontpage [Bash Hackers Wiki]
The printf command [Bash Hackers Wiki]
National Initiative for Cybersecurity Careers and Studies | National Initiative ...
awesome-programming-presentations
Github Dorks
Installing Windows 7 over PXE Network Boot Server on RHEL/CentOS 7 using WinPE I...
DBASOLUTIONS - ADRCI Commands
Using your Raspberry Pi Zero’s USB wifi adapter as both Wifi client and access p...
iPXE - Screenshots
Becoming a X.509 Certificate Authority - David Pashley.comDavid Pashley.com
Ditch Your Cable Modem/ISP With a Tethered iPhone and Raspberry Pi | DaveConroy....
5 things you didn"t know about ... Java performance monitoring, Part 1
A Quick First Glimpse at Cowrie – A SSH Honeypot
  - Welcome
Letting Go of a Beloved Technology | Countries Beginning with I
Companion Data Services
Attacker"s Playbook Top 5 Is High On Passwords, Low On Malware
CPOtracker - Disaster Recovery & Business Continuity Software and Services
HATP - Openrobots
PunkSPIDER
The No More Ransom Project
www.mach37.com
dm-crypt/Device encryption - ArchWiki
Wekan — open-source kanban
VisualVM: Home
Guide to Windows Batch Scripting - /* steve jansen */
Strategyzer | Business Model Canvas
Guides, Checklists & Best Practices | University Information Security Office | G...
Cyber Security for Critical Infrastructure Protection - SCADAhacker
Vagrant and why it is useful in learning Puppet · sdorsett.github.io
Recyclebot - Appropedia: The sustainability wiki
Do Repeat Yourself, With Variations – Jon Udell
Scripted Packer build, ovftool export and Vagrant .box file creation · sdorsett....
What Businesses Can Learn From the CIA Data Breach
A List of the Best and Free PMP Exam Study Resources
Implementing CA signed SSL certificates with vSphere 5.x – Part 5– ESXi and Auto...
OpenStack ESXi and OpenStack hypervisor support | Platform9
Managing Cisco IOS Upgrades with Ansible
Heimdal Joins No More Ransom in the Global Fight against Ransomware - Heimdal Se...
How Every Cyber Attack Works - A Full List - Heimdal Security Blog
HHS Budget Cuts: What About Privacy, Security Initiatives?
Security Weaknesses Found at Yet Another Healthcare Agency
SAP Cyber Threat Intelligence Report – March 2017
Networking Grows To Invisibility | The Networking Nerd
IT pros fear cyberespionage may be top 2017 threat
History of US Information Warfare - Schneier on Security
MalwareJake: TicketBleed - making the case for packet capture
Want good cyber insurance? Read the fine print | CSO Online
A Look at MINIBIAN: A Minimalist Image for Raspberry Pi | Pi Boards
MINIBIAN
How To Automatically Organize Similar Type Of Files In Specific Folders - OSTech...
Classifier
How To Improve Laptop Battery Performance In Linux - OSTechNix
Kgif - Create a Gif File from Active Window | 2daygeek
Parrot Linux Distro Delivers Improved Security Tools
P2V: Debian Testing PXE server and Vmware Workstation 11 - Freedom Penguin
Physical computing with the Raspberry Pi | Opensource.com
Evil Tester: Top Ten Books For Testers for Huib Schoots
My First 5 Minutes On A Server; Or, Essential Security for Linux Servers
Cybersecurity Workforce Framework | National Initiative for Cybersecurity Career...
cpuburn
About | Project Hamster
Reconfigure iLo network settings using HPONCFG | My Knowledge Base
The Unix Shell"s Humble If
ORACLE-BASE - Create a Local Yum Repository for Oracle Linux 6
EnterprisePACSMonitoringwithNagiosSmokepingandCacti.pdf
network Clipart
Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Heal...
Microsoft Word - balanced scorecard.Jan2011.docx - whitepaper.Jan2011 final.pdf
Best Pfsense hardware
20,000 Worldclass University Lectures Made Illegal, So We Irrevocably Mirrored T...
Banana oat muffins make a quick breakfast or snack
Secure tunnels to localhost
The Networking Nerd | Networking With A Side of Snark | Page 2
I Hate NAT! Or Do I…? | The Networking Nerd
FCC: Your cybersecurity isn"t our problem
SCAP and Remediation | My Open Source Life
Data-stealing CryPy ransomware raises the spectre of variable pricing for files ...
Home - Mycroft
Borg calendar by mikeberger
linux - LVM dangers and caveats - Server Fault
fully automated install of virtualbox tools in windows 7 - Server Fault
ERPScan Security Scanner for SAP
vulnerability scanners - Difference between hardening guides (CIS, NSA, DISA) - ...
checkESXiBootDeviceHealth.sh
sdorsett.github.io · Things I find interesting
Deployment Configuration File and Properties
Slimming JBoss AS 4.3 | JBoss Developer
Monitoring Wonderland Survey - Nagios the Mighty Beast
Troubleshooting Drops in Performance (Sun Java System Directory Server Enterpris...
Issue board - GitLab Documentation
vSphere 6.5 p01 - Important patch for users of Automated UNMAP - CormacHogan.com
IT and Information Security Cheat Sheets
Metasploit: A Penetration Tester"s Guide to IPM... | SecurityStreet
Brian Atkinson"s Blog: .VMX Hardening Options |VMware Communities
vSphere Security Hardening Report Script 5.1 |VMware Communities
STIG it to me, RHEL6! (computer security isn"t hard!) - Red Hat Customer Portal
Automated auditing the system using SCAP - Red Hat Customer Portal
opensnoop For Linux
pisound - Soundcard & MIDI Interface for Raspberry Pi
InfoSec Handlers Diary Blog - Retro Hunting!
The CIS Critical Security Controls Explained &#... | Rapid7 Community and Blog
The CIS Critical Security Controls Explained &#... | Rapid7 Community and Blog
The CIS Critical Security Controls Explained - ... | Rapid7 Community and Blog
The CIS Critical Security Controls Explained - ... | Rapid7 Community and Blog
Cybersecurity 500 List of Top Cybersecurity CompaniesCybersecurity Ventures
Speeding up Proxychains with Nmap / Xargs
Cybersecurity Conversations For The C-Suite in 2017 - Herjavec Group
Creating console screenshots with Get-ScreenshotFromVM.ps1 | vcloudnine.de
Cybersecurity vs. Network Security vs. Information Security | SecureWorks
Project logs • TinyJaguar • Hackaday.io
Workplace collaboration survey finds employees want a more interactive approach ...
6 Need-to-Know Tips to Keep Your Company Safe From Hackers - Business Opportunit...
Introducing Threat Operations: Accelerating the Human
Does DoD Level Security Work in the Real World? | Jeff Man | Pulse | LinkedIn
Android screenshots « BenV"s notes
NixOS Linux
Burp Suite
mhddfs: join several filesystems together to form a single larger one
The Hedgehog Concept
OS Tuning - Learn how to make CentOS 6 and CentOS 7 fast! Welcome to the Tuning ...
SecurityOperationsCenter_eBook.pdf
Add EPEL repository to centOS 6 64 - CentOS
Installing signed SSL/TLS certificates for vCenter Server Appliance 5.5 (VCSA) –...
How To Record Everything You Do In Terminal - OSTechNix
sh Scripting Cheat Sheet
Hipara | Home
grokbase com
HHS’ IT ‘Strategic Plan’ Spotlights Cybersecurity, Privacy
What’s the difference between a product and a project?
Index - FHIR v1.0.2
The Top Ten STIGs
Kali Linux NetHunter | Kali Linux
Strategic Planning Company | KPI Fire
RS232 serial null modem cable wiring and tutorial
Top Cyber Security Certifications 2016 | Mr. OoPpSs | Pulse | LinkedIn
Main Page - OWASP
Seccubus
Home - AuditScripts.com
Charles Reace
rotate all the log files in the RAC environment | Oracle RAC, Virtualization and...
Using logrotate to manage log files | Oracle RAC, Virtualization and Exadata Exp...
Medical Image Format FAQ - Part 8
Technology Vendors | Healthcare Intelligence - Definitive Healthcare
Dicom3tools Software
Script for Rotating the Alert Log
Data Center Huddle
Mailing List Archive: Rsyslog freezes the box when can"t send logs over TCP
FruityWifi
FossHub
General Principles of Software Validation; Final Guidance for Industry and FDA S...
Welcome to Floodgap Systems" WWW server
NIST-Security-HIPAA-Crosswalk | HHS.gov
the healthcare industry has accounted for over 40 percent of data breaches over the last three years, and 91 percent of all health organizations have reported a breach over the last two years.
Information Security and Privacy Program | HHS.gov
RSS feeds on healthcare information security
Debunked: The uniquely Japanese "shou ga nai" | Home Japan
2017 Cybersecurity Trends Already in Action
Security Policies Matter for Disaster Recovery
SAP Cyber Threat Intelligence report – February 2017
Ask a Security Professional: WordPress Database Security Part Two — Best Practic...
Ask a Security Professional: WordPress Database Security Part One — Anatomy of W...
VMware vCSA 5.5 – Ready for Prime-time & the War Fighter – Jase"s Place
Thoughts on Education. | JK-47
Multi-tenant/VLANs behind a virtualized pfSense firewall in ESXi | JonKensy.com
BSidesLV & DEFCON Conference Tips ** UPDATED 2016! ** | JK-47
Kimai - Open Source Zeiterfassungs Software
Enduring Popularity of LG Tone+ HBS-700 & HBS-730 Bluetooth Headsets
Peter Ustinov Quotes - The Quotations Page
Performance Management tools used in higher education: The Balanced Scorecard an...
http://www.pennington.net/py/ciscoconfparse/
Automate the creation of graphs with Graphviz
PeteNetLive - The Home Of Free Tech Support and Tutorials
Evil Tester: Representation and Meaning: relating Programming, Testing, Coding a...
Implementing Academic Projects using Microsoft Technologies – Microsoft Faculty ...
Checklists & Step-by-Step Guides | SCORE | SANS Institute
Rob van der Woude"s Basic Hardware Inventory, Version 6.13
Seth"s Blog: Cost reduce or value increase?
Cybersecurity Information Sharing Act and your privacy – JP
Cybersecurity Information Sharing Act
My ITIL Experience In An Org Chart - EtherealMind
Kitchen Soap – Book Suggestion: “Dialogue: The Art Of Thinking Together”
Redundancy does not imply fault tolerance: analysis of distributed storage react...
Airconsole – Portable Serial Ethernet/WiFi/Bluetooth Console Server
Punching it Down: Insulation Displacement Connectors | Hackaday
Saved by the Bel — Understanding Decibels | Hackaday
What Voltage for the All-DC House? | Hackaday
vmware scanner
WTF are Ground Loops? | Hackaday
Logitech BRIO 4K Pro Webcam is the new gold standard [Review]
Vagrant Tutorial – From Nothing To Multi-Machine | manski"s blog
Windows Performance Counter Types | manski"s blog
Installing VMware ESXi 5.5.0 Update 3 on KVM - Fun with virtualizationFun with v...
New York"s Cyber Regulations: How to Take Action & Who"s Next
Howard A Schmidt remembered as a ‘humble’ industry giant – Naked Security
PiBakery - The blocks based, easy to use setup tool for Raspberry Pi
WiFi Antennas | Selecting a WiFi antenna
Make a home dashboard with Raspberry Pi and OpenShift | Opensource.com
Give Generously! Seven Ways To Help Open Source | Meshed Insights Ltd
Build your own secure Pine 64 Android TV for less than $50 | InfoWorld
Flash ROMs with a Raspberry Pi | Linux Journal
A Look at HASSbian: Raspberry Pi for Home Automation | Pi Boards
PiCluster 1.6 – Move your Containers to Different Hosts | Linux-toys.com
The Terminal Is Where Linux Begins - and Where You Should, Too | Tech Blog | Lin...
Increase Security Reporting with Contact Cards – Chris Sanders
KPIs For DBAs to Show Their CIOs - Thomas LaRock
Welcome to Mohiomap
Postmarket Management of Cybersecurity in Medical Devices - Guidance for Industr...
10_Basic_Cybersecurity_Measures-WaterISAC_Oct2016[2].pdf
networking - Automating Configuration of VMware"s vSwitch (OpenStack/libvirt/Nov...
Virtu-Al » PowerCLI: Easy vSwitch & PortGroup Setup
Prescriptive Topology Daemon
3006900 GI 72 Titel - GI-Proceedings.72-31.pdf
Don"t Overlook Standard Operating Procedures: Use These Apps to Put Them in Plac...
What is Prescriptive Topology Manager (PTM) & DOT? – Ethan Banks
Prescriptive Topology Manager (PTM) support with NX-API on the Nexus 9000? | Jas...
Prescriptive Topology Manager - PTM
Prescriptive Topology Manager - PTM - Cumulus Linux 3.2.1 - Cumulus Networks
Prescriptive Topology Manager - PTM
How Not To Quit Your Job - The Lone Sysadmin
cyberplanner - cyberplanner.pdf
Raspberry Pi Open Monitoring Distribution setup guide
Top 15 Indicators Of Compromise
Basics of Windows Incident Response – JP
How to Exempt Your Firm from Cybersecurity Reporting Requirements | MDDI Medical...
Why have the Dell OpenManage integration for vCenter? | Notes from MWhite
How to build a Windows 10 vSphere Template | Notes from MWhite
25 Most Frequently Used Linux IPTables Rules Examples
Multiple Vagrant VMs in One Vagrantfile
How To Cook Perfect Steak in the Oven | Kitchn
squidmagic
web-based network traffic to detect central command and control (C&C) servers and Malicious site, using Squid proxy server and Spamhaus.
Install Windows 7 over PXE from Linux without WAIK - 3. Boot Files
Hierarchical Task Analysis :: UXmatters
Make Your Own Custom Keyboard Covers • KeyCuts
7 Security Podcasts You Should be Listening to - TunnelsUP
Create an ESXi ISO that contains all Patches | Virten.net
On the Shoulders of #InfoSec Giants
Operating Systems: Three Easy Pieces
How Security Products are Tested – Part 1
Create local accounts for VMware ESXi via vMA – Geek and I
The Linux Migration: Other Users" Stories, Part 1 · Scott"s Weblog · The weblog ...
Solving Connectivity errors to SQL Server
Creating RSS/podcast feeds from iPlayer radio programmes
Data on 3.2K patients exposed at Vanderbilt University Medical Center
How sweet it isn"t: W-2s of 3K Amalgamated Sugar workers exposed
Alan"s Blog » Blog Archive » Update GPOs with Newer Version
An introduction to GNU Screen | Opensource.com
Linux cheat sheet: 16 Linux server monitoring commands you really need to know
AWS"s S3 Brought Down by Single Typo in a Server Command
Automatic DNS updates from libvirt guests
Are Virtual CISOs the answer to your security problems? | CSO Online
InfoSec Handlers Diary Blog - SSL/TLS on port 389. Say what?
Updates that simplify NIST certifications | CSO Online
HITRUST Announces HITRUST CSF Roadmap Including a New Simplified Program for Sma...
Network security demands better procurement processes | CSO Online
The State of Cyber Security 2017 | Business Security Insider by F-Secure
Pence used private mail for state work as governor, account was hacked | CSO Onl...
Yahoo data breach affects at least half a billion users | Computerworld
Top 5 Tips for a GREAT Live Demo Presentation | 3Sharp
Runecast– Proactive performance for your VMware environment–Part 2 – Knowledge B...
Runecast – Proactive performance for your VMware environment! – Part 1 – Configu...
7 universal rules of threat intelligence | CSO Online
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses - Dark Re...
Zones of Trust: A New Way of Thinking about IoT Security
How to install the OpenVAS vulnerability scanner on Ubuntu 16.04 - TechRepublic
Social-Engineer Toolkit - TrustedSec - Information Security
A better security strategy than ‘know your enemy’: Know your co-workers | CSO On...
Using the SmartThings Hub V2 as my primary home automation hub
King Phisher
In Cybersecurity, Language Is a Source of Misunderstandings
OnionShare
Xxcopy vs Robocopy - The Silicon Underground
The most cited deep learning papers
Exploring the darker side of culture hacking | Opensource.com
Frequently Asked Questions: Submarine Cables 101
Peek - A Simple Animated Gif Screen Recorder for Linux
4 step Network bonding / teaming configuration in Linux - Kernel Talks
Verizon"s risky business: Acquiring the world"s biggest hack | CSO Online
Healthcare firms plan to increase security spending | CSO Online
FDA "guides" the way to medical device security | CSO Online
Which configuration management tool should you use? | Deimosfr Blog
Wireshark: remotely analyze tcpdump using SSH | Deimosfr Blog
Zero downtime upgrade with Ansible and HAProxy | Deimosfr Blog
Alan"s Blog » Blog Archive » Get Downtime Using PowerShell
How to Establish a Session and Authenticate with the vSphere 6.5 RESTful API - W...
The History of Bitcoin in Numbers - Business Opportunities
What the Flux: How Does Solder Work Anyway? | Hackaday
Universal Radio Hacker: investigate wireless protocols like a boss
How the DOT discovered its network was compromised by shadow IT | CSO Online
The Gitlab database incident and the Backup Checker project | Le blog de Carl Ch...
For effective healthcare data protection try a "layered" approach
Common failures of responding to security breaches in healthcare
A guide to healthcare IoT possibilities and obstacles
CISO Q&A: Healthcare information security needs more leadership
Is it possible to get a new CISO position after being fired?
What CISO certifications are the most important to have?
Healthcare firms plan to increase security spending | CIO
Aflac CISO Tim Callahan on global security, risk management
CISO job description: Business function more than IT
International Medical Device Regulators Forum
International Medical Device Regulators Forum (IMDRF)
Inside Medical Devices | Covington & Burling LLP | Updates on FDA Device Regulat...
20160125_fda_publishes_guidance_on_postmarket_cybersecurity_risk.pdf
NH-ISAC and MDISS Partner to Form Medical Device Security Information Sharing In...
Using Packer and Vagrant to install your SharePoint environments on Windows and ...
2017 Data Threat Report | Data Security Issues, Risks, Trends, and Concerns | Th...
Adding CD Drives to Packer Virtual Machines | Remcam Blog
Circuit Cellar | Embedded Engineering and Programming Information
Policy Reporter
IT decisions makers and executives don"t agree on cyber security responsibility
Clone a Firmware RAID 1 using Clonezilla - bouni"s blog
8 Tips to Pass the PMP Exam, 1st Try, No Classes | Michael B. Howard | Pulse | L...
Top Regrets of Those Who Failed the PMP Exam
The 4 Secret Ingredients to Pass the PMP® Examination
PMP Certification Study Notes 1 - Terms and Concepts - PMP Exam, Agile PMI-ACP, ...
Triple M.2 Samsung 950 Pro Z170 PCIe NVMe RAID Tested - Why So Snappy? | PC Pers...
Use Let"s Encrypt free certificates in Windows for Veeam Cloud Connect - Virtual...
Runecast | Software-defined expertise | Proactive analysis for VMware
Inxi - A Powerful Feature-Rich Commandline System Information Tool for Linux
The History of Bitcoin in Numbers - Business Opportunities
SSH Password Testing With Hydra on Kali Linux - LinuxConfig.org
Sysmon
Storage Best Practices for EDA - h11909-emc-isilon-best-practices-eda-wp.pdf
Increase trust in your organization by assuming positive intent | Opensource.com
The 101 of ELF Binaries on Linux: Understanding and Analysis
Apply Updates to Windows 7 Image Using DISM | Utilize Windows
Ansible community modules for Oracle DB & ASM – /home/liquidat
MartinLanner.com » Build a PXE boot server environment
Find out UUID of a Linux partition
Let"s Encrypt - Free SSL/TLS Certificates
TIL Reddit Recap Podcast
Why Lean Canvas vs Business Model Canvas?
VMware Tools for Nested ESXi
Plain Text, Papers, Pandoc
Specific Communication | Jamal Ahmed"s page
Understanding Prioritization | Jamal Ahmed"s page
Jolokia – Overview
LINUX CHEATSHEET – vmstat, ps, top | Kaiwan"s Tech Blog
Kanban Project Management Software
OpenSSL Certificate Authority
using /etc/hosts.allow and /etc/hosts.deny to secure unix | Jamal Ahmed"s page
Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor - SANS Internet Stor...
Taking Control of Linux Exploit Mitigations
tozores/alpine-wildfly - Docker Hub
Performing a Command-Line Installation of VMware vCenter Update Manager
aqueduct.git - automated changes to Red Hat Enterprise Linux based systems to me...
How To Get Wireless Passwords At Airports When They Don"t Have Free Wifi - foXno...
Script Get-PendingReboot - Query Computer(s) For Pending Reboot State
virtualbox.org • View topic - source ip is 10.0.2.2 for all incoming packets
virtualbox.org • View topic - Not Enough Memory Error when installing Vcenter 5....
Fossies - The Fresh Open Source Software Archive
The problems with forcing regular password expiry
Bookmark
Foxy Proxy
Private and Public Collaboration - Global Forum to Advance Cyber Resilience
DeployHappiness | Four Batch files for Quicker Troubleshooting
Storage SCP - dcm4chee-2.x - dcm4che.org Wik
Creating Your Own SSL Certificate Authority (and Dumping Self Signed Certs) | Th...
SSL: Who Do You Trust? | The Data Center Overlords
Automating Linux Security Best Practices with Ansible | Dan Tehranian"s Blog
Testing Ansible Roles with Test Kitchen | Dan Tehranian"s Blog
Automating VMware cluster remediation without DRS: PowerCLI — DAMIAN KARLSON
Virtual Appliances getting more secure with vSphere 5.5 - Part 4 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 3 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 2 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 1 - VMware vSpher...
Automate the Hardening of Your Virtual Machine VMX Configurations - VMware vSphe...
Quickest Way to Patch an ESX/ESXi Using the Command-line - VMware vSphere Blog
Unattended VMware vSphere Client Installation (One-Click Install) | Virten.net
vSphere Update Manager (VUM) (Part 3) - How to use it - TechGenix
vSphere Update Manager (VUM) (Part 2) - Installation - TechGenix
vSphere Update Manager (VUM) (Part 1) - Introduction - TechGenix
virtuallyGhetto: How to Create Bootable ESXi 5 ISO & Specifying Kernel Boot Opti...
virtuallyGhetto: How to Enable Nested ESXi & Other Hypervisors in vSphere 5.1
Automating SSL Certificate Regeneration in VCSA 5.1 & 5.5 (vCenter Server Applia...
Completely automating vCenter Server Appliance (VCSA) 5.5 Configurations | virtu...
Unsecured Endpoints in the Hospital Environment ~ Cyber Thoughts
Top Cheat Sheets - Cheatography.com: Cheat Sheets For Every Occasion
Setting up an Ubiquiti EdgeRouter to use CloudFlare for Dynamic DNS
BDD Security - Open Source automated security testing framework
How To Create A Balanced Scorecard
Stig_it_to_em--Lee_Tues_345.pdf
Lean Threat Intelligence Part 2: The foundation | Fastly
Git Cheat Sheet
How to root out corruption in your image folders | Opensource.com
Errata Security: You don"t need printer security
13 Cloud Experts Reveal the Most Important Factors in Evaluating Cloud Infrastru...
FOCA
Free and Open Source Text to Speech Tools for eLearning - eFront Blog
How To Use DM-Crypt to Create an Encrypted Volume on an Ubuntu VPS | DigitalOcea...
How To Set Up an Artillery Honeypot on an Ubuntu VPS | DigitalOcean
2015 Bootcamp Market Size Study: Course Report
How To Set Up a Basic Iptables Firewall on Centos 6 | DigitalOcean
Consul by HashiCorp
Geckoboard - Realtime Business Status Board
Dasheroo - Free Business Dashboards Done Right
Ten Of The Best Cheat Sheets For First Time Linux Admins
Cybrary - Online Cyber Security Training, Free, Forever
DSHR"s Blog: Postel"s Law again
Monthly notes 16 – Rule of Tech
Improving Linux System Performance with I/O Scheduler Tuning | via @codeship
Performance Tuning HAProxy - via @codeship | via @codeship
What is Service Process Architecture? Why do you need it? | Tom Smyth"s Blog
CaseBox
Bareos Open Source Data Protection - bareos.org
STIG - Ansible & Mindpoint Group
How do I create my own Certificate Authority (CA)
Sample Patching Policy – VMware Update Manager – ESXi Hosts | vLore Blog
The United States Government Configuration Baseline (USGCB) - FAQ
A beginner"s guide to using Hudson for continuous integration with Drupal | Thin...
Rysc Corp Products
CIO of Accenture Talks About How to Pitch IT Ideas to Execs & Why CIO’s Have to ...
TaskBoard
How to Use "Yum History" to Find Out Installed or Removed Packages Info
The 7 security threats to technology that scare experts the most | CSO Online
Simple Server Hardening | Linux Journal
From the Canyon Edge: HOWTO: Automatically import your public SSH keys into LXD ...
What Does a DBA Do All Day? - Thomas LaRock
Vyatta Config Sync Howto and Overview - Backdrift Backdrift
LVM: Please specify number of stripes (-i) and stripesize (-I) | setaOffice
Social Media Management Dashboard - HootSuite
Understanding and Leveraging the CSF - HITRUST
Security Harden CentOS 7
IPTables HowTo - Community Ubuntu Documentation
(Outdated) UniFi - Set minimum RSSI for clients – Ubiquiti Networks Support and ...
shell-storm | Repository
The Guardian Project
scap-security-guide
Internet Speed Test | Fast.com
Iconsets
Open-Source Identity and Access Management | Evolveum
Cybersecurity Career | Cyber Security Roadmap | Cyber Skills - CSX
Protecting infrastructure secrets with Keywhiz – Square Corner Blog – Medium
Critical Stack, Inc
Computer Repair Services - Computer Repair Services Greenville, SC
Introducing Backpack: Our second-generation modular open switch
Code Climate
CYBATI - home
ESX 5.5 Cheat Sheet using esxcli – Part 1 | UnixGeek
VMware ESXi Patch Tracker - Help
Google Cloud Platform Blog: Save money, improve performance with new VM Rightsiz...
(IT) Information Technology Jobs & Careers | CompTIA IT Certifications
Understanding LDAP Security Processing | Ask the Directory Services Team
Using EPEL repos with Oracle Linux (Wim Coekaerts Blog)
Configuring mrepo to mirror ULN package channels (Oracle"s Linux Blog)
Live Upgrade Survival Guide (Solaris Tips)
IIS 7.5 – How to enable IIS Configuration Auditing? – WebTopics
Reusing Existing Configuration Scripts in PowerShell Desired State Configuration...
angr, a binary analysis framework
Inside My Home Rackspace Private Cloud, OpenStack Lab, Part 1: The Setup - The O...
10Gbps over 62.5µm Multimode Fiber
9 tools to help you with Java Performance Tuning
Fortinet Blog
Building a Vagrant Box from Start to Finish
Fault Tolerance on the Cheap Part I | via @codeship
Using Vagrant with Solaris 11
MonitoringScape
Learn C the Hard Way
Getting Started with Foreman: Part 2 | BeryJu.org
Getting Started with Foreman: Part 1 | BeryJu.org
beausanders.org: Home
Forget Comcast. Here’s The DIY Approach to Internet Access.
AutoVer - Automatic Versioning and Backup - Home
co-hc-5-the-time-to-address-medical-device-cybersecurity-is-now.pdf
Don"t ignore these early warning signs that your IT project is going awry | The ...
wissel.net :: Agile Outsourcing
Windows - Forcing Domain Group Policy | PeteNetLive
Hospital devices left vulnerable, leave patients at risk | CSO Online
What cyberinsurance gotchas companies must be ready for | CSO Online
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations - Kin...
NBlog - the NoticeBored blog: 28 days of awareness: day 10
CIO Jury: One-third of tech leaders had trouble finding cybersecurity staff last...
Organizations In 40 Countries Under "Invisible" Cyberattacks
Seth"s Blog: The two vocabularies (because there are two audiences)
carla schroder Linux - Google Search
Poverty Helps You Keep Technology Safe and Easy | FOSS Force
InfoSec Handlers Diary Blog - Ticketbleed vulnerability affects some f5 applianc...
CloudStats – Best Server Monitoring Tool for SaaS Businesses and Everyone Else
rtop - An Interactive Tool to Monitor Remote Linux Server Over SSH
vSphere 6.5 Seeks to Solve the Virtual Machine Encryption Conundrum
Security and Privacy Guidelines for the Internet of Things - Schneier on Securit...
HolisticInfoSec™: Aikido & HolisticInfoSec™
Clint Boessen"s Blog: Disable RC4 on Windows Servers
Alan"s Blog » Blog Archive » Another User Folder Security Reset Script
Hackers are getting smarter and more sophisticated, says cybersecurity expert
Proper tables with LaTeX – texblog
Security consultancy offers $1 million guarantee against breach-related costs
The next generation of cyber attacks -- PDoS, TDoS, and others
The secrets of top performing information security officers
Thinking Sysadmin | qstat -u aleonard -s z | Page 3
Deploy Offline Root CA in Windows 2012 R2 – SHA-2 Ready | Ammar Hasayen - Blog
PowerUp » Active Directory Security
Microsoft Word - 9b08E004.doc - STARS Information Systems Study.pdf
Use the DISM PowerShell cmdlets or SCCM to slipstream updates – 4sysops
Use DISM to slipstream updates – 4sysops
cyber_envscan_vol2_Apr2016.pdf
ResponsiveVoice.JS
Restyaboard - Trello like kanban board. Based on Restya platform | Restya
software validation fda
Rancher Labs | What"s New in RancherOS v0.5.0 | Rancher Labs
BeeWare - The IDEs of Python
My Top 10 Recommended Web Sites for Free PMP Exam Sample Questions - Project Acc...
Some ESXi CLI Commands – #vBrownBag
Big List of Best FREE PMP Certification Online Study Resources
PACS News
Between reality and cyberspace: Do you know the difference between Queue, MQ, ES...
Microsoft Warns of ZCryptor Ransomware with Self-Propagation Features
BashPitfalls - Greg"s Wiki
Mischa Taylor"s Coding Blog
Midnight Sailing
Fun with IBM Traveler and Java - By Ulrich Krause - eknori.de
DIY Wire Spooler with Clever Auto-Tensioning System | Hackaday
"Has She Gone Mental?" A Queen"s Gambit Leaves Chess World Baffled : The Two-Way...
bmon - A Powerful Network Bandwidth Monitoring and Debugging Tool for Linux
Hack the Gibson VM (CTF Challenge)
Five Books to Change Liberals" Minds - Bloomberg View
Five Books to Change Conservatives" Minds - Bloomberg View
3 open source, useful, powerful, and flexible wikis | Opensource.com
Record and Replay Terminal Session with asciinema on Debian Linux - LinuxConfig....
Asciinema
Everyone makes the same public speaking mistakes - Business Insider
Averting ransomware epidemics in corporate networks with Windows Defender ATP – ...
10 Essential Elements For Your Incident-Response Plan
Humana CIO shares 3 essential skills for building a customer-focused IT team | T...
Cybersecurity"s million dollar jobs | CSO Online
Using Packer with KVM | Midnight Sailing
From Security Perspective, the Quickest Way to Assess Your Web Application - sec...
Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting...
Open Security Research: What"s Really Open? Nmap Tips for an Accurate Port List
Open Security Research: Identifying Malware Traffic with Bro and the Collective ...
contagio
CSIRT Gadgets Foundation
Open Security Research: Application Whitelisting Programs, WinXP EoS, and HIPAA"...
OWASP Open Cyber Security Framework Project - OWASP
Open Security Research: An Open Cyber Security Framework
The Rise in Healthcare Cybercrime ~ Cyber Thoughts
Just How Secure is Healthcare? ~ Cyber Thoughts
An introduction to Performance Co Pilot, part 2. | Frits Hoogland Weblog
LPIC-1: A short overview – – Unixblogger –
DNS Hijacked? Slow? Setup Unbound on pfSense | b3n.org
What’s the actual cost to a business of a data breach? – Naked Security
average consolidated cost of a data breach had moved from $3.8m to $4m in the last year
Your Customers Don"t Care About Your Idea
Your Best Product Idea is Right In Front of You
The 5 Deadly Data Management Sins - Thomas LaRock
Why Build a Productized Service (Instead of Software)?
Vagrant Part 6 - Behind A Proxy Server
Vagrant Part 5 - Installing Your Software
Vagrant Part 4 - Install Boxstarter
Vagrant Part 3 - Provisioning With Chocolatey
Vagrant Part 2 - Provisioning Introduction
Vagrant - Fixing Opentable Basebox looking for Windows Plugin
Meld
How to create a nested ESXi 6.5 Template - ESX Virtualization
Best Practices for Running SQL Server Virtualized | Long White Virtual Clouds
Matt"s blog: Install and run a full functional VMware ESX Hypervisor within a KV...
Using VirtualBox host networks with vagrant
Deploying OpenStack with just two machines. The MaaS and Juju way. – Marco Ceppi
Working On Your Sales Funnel
Building Libvirt-vagrant Compatible Boxes | Linux Simba
Testing Secpod Saner Personal vulnerability scanner | Alexander V. Leonov
VM Remediation using external task tracking systems | Alexander V. Leonov
Zero to Validating a SaaS: A Step-by-Step Recap
Unbelievable ! 30 Linux TOP Command Examples With Screenshots
NetPi Turns Your Raspberry Pi Into a Network Analyzer Tool
Legal/ethical hacking. Information security.
Language Log
NSA-proof SSH « thefastestwaytobreakamachine
Edit your /etc/ssh/sshd_config:
Stop CryptoLocker (and copy-cat variants of this badware) before it ruins your d...
The Perils and Triumphs of Being a Geek: Installing ESXi in a QEMU-KVM virtual m...
ITIL Service Management: Service Management Document System
A Balanced Scorecard for the Cloud – Jim Kaskade
Instructions for Editing hosts.allow and hosts.deny Files
Dell_EMC_HC_MedDeviceSecurity_WP_final.pdf
2016_HoB_RDBMS_Licensing-White-Paper.pdf
Hector Marco Gisbert - Lecturer and Cyber Security Researcher
Raspberry Pi-based signage stack gets Snappy
Creating a good, secure Docker base image · Moritz Heiber
A modern and Open Source Web client for XMPP | Kaiwa
OpenStack Wiki in Short – A Quick Guide to Open Cloud | Cloudify
ITIL-v1.1.pdf
events.linuxfoundation.org/sites/events/files/slides/Introduction_to_vagrant_KVM...
DCM4CHE Support Forums: C-Store SCP Performance Question ...
DICOM @ OFFIS • View topic - Slow storescu/scp transfer
fossology-overview-20151109.1.pdf
EXFiLTRATED
Remove Extra Registry Settings from GPO - emtunc"s Blog
ELRepo : filesystem, graphics, hardware monitoring, network, sound and webcam dr...
Easy Appointment Scheduling With Easy!Appointments
HP Software Delivery Repository
OpenStack Docs: Example: Microsoft Windows image
Vagrant Part 1 - Easy Virtual Machine Management
DicomServer @ Medical Connections Ltd
DICOM is Easy: DICOM
David Clunie"s Blog: Image Sharing: Are we there yet? It seems not.
David Booth
David Rogers: Using Linux"s Logrotate to Manage Alert and Listener Log Files
Disk I/O | Performance Tuning on Linux
Federal-Whitepaper-Everything-You-Wanted-to-Know-about-DISA-STIGs.pdf
CloudU Certification
Bourne Shellscript
CLI-Ref-Guide-v3-2015-CAD.pdf
byronpate.com - Stop, Think, Execute
BSPG
The Art of Gilly Hathaway
Roundup
Easy Automated Web Application Testing with Hudson and Selenium - Treehouse Blog
VMware releases STIG Compliance App for FREE - VMware Security & Compliance Blog...
Java Performance Monitoring: 5 Open Source Tools You Should Know | Takipi Blog
Are ESXi Patches Cumulative - VMware vSphere Blog
VMware Security & Compliance Blog - - VMware Blogs
Chasing the bottleneck: True story about fighting thread contention in your code...
Building a Low-Power, High-Performance Server to Host Virtual Machines - Patshea...
HowTo Disable the “ZEROCONF” in Linux | Tips & Tricks
Odd Bits
NachoTech: How to find all the iLO’s on your network
ICE9 Blog: BLE Fun With Ubertooth: Sniffing Bluetooth Smart and Cracking Its Cry...
Logging Cowrie logs to the ELK stack
7 Stellar IT Management Podcasts - Capterra Blog
9 Docker recipes for Java EE Applications - Tech Tip #80
vCheck (Daily Report) | Virtu-Al.Net
ghettoVCB VIB & offline bundle for ESXi | virtuallyGhetto
Find A Doctor | Free Doctor Reviews & Ratings | Vitals.com | Rate MDs & Review D...
How to patch ESXi 5 without vCenter | ESX Virtualization
vCenter Appliance 6.0 - Simplified Scripted Installation - ESX Virtualization
Blog Series: ESXi 5 STIG – ESXi Server SSH Daemon | VM Field Tips
How to patch VMware ESXi 5 host using command line
Get Giver To Work In Ubuntu 11.10 And 11.04 [Quick Tip] ~ Web Upd8: Ubuntu / Lin...
Try VMware Workstation Pro, Run Linux and Windows in a Virtual Machine
Home - VulnerabilityAssessment.co.uk
10 gadgets every white hat hacker needs in their toolkit
Proxmark3
`top` command cheat sheet
Using the Shikra to Attack Embedded Systems: Getting Started - Xipiter
Shikra
Howto: Create a nested lab
Yosemite Project | Mission: Semantic interoperability of all structured healthca...
Clonezilla Live on PXE server
Troubleshooting High I/O Wait in Linux
[bc-log]: A Linux Systems Administration Blog
So You Want an SSL Certificate? A Pragmatic Handbook - Artsy Engineering
The secret world of microwave networks | Ars Technica
No-Cook Overnight Oatmeal Recipe - Allrecipes.com
Packer – automating virtual machine image creation
Chef cookbook implementation of the CIS CentOS and Ubuntu Linux 6 Benchmark
InfoSec Handlers Diary Blog - Packet Analysis - Where do you start?
How to Check Database Availability from the Application Tier | SQL Server Custom...
Solving SQL Connectivity issues: A new guided walk through just got published – ...
Migrating your TFS to the Cloud – Microsoft Faculty Connection
FreeNas Podcatcher: Bashpodder | Amado Martinez
US Army Bug Bounty Program Fixes 118 Flaws - Dark Reading
Securing SAP Clouds: Application Security
How to encrypt VirtualBox VMs - TechRepublic
Shadow Regulation Around the World | Electronic Frontier Foundation
DBaaS Performance | Oracle Scratchpad
Cyber Security Attackers Toolkit – What You Need to Know – Enterprise Mobility a...
Beginner Guide of mysql Penetration Testing
Back to Basics: Focus on the First Six CIS Critical Security Controls - basics-f...
How DevOps became mainstream in the enterprise
SharePoint Crawl log and the mysterious SearchID… – Blog On Search
AWS for VMware Admins - London VMUG Slide Deck - Tekhead.it
Welcome to the Adafruit CircuitPython Beta! « Adafruit Industries – Makers, hack...
MalDuino — Open Source BadUSB | Hackaday
DeployHappiness | Quick Tip: Add Computer to Group – GPUpdate without Restart
klist -li 0x3e7 purge
Real World Computing: Getting Contacts (Not Users) out of Your Notes/Domino NAB ...
For those missing Lotusphere or IBM Connect right now, years of pictures | IdoNo...
ReFS cluster size with Veeam Backup & Replication: 64KB or 4KB? - Virtual to the...
Muxtronics 12V Powerbank
Linked - Deutsche Bank Bans Text Messages, WhatsApp on Company Phones
Storing PowerShell Credentials in JSON
KDEConnect - KDE Community Wiki
Errata Security: The command-line, for cybersec
Smashing Security Podcast
Minimizing Legal Risk When Using Cybersecurity Scanning Tools - minimizing-legal...
Some useful forensics tools for your forensics investigation by AdminAdmin - dig...
Press Releases - News | Kroll
My Take on Application Whitelisting
Set Date and Time for Each Command You Execute in Bash History
Waveconverter
Data breaches up by 40 percent in 2016
Are you doing your part to thwart DDoS attacks?
EC2Instances.info – A Handy Interactive Guide to AWS EC2 Instance Sizing and Pri...
Dangerous assumptions that put enterprises at risk | CSO Online
Building a Magic Mirror; Nifty Opto-Isolator Tricks | TroyDenton.ca
An introduction to PCP / Performance Co Pilot on Oracle Linux | Frits Hoogland W...
FDA Recommendations on Medical-Device Cybersecurity - Schneier on Security
A visual map of emerging cybersecurity trends - TechRepublic
How much is a data breach going to cost you? | CSO Online
Why you"re not investing enough in IT security | CSO Online
Join an Additional Ubuntu DC to Samba4 AD DC for FailOver Replication - Part 5
Install Arch Linux VirtualBox
10 open source task management and time tracking applications for Android | Open...
4 key IT trends for CIOs in 2017 | The Enterprisers Project
The Most Dangerous User Right You (Probably) Have Never Heard Of – harmj0y
Trying to become another user on Linux/getting error logging to server – su: can...
Cisco Licence Differences LAN-Lite / LAN Base / IP BASE / IP Services | PeteNetL...
MSSQL user can’t connect until password change | Annoying stuff I figured out (o...
Technical notes, my online memory: kubectl Kubernetes Cheat Sheet
Creating a GitHub Repository from PowerShell
Electronic Discovery Law Throughout the United States
Did a Russian Physicist Invent Radio? | Hackaday
Tickets"n"patches
Tickets"n"patches
Res Publica Non Dominetur – カルマン » Blog Archive » LiPo Batteries Hacking and ref...
How to Easily Upgrade Ubuntu"s Linux Kernel With Ukuu
Tracking Planes with an ESP8266 | Hackaday
ESP8266
Clang-format for consistent coding style | Opensource.com
SSWUG.ORG - Your IT Professional Source For Answers
wistar packer
SenateCaller
check_ioc
Wistar
21 Cyber Security Blogs that Keep IT Pros in the Know
index of /
getAbstract: The world of business, summarized.
KVM - VM Templates - EverythingShouldBeVirtual
Ubuntu 16.04 / Debian 8: Run PXE boot server for automated install - Narrow Esca...
Using Key Vault Secrets in PowerShell – Practical Development
Stack Exchange Security Blog
Seven Weeks
Everyday Retrospective - Agile Retrospective Resource Wiki
How to Increase the size of a Linux LVM by adding a new disk | RootUsers
DAG: mrepo: Yum/Apt repository mirroring (fka yam)
zfs terms
Ginkgo CADx | Ginkgo CADx, Open Source DICOM CADx environment
OpenSolaris Home Server: ZFS and USB Disks (Constantin"s Blooog)
ZFS: You should use mirror vdevs, not RAIDZ. | JRS Systems: the blog
lowRISC · lowRISC
How to patch an ESXi host through a USB flash drive | IT vlab
PowerShell: Report expiring certificates « BUG-MAN Ltd.
Win-Fu Official Blog: Every Windows 10 in-place Upgrade (even with SCCM) is a SE...
Win-Fu Official Blog: Every Windows 10 in-place Upgrade is a SEVERE Security ris...
DNS short name lookup fails on Ubiquiti EdgeRouter Lite"s latest firmware v1.9.1...
What Does the Windows 10 "Creators Update" Do for Security?
How to Trace Execution of Commands in Shell Script with Shell Tracing
Uncovering Indicators of Compromise (IoC) Using PowerShell, Event Logs and a Tra...
Surveillance State “at home” Edition | Jethro Carr
InfoSec Handlers Diary Blog - py2exe Decompiling - Part 1
Photocopier Security - Schneier on Security
Evil Tester: Lessons Learned from Arnold Schwarzenegger Applied to Software Test...
5 ethics principles big data analysts must follow - TechRepublic
5 Reasons to Avoid Smart Assistants If You Value Your Privacy
SQL Server Performance Dashboard Reports unleashed for Enterprise Monitoring !!!...
Open Source Canvas: A business plan for your open source project | Opensource.co...
Open Source Canvas
Open Network Linux
SST - ESP8266 Smart Thermostat WiFi IoT ready • Hackaday.io
NBlog - the NoticeBored blog: Internet security awareness
HolisticInfoSec: The DFIR Hierarchy of Needs & Critical Security Controls
Getting to Know the Windows Server 2016 Essentials Dashboard - We Got Served
Nutanix Performance with Oracle SLOB on All Flash Nodes | Long White Virtual Clo...
Creating a Flowchart with TikZ and LaTeX | Connor Johnson
Aaron Toponce : ZFS Administration, Part I- VDEVs
ZFS - ArchWiki
Flowchart | TikZ example
Guilt-Free Banana Pudding (No Dairy or Gluten) | Paleo Grubs
Cheat sheet: which 4G LTE bands do AT&T, Verizon, T-Mobile and Sprint use in the...
An ITIL guide that is not boring
ITIL Certification Guide: Overview And Career Paths
ZFS Tutorials : Creating ZFS pools and file systems
ITIL Certification
2016"s hacks, attacks and security blunders
Welcome To The Resource Center | IDERA
UtahSysAdmin.com | Configuring Nagios Plugins & NRPE on Solaris 10
Open Source Forensic Tools… which means it’s Free – H-11 Digital Forensics
Tools - ForensicsWiki
mubix/infosec_newbie.md
Open Source | Smarter Forensics
https://github.com/binarymist/Free-Security-eBooks
The most important JVM memory tuning parameter- and how to ace it.
Troubleshooting performance issues in Linux - RimuHosting
How to Tune Java Garbage Collection | CUBRID Blog
Everything I Ever Learned About JVM Performance Tuning @Twitter
Linux - Performance Issues Troubleshooting - UnixArena
Slow Server? This is the Flow Chart You"re Looking For
Windows Command Line Sheet - windows_command_line_sheet_v1.pdf
Test-Kitchen & Serverspec with Windows guests - Dreaming in DevOps
Getting started with Serverspec | Damyan"s Blog
fsck-convenient
Nick"s Tech Blog | Understanding case sensitivity in Windows: obcaseinsensitive,...
Testing Windows Infrastructure with ServerSpec | Shaw Innes
How I Carried The Message To Garcia - Foundations Magazine
Index of /code/nipl-tools
FH Consumer Cost Lookup
UNIX Shell Skills « WordPress Codex
Nessus Training - Session 2 - Scanning Handout - nessus2.pdf
serverspec the new best way to learn and audit your infrastructure
Downloading in bulk using wget | Internet Archive Blogs
Truncate a SharePoint database log file – SharePoint Steve
Upgrade Active Directory Server 2016 from Server 2012 R2 | JDeployment
reporting the nested errors in PowerShell – Sergey Babkin
expect in PowerShell – Sergey Babkin
How to Properly Wrap All Your Cables so They Don"t Turn Into a Tangled Mess
Errata Security: IoT saves lives but infosec wants to change that
5 Ways to Penetration Testing of HTTP Protocol (Verb Tempering)
My Journey to Improve Disk Performance on the Raspberry Pi | Linux-toys.com
diff in PowerShell – Sergey Babkin
how to install a new Windows service – Sergey Babkin
Setting up the CredSSP access for multi-hop – Sergey Babkin
CredSSP
InfoSec Handlers Diary Blog - Using daemonlogger as a Software Tap
/usr/local/sbin/daemonlogger -i eth0 -o eth2 -d
How to install malware detection and antivirus on CentOS 7 - TechRepublic
SQL Server Disk Allocation Size – SharePoint Steve
How to set up a manual threat intelligence lifecycle program
Magic Mirror 2
Dark matter scientist Vera Rubin dies at 88
Recent Raspberry Pi projects to add to your To Do list | Opensource.com
200 Years of The Stirling Engine | Hackaday
Vera Rubin, Astrophysicist Who Confirmed Existence Of Dark Matter, Dies At 88 : ...
OSMC
Wordpress Penetration Testing using Symposium Plugin SQL Injection
CIS Critical Security Controls
NBlog - the NoticeBored blog: CIS Critical Security Controls [LONG]
IsecT infosec consulting
NBlog - the NoticeBored blog: You know you"re a geek if ...
PRAGMATIC
ISO27k infosec management standards
sysadvent: Day 24 - Migrating from mrepo to reposync
Alan"s Blog » Blog Archive » Get COM Object Constants with PowerShell
Importing and mounting ZFS pools at boot time on Fedora servers
The importance of cleaning up disk headers after testing
mdadm –zero-superblock
Web Testing with PowerShell
Small-scale honeynet with Raspberry Pi
Sysadmins and risk-management - SysAdmin1138 Expounds
Securing Linux with kernel hardening features
Error inside a LXC container: bash: fork: retry: No child processes – – Unixblog...
MalwareJake: Encryption of healthcare SAN/NAS
Investments In Security Operations Centers Are Paying Off, Study Finds - Dark Re...
Major Cyberattacks On Healthcare Grew 63% In 2016
Cybersecurity is a chess marathon with hackers: Carl Herberger | CSO Online
contagio: 16,800 clean and 11,960 malicious files for signature testing and rese...
Search And Collect
Using Ceph as Block Device on CentOS 7
Open Source ERP and CRM | Odoo
$5 DigitalOcean, Vultr & Lightsail Benchmarks | b3n.org
Pressure Cooking Boneless Skinless Chicken Breasts Recipe | Yummly
vSAN in cost effective independent environments
Unsealed suit targets law firm for alleged lax cybersecurity
New version of drivers harvester copies all OEM drivers to separate folder – Ale...
SQL Server on Linux, aka project Helsinki: Story behind the idea – Slava Oks"s W...
The numbers don’t lie. 9 facts that prove IT Certification works. – Microsoft Pa...
How Has Amazon Managed To Make Hackers Love Alexa? | Hackaday
Running Ansible in a Vagrant-Controlled Virtual Machine - Building Network Autom...
guestwlan
Samy Kamkar Illustrates How to Be a Hardware Hacker | Hackaday
SamyKamkar
Open G Apps
C:OUTPUTGARCIA.DVI - Message to Garcia.pdf
Vulners - Vulnerability Data Base
Stop CEO/CFO Domain Spear Phishing | Linux Included
KidsWifi | Protect your kids online
tikzpgfmanual.pdf
My Take on an Azure Open Source Cross-Platform DevOps Toolkit–Part 2 – All thing...
How to Build You Own Personal Jenkins CI Server - DZone DevOps
How to provision Dockerized hosts with Docker Machine from Linux Mint 18, 18.1 |...
InfoSec Handlers Diary Blog - Internet Storm Center Diary 2016-12-18
American Consumer Council- A Non-Profit Consumer Education Organization
Using docker-compose for multi Docker container solutions | Marco Franssen
Speed-Test Your Toys with Die-Cast Drag Strip | Hackaday
Power BI – 12 Days of Dashboards – Sam Lester – SQL Server & BI Premier Field En...
VMware VCSA 6.5 Active-Passive Setup With Simple Configuration - [LAB] - ESX Vir...
Digital Transformation through IoT
BizTalk Health Monitor v4.0 released! – BizTalkHealthMonitor
Using Non-default Ports for SQL Server - Thomas LaRock
Installing Ansible 2.2 on Ubuntu 16.04 · Scott"s Weblog · The weblog of an IT pr...
DSHR"s Blog: The Medium-Term Prospects for Long-Term Storage Systems
A How-To in Homebrew Design, Fab, and Assembly with Structural Framing Systems |...
IT heads lack the confidence to fight security threats
IT leaders look to the cloud for backup and recovery
openDCIM - Open Source Data Center Infrastructure Management
5 simple tips for building your first Docker image with Java - O"Reilly Media
Encrypt Password In CTX1 Encoding With PowerShell | chentiangemalc
Ansible snippet | panticz.de
Bluetooth Turns 5 | Hackaday
10 Basic Python Examples That Will Help You Learn Fast
From the Canyon Edge: Ubiquiti Networks UniFi Controller in an Ubuntu LXD Machin...
How do security professionals study threat actors, & why do we do it? | Hacks4Pa...
SSH Reverse Tunnelling Tips & Tricks | Midnight Sailing
Useful Virtual Box Virtual Machine Script - Blog - Blog - IDERA Community
Testing Solaris IPMP failover | setaOffice
cybersecurity_report.pdf
I just connected to a terminalmserver - Fun with virtualizationFun with virtuali...
InfoSec Handlers Diary Blog - 5 Questions to Ask your IoT Vendors; But Do Not Ex...
This easy presentation software lets students focus on content, not design – Mic...
The Frustrated DBA | Late Night Oracle Blog
Building a Nested ESXi Lab For Your Company | Virtual Insanity
Rapidly Clone Whole Test/Dev/Lab Environments with vRA and NSX | Virtual Insanit...
Packer.io machine building and provisioning part 2 | Marco Franssen
Packer.io machine building and provisioning part 1 | Marco Franssen
Backup performance of VMware VVOLs - Virtual to the Core
Monitor a Ceph cluster with Ceph Dash - Virtual to the Core
Netflix runs 100% on AWS now - Virtual to the Core
Share your Veeam code on VeeamHub! - Virtual to the Core
Configuring Windows machines for Ansible - Virtual to the Core
Increase the performance of your Veeam backups in network mode - Virtual to the ...
The Kid Should See This.
My new helper Ansible – – Unixblogger –
Home - TelekomCLOUD
Contribution to OpenSCAP with Jenkins | Zbynek"s blog
How much memory is truly used by my Oracle instance? | Frits Hoogland Weblog
Zbynek"s blog | Just another WordPress site
RSS
inoug16_misconfig_default.pdf
LaTeX Templates » Cheatsheet
security-scripts
Checklist Service Design Package SDP - IT Process Wiki
www.oaktable.net
Using Ansible for executing Oracle DBA tasks. | Frits Hoogland Weblog
The Twelve-Factor App
Cyberseek
Service Design Package (SDP) Template | My ITIL Journey
CryptoLicensing For .Net - Add licensing, copy-protection and activation to C# a...
Moving Faster with Packer to Build Images
Connecting to a Remote Serial Port over TCP/IP
Make RS232 Serial Devices Accessible via Ethernet | Philipp"s Computing Blog
OpenSlava 2016
Eramba - Open-Source IT GRC
Tech DebugPacker vmware-iso builder on ESXi without DHCP - Tech Debug
PSScriptAnalyzer
OWASP ModSecurity Core Rule Set (CRS)
Data Center Map
PF for Solaris (Solaris Firewall)
Creating Windows 10 Visual Studio 2015 VirtualBox Vagrant box using Packer
On managing large documents – texblog
TreeSheets
Configure HP ILO directly on ESXi server - Virtual to the Core
Packer – automating virtual machine image creation
Free Ransomware Decryption Tools | Unlock Your Files | Avast
How to install or upgrade SAP Systems to SQL Server 2016 *updated* | Running SAP...
Evil Tester: Taking Software Testing More Seriously By Using Humour
SQL Server 2016 SP1: Know your limits – MSSQL Tiger Team
Secure IoT Through Oversight, Open Source and Open Standards | Security content ...
How to setup rsyslog for Centralized Log Management
25 Best Habits to Have in Life
At Long Last, Linux Gets Dynamic Tracing - The New Stack
How To Check Laptop Battery Status In Terminal In Linux - OSTechNix
upower -i `upower -e | grep "BAT"`
Why You Should Have a Personal CI Server - DZone DevOps
360 GSP Blog Awards - Top 50 Blogs in IT - 360 GSP Blog
Bare metal and Virtual Machine Provisioning through Foreman Server
Manage Samba4 AD Domain Controller DNS and Group Policy from Windows - Part 4
Manage Samba4 Active Directory Infrastructure from Windows10 via RSAT - Part 3
VMware vSphere 6.5 Configuration Maximums - ESX Virtualization
Automating the build of your vSphere 6.5 home lab - Virtu-Al.Net
An Amateur Radio Repeater Using An RTL-SDR And A Raspberry Pi | Hackaday
Taking It To Another Level: Making 3.3V Speak with 5V | Hackaday
Convert Cabinet Shelves into Pull Out Drawers - YouTube
How to Install Gitlab on Debian 8 (Jessie)
httpstat - A Curl Statistics Tool to Check Website Performance
OpenStack Day Canada Recap – DiscoPosse.com
Install Security Patches or Updates Automatically on CentOS and RHEL
How to Manage Samba4 AD Infrastructure from Linux Command Line - Part 2
Create an Active Directory Infrastructure with Samba4 on Ubuntu - Part 1
The Future of the DBA - Thomas LaRock
A Network of Sorrows: Small Adversaries and Small Allies - Quinn Norton | Open T...
BITAG
DSHR"s Blog: Talks at the Library of Congress Storage Architecture Meeting
San Francisco MUNI hacker was hacked
Seth"s Blog: Hobson"s choice, Occam"s razor, Wheeler"s which and the way we deci...
AWS Certified Developer Associate (CDA) Exam Experience & Tips - Tekhead.it
The Technology chronicle!!!: Windows Server 2016 - Introducing Nano Server
AI is the Future of Project Management – Part II
AI is the Future – and the Present – of Project Management
Photon Controller v1.1 and vSAN interoperability - CormacHogan.com
Reaction: Issue a press release - "net work
CERT warning: Windows 10 is less secure than Windows 7 with EMET
How to keep track of your Windows 10 update history
Kaspersky: DDoS attacks are a smokescreen
North American businesses suffer twice as many cyber attacks
Many users don"t want to deal with breached businesses
The lure of keygens helps spread Gatak malware through the enterprise and health...
Using Ansible Playbooks with Cisco VIRL - Building Network Automation Solutions
What are the benefits of DevOps?
Why cloud? Justification for non-techies
A VMware guy’s perspective on containers | mwpreston.net
How to create a USB media with ESXi 6.5 Installation - ESX Virtualization
How to remap F2 in Supermicro iKVM Remote Console to get to VMware ESXi "Customi...
nuzzel.com
Go Beyond Local with Secure Shell | Linux.com | The source for Linux information
Presentation - NetScaler goes cloud | sepago
Shadow IT– Learn how to get control now – Enterprise Mobility and Security Blog
3 Tips for Keeping Your Local Git Repositories Happy - Wahl Network
Unix ports for OS/2 and eComStation - Unix Ports for OS/2 & eCS
Nakivo Backup Copy - Why would you use it? - ESX Virtualization
Personal Finance Blog: MoneyPantry
How to Upgrade ESXi 6.0 to 6.5 via CLI [On Line] - ESX Virtualization
VMware vSAN: 2016 Edition – vNinja.net
Making an Impact with Local Security Conferences – Chris Sanders
Using File Server Resource Manager to Screen for Ransomware
Anti-Ransomware File Server Resource Manager Filters
Creamy Chicken Bacon Pasta Recipe | TipHero
How Analysts Approach Investigations – Chris Sanders
Three Useful SOC Dashboards – Chris Sanders
The Learning Toolbox
Adapting the World to Her -Jake | Memories for Rebecca
Grace Hopper, Margaret Hamilton, Richard Garwin Named for Medal of Freedom | Hac...
Creating A PCB In Everything: KiCad, Part 1 | Hackaday
Exponential change in IT requires continuous improvement – Here"s how to get the...
Yes, You Can Exercise Right Now! Anywhere
Why you should never work longer than 90 minutes at a time - Business Insider
How to easily update your VMware vCenter Server Appliance to vCSA 6.5 (coming so...
How to easily update your VMware Hypervisor to ESXi 6.5 (coming soon) | TinkerTr...
Errata Security: DoD address space: it"s not a conspiracy
joeware – never stop exploring… :) » Blog Archive » Hey joe, How Do I Quickly Ge...
adfind -gcb -sc dcdmp -dsq | adfind -nodn dnshostname operatingsystem operatingsystemservicepack –jtsv2
The Tiny Internet Project, Part II | Linux Journal
The Tiny Internet Project, Part I | Linux Journal
5 Fun Raspberry Pi Projects: Getting Started | Linux.com | The source for Linux ...
Apollo code developer Margaret Hamilton receives Presidential Medal of Freedom |...
Obama honors code pioneers Grace Hopper and Margaret Hamilton
Setting yourself up for success with Veeam Pre-Job Scripts | mwpreston.net
The Lost Civilization of Dial-Up Bulletin Board Systems - The Atlantic
Neofetch - Shows Linux System Information with Distribution Logo
Andy"s House O" Blog: #employed
Analyzing SQL Server Buffer Pool with TreeMaps in PowerShell | SQLvariations: SQ...
FinanceProfessor.com: Podcast episodes for economics classes
Reaction: DNS is Part of the Stack - "net work
Samy Kamkar: PoisonTap - exploiting locked computers over USB
Vembu Universal Explorer - Free Tool - ESX Virtualization
PechaKucha - Wikipedia
PechaKucha
How I nearly almost saved the Internet, starring afl-fuzz and dnsmasq » SkullSec...
grance-tim-slides.pdf
Default Protections for Popular Software
Why DNS is awesome and why you should love it » SkullSecurity
Building Better PowerShell Dashboards | Tim Bolton - MCITP - MCTS
Tim Bolton - MCITP - MCTS | Sharing information about IT and things I have broke...
PowerShell Magazine » “PowerShell Security Special”
About | BatchPatch - The Ultimate Windows Update Tool
Michigan CyberSecurity - Michigan Cyber Civilian Corps
LaTeX Templates - ShareLaTeX, Online LaTeX Editor
Assembling a Container Security Program: Container Validation
Assembling a Container Security Program: Monitoring and Auditing
Assembling a Container Security Program: Securing the Build
Dynamic Security Assessment: The Limitations of Security Testing
Test-Playground – Kitchen DSC for PowerShell – Tech, Automation, Life
SQL Server Management Tools on Windows and Other Platforms at #SQLSummit | SQLva...
Uncover insider threats, blind spots in your network with Advanced Threat Analyt...
PowerShell for SSRS is Here! | SQLvariations: SQL Server, a little PowerShell, m...
DIY Baby Monitor | Antibore"s Blog
Safely storing credentials and other things with PowerShell | Tim Bolton - MCITP...
Getting started with Windows Server Containers – Django Example – Tech, Automati...
scap_steveakers.pdf
Computers & Security - Journal - Elsevier
Stephen Walker Obituary - Severna Park, MD | Baltimore Sun
Cyber Deception Technology Market to Generate Revenue over USD 1 Billion Forecas...
PXELINUX for booting of ISO images « HIGAKNOWIT.COM
Ubuntu 12.04 PXE Live CD Server | Core Dump
PXE Boot any ISO Image | Core Dump
Life-Without-DevStack-OpenStack-Development-With-OSA-1-.pdf
PXEInstallMultiDistro - Community Ubuntu Documentation
Association of Information Technology Professionals -- AITP
Quote Investigator
Makhaon - professional solutions for medical visualisation
A Quick Intro Screen on Linux – DiscoPosse.com
Using Linux auditing to observe program executions and file accesses
GitBook · Writing made easy
My Life in the Connector Zoo | Hackaday
Talk Recap: Holistic Security for OpenStack Clouds - major.io
5 Essential Tools To Secure Your Business from Cyberattacks - Business Opportuni...
Success is not a linear path – NoDaysOff Magazine
Technical notes, my online memory: Vagrant, Packer, and Boxcutter FTW: Create a ...
Installing and Running a Headless Virtualization Server | Linux Journal
Maple-Roasted Sweet Potatoes Recipe - EatingWell.com
Baked Cheeseburgers | Healthy Recipes
How to structure sites in your SharePoint Intranet - SharePoint Maven
Internet of Things (IoT) Scanner - BullGuard
Blocking countries via iptables // Room362
Errata Security: Configuring Raspberry Pi as a router
Jim Collins - Articles - Hedgehog Concept in the Business Sectors
US-CCU Cyber-Security Matrix
SANS Penetration Testing | Scapy Cheat Sheet from SANS SEC560 | SANS Institute
Debian: installing a PXE server on Wheezy — Hackzine Wiki
Create Windows Vagrant Box(s) – Aslan Brooke"s Blog
Simple Samba Shares in Debian - Thomas-Krenn-Wiki
Tickets"n"patches
9.1. Building smart diagrams
InfoSec Handlers Diary Blog - ISC Briefing: Large DDoS Attack Against Dyn
ICS Cybersecurity Conference
TOra is an open source SQL IDE for Oracle, MySQL and PostgreSQL dbs
EM4100 RFID Cloner kit | KBEmbedded
merit | Connecting Organizations, Building Communities
Bruteforcing Windows over SMB: Tips and Tricks » SkullSecurity
DPAP | Defense Acquisition Regulations System | DFARS/PGI
Moderncv Banking - LaTeX Template - ShareLaTeX, Online LaTeX Editor
Creating Mind Maps Using TikZ - ShareLaTeX, Online LaTeX Editor
DCM4CHEE PACS Migration made easy in couple of hours. | Rady"s Inspirations
DeJarnette | HL7, DICOM, XDS, IHE, VNA, Vendor Neutral Archive, Data Migration
Michigan Cyber Civilian Corps
LaTeX KOMA template
Do you really need one year old Logs and Traces for your Oracle Database? | Cara...
retention
How To : Setup a PXE Boot Server on Debian Part 1 » The Rantings and Ravings of ...
Net booting a Linux workstation
Pi 3 booting part II: Ethernet - Raspberry Pi
Research.
Setting Up A PXE Install Server For Multiple Linux Distributions With Ubuntu Edg...
PXE Boot server
PXEBootInstall - Debian Wiki
Setting up a "PXE Network Boot Server" for Multiple Linux Distribution Installat...
blog.wakatta.jp
Ubuntu 16.04 / Debian 8: Run PXE boot server for automated install - Narrow Esca...
Carolina Advanced Digital: Networking, WiFi & Security
Quick Sequence Diagram Editor download | SourceForge.net
File Integrity Monitoring With AIDE - General Discussion Forum - General Discuss...
Cyber Exercise Playbook - pr_14-3929-cyber-exercise-playbook.pdf
Introducing CNAME Flattening: RFC-Compliant CNAMEs at a Domain"s Root
Remediation through SCAP - Simplicity is a form of art...
SCAP Workbench | OpenSCAP portal
SIMILE Widgets
TheFrugalComputerGuy.com
PechaKucha 20x20
SQL Server 2012 Master Query | Chris Blogs
Microsoft PowerPoint - CON8015_Compliance_EDG Final.pptx - con8015-compliance-ed...
Audit Rules
How many open FTP servers are there?
Information technology | NIST
eSCAPe
Upgrade your SSH keys! · blog.g3rt.nl
WMI vs. WMI: Monitoring for Malicious Activity « Threat Research Blog | FireEye ...
EECS 588 - Reading List
J. Alex Halderman
Windows Update & WSUS Patch Management Software Tools | BatchPatch
wmic useraccounts
IOActive Labs Research: Multiple Vulnerabilities in BHU WiFi “uRouter”
Network Weathermap – Open Source Network Visualisation
Tips & Tricks: YOU HAVE LOST ACCESS TO SQL SERVER. NOW WHAT? – All things Data R...
Local Update Publisher
CANES 101 Brief - 1.25.12_AFCEA_Kit_VIII.pdf
Canes_Supplement_Defense_Daily.pdf
CANES - Consolidated Afloat Networks and Enterprise Services
DIACAP_Slick_Sheet.pdf
ATO meaning | DOD Joint Acronyms & Abbreviations Dictionary
Spotting the Adversary With Windows Event Log Monitoring
WuInstall
The 5 Best Hacks for Your Amazon Dash Buttons
Bluetooth 5: What"s New and What"s Good?
How to Estimate Your Vocabulary Using a Python Script and the Scrabble Word List...
Show us your ugly repair - Page 1
Chemical Formulas 101 | Hackaday
The Best of the Z-Wave Door and Window Sensors - DarwinsDen.com
SNMPPLUX | Pentura Labs"s Blog
Updating Dell PowerEdge servers via bootable media / ISO | Dell US
Building a mail server with Puppet | Jethro Carr
8 Best Sites to Help Your Kids Learn About Money
The origins of on-call work - SysAdmin1138 Expounds
BlackHat/Def Con/BSides Talk Picks for 2016 // Room362
Home - National Association of State Technology Directors
SharePoint Intranet Homepage Best Practices - SharePoint Maven
Moving a Static Site to S3 Before My Girlfriend Got Out of the Shower
The Enhanced SCAP Editor (eSCAPe) and Libraries - Automation_Content_Tutorial-eS...
MDL
DSHR"s Blog: Brief Talk at the Storage Architecture Meeting
The FBI recommends you cover your laptop"s webcam, for good reason
Docker - Creating An Alpine Image With Ansible Installed - EverythingShouldBeVir...
System emulation using QEMU
Introducing 411: A new open source framework for handling alerting - Code as Cra...
CozyRoc | SQL Server 2005 Integration Services (SSIS) information, products, fre...
Life On Contract: Estimating Project Time | Hackaday
Snagging creds from locked machines · Room362
Cohesity 3.0 – One platform for all your secondary storage! | mwpreston.net
Why ransomware should be feared by companies of all sizes
Karosium: SMBusb - Open-source USB SMBus interface
smbusb
Whats in my PowerShell Profile | SQLvariations: SQL Server, a little PowerShell,...
Poor PAC File Performance–A WireShark Example | chentiangemalc
Wine Reviews : WineTricks has seen a massive amount of improvements this year
Installing BlackArch Linux on a Raspberry Pi | FOSS Force
Great Feats of Deployment: OpenStack in 90 Minutes - This is Hyper-Awesome
Introducing Advanced Threat Analytics v 1.7! – Enterprise Mobility and Security ...
MDADM: Convert RAID5 to RAID10 - Walery Wysotsky Site
OpenWISP Project - What is OpenWISP?
Unifi competitor?
Atlanta.mdf
RACI Matrix
Overnight, No-Cook Refrigerator Oatmeal
Vulnerable By Design ~ VulnHub
oot2root/CTF challenge which attempts to showcase a real-world scenario, with plenty of twists and trolls along the way.
binwalk.org
Insider Threat
Center for Development of Security Excellence (CDSE)
Investment Management, Online Financial Advisor | Wealthfront
ToolsWatch.org – The Hackers Arsenal Tools Portal » AutoNessus – Python Script t...
Corner Office from Marketplace
Real World Computing: Looking at Cloud Licensing - Microsoft, IBM and Google
Coffee Shop DevOps: How to use feedback loops to get smarter | Opensource.com
How to Install Windows PowerShell in Linux - OSTechNix
Turtl: Secure, Open Source Evernote Alternative ~ Web Upd8: Ubuntu / Linux blog
Laptop pioneer John Ellenby dies
John Ellenby
Replicating SAN on openSUSE with VAAI - Blah, Cloud.
Do It Yourself Gadgets: USB LED indicator Power Bank from Laptop Battery
Wikibon.com | Wikibon.com
OpenHAB & Z-Wave - Home Automation For Geeks
Useful SystemD commands (hints for systemctl or systemctl vs chkconfig and servi...
systemctl enable
How Analog Design Is Different Than Digital | Technogog
Crowdsourcing Community Knowledge with CloudPhysics - WoodITWork.com
product-lifecycle-matrix.pdf
How to verify your HIPAA compliance
History Of The Diode | Hackaday
How to Encrypt and Decrypt Files and Directories Using Tar and OpenSSL
Easily Correct a Typo of Previous Command Using Carat (^) Symbol
FOG Project
How to Mount Remote Linux Filesystem or Directory Using SSHFS Over SSH
OpenWISP Project - Homepage
CloudFlare Dynamic DNS Update Script (cf-ddns.sh) – vNinja.net
Dynamic DNS Requirements – vNinja.net
Using CloudFlare for Dynamic DNS – vNinja.net
Nakivo – Backup and Replication for your VMs – A review! | mwpreston.net
What is The Cheapest VMware vSphere License? - ESX Virtualization
Clint Boessen"s Blog: The Danger of the Local Administrator Account
Accounts: Administrator account status
6 ways to build a super secure document library in SharePoint - SharePoint Maven
Best way to protect against Ransomware - Backups and Snapshots - kossboss
How the CORD Project Will Change the Economics of Broadband | Linux.com | The so...
6 ways to save on food costs during road trips with family - Bargaineering
Total System Backup and Recall with Déjà Dup | Linux.com | The source for Linux ...
K.C."s Garage: TOWL - Telemetry over Opportunistic WiFi Links
Veramine
US reportedly elevates the role of Cyber Command
How to monitor DHCP server usage - OSTechNix
InfoSec Handlers Diary Blog - Stop calling it a ransomware "attack"
Wink Hub integration with OpenHAB for local control | electronic hamsters
OpenHAB on Raspberry Pi
Seth"s Blog: Scientist, Engineer and Operations Manager
Are You Spending Too Much on "Normal" Expenses?
How to configure pfSense as multi wan (DUAL WAN) load balance failover router
How to Use "apt-fast" to Speed Up apt-get/apt Package Downloads Using Multiple M...
Learn Python Control Flow and Loops to Write and Tune Shell Scripts - Part 2
Debian / Ubuntu mass dist-upgrade with Ansible (with fallback and logging) | pan...
Handy VCSA (vCenter Server Appliance) Operational KB Resources | virtuallyGhetto
PowerShell module to automate restoring SQL Server backups - Stuart Moore
Almost 40 percent of enterprises hit by ransomware in the last year
Digital evolution -- how computers have changed the world
Sniffing Bluetooth Devices With A Raspberry Pi | Hackaday
Single Board Revolution: Preventing Flash Memory Corruption | Hackaday
Security implications of upgrading to Windows 10 – The Deployment Guys
Your laundry is done | Tinkerman
Cuddletech | Containers, Now and Then
BIOS to UEFI SecureBoot on Lenovo Desktops Gotcha! | Keith"s Consulting Blog
- Replacing your HVAC system can be expensive ... here’s how to get the best val...
LiFePO4wered/Pi • Hackaday.io
Foreman :: Manual
LucD notesSecurity - Hardening - Part 1 - Virtual Machines - LucD notes
The future of work ‹ Japan Today: Japan News and Discussion
Docker - Ansible - ELK Stack - EverythingShouldBeVirtual
DiagrammeR - Documentation
Windows Batch Scripting: Advanced Tricks - /* steve jansen */
Raspberry Pi as Cisco Console Server | NetworkLessons.com
konig
10 SQL Tricks That You Didn’t Think Were Possible – Java, SQL and jOOQ.
VMWare Esxi Shell - FroggDev - En
Escalating To CNC Through Proxxon’s Tool Line | Hackaday
Script to add disk to existing VM on ESXi | a Linux Rat in the Lab
start [X2Go - everywhere@home]
Open Network Linux
Reset a Windows 10 password - 4sysops
Facebook open sources a 17-camera 3D-360 video capture system
Happy Sysadmin Appreciation Day 2016 | Opensource.com
Using the Script Param to Pass Parameters into Pester Tests - Wahl Network
A Case Study in Attacking KeePass – harmj0y
A History of Ransomware: Where It Started & Where It"s Going
Parrot Security OS - A Debian Based Distro for Penetration Testing, Hacking and ...
IT or Business? Who should manage SharePoint site security? - SharePoint Maven
Reverse SSH Tunnelling over SSL with the Raspberry Pi - emtunc"s Blog
Telco central offices could be in for open source makeover | Network World
Linux Servers and Security Howtos - Chris Binnie - Linux Server Tutorial
An Introduction to Iridium, an Open Source Selenium and Cucumber Testing Tool - ...
Five tips for using revision control in operations | Opensource.com
Easily Encrypt your Flash Drives with Linux | Linux.com | The source for Linux i...
OKRs — The Fundamentals — Medium
Tips for scripting in Perl | Opensource.com
Systemback - Restore Ubuntu Desktop and Server to previous state
WMI: Stop hurting yourself by using “for /f %%s in (‘dir /s /b *.mof *.mfl’) do ...
Start, CMD (Run As Admin)
Compare Funeral Home Prices, Photos, and Reviews | Parting
Home | AFCEA International
May 2016 – Rule of Tech
Health Level 7
Privacy & Security | HIMSS
nist-csf-to-hipaa-security-rule-crosswalk-02-22-2016-final.pdf
Combined Regulation Text of All Rules - hipaa-simplification-201303.pdf
NIST-Security-HIPAA-Crosswalk | HHS.gov
Healthcare security: Adapt or die | Healthcare IT News
Healthcare Information Security News, Regulations, White Papers, Webinars, & Edu...
PowerUp – harmj0y
Private Cloud + Pu...
How To Use Vagrant To Create Small Virtual Test Lab on a Linux / OS X / MS-Windo...
Build VMware Appliances with Packer on Linux · Development and DevOps
The Glitch
SSH with Keys HOWTO: SSH with Keys in a console window
IHE Wiki
Virtual Foundry: Hardening the VMX File: How Your Servers May Already be 0wned b...
How To Patch vSphere 5 ESXi Without Update Manager • Chris Colotti"s Blog
25+ examples of Linux find command – search files from command line
Penetration Testing & Vulnerability Assessment | Core Impact
OScanner | cqure.net
Cloud South
Born Sysadmin...: Ansible: Generating a SSH pub key file and uploading to other ...
PowerCLI: Update VMX Configuration Parameters (in mass) - The Practical Administ...
Some ESXi CLI Commands – #vBrownBag
STIG Compliance with Ansible - Sam Doran
Project Jellyfish
NIST - Security and Privacy Controls for Federal Information Systems and Organiz...
nvlpubs.nist.gov
Guide for Applying the Risk Management Framework to Federal Information Systems ...
Mingw-w64 - GCC for Windows 64 & 32 bits [mingw-w64]
Heads Up! Do Not Upgrade VMware Tools on Hosts with ESXi 6.0 U1b | Long White Vi...
Injecting Windows Updates into install WIM files via MDT - deKay"s Blog
LinuxCommand.org: Learn the Linux command line. Write shell scripts.
A List of FREE VMware vSphere Tools | Tech Blog
Syncthing
q4-2015-state-of-the-internet-security-report.pdf
Security/Guidelines/OpenSSH - MozillaWiki
Hak4Kidz | Home
Jenkins build server with a Vagrant Box
Google Code Archive - Long-term storage for Google Code Project Hosting.
Microsoft EMET 5.5 Released – Benefits, New Features, Protection, Logging, & GPO...
Oracle Hardening – Part I – AVsecurity
DICOM Validation Toolkit (DVTk.org)-Make DICOM Easy.
John Rouillard"s Home page
Archi | Free ArchiMate Modelling Tool
Joanne Skywalker, Author at an andalusian bitch
Radiology, News, Education, Service
Vagrant Manager - Home
Undertow · JBoss Community
Rendition InfoSec
Use the Unofficial Bash Strict Mode (Unless You Looove Debugging)
How "Exit Traps" Can Make Your Bash Scripts Way More Robust And Reliable
Pretengineer | Packer, Vagrant and your Infrastructure – Fitting the Pieces Toge...
VMware ESXi - Foreman
serverspec.org
RHEL6 Kickstart Script
OSINT
How To Power a VM On or Off via SSH - The vCenterNerd
vCenter Server Virtual Appliance – Changing SSL Certs Made Easy « Long White Vir...
[SAGE] Do we still need separate partitions for /boot, /, /tmp, /var, /home, et....
Welcome to Test Kitchen - KitchenCI
Release Schedule
STIGs Master List (A to Z)A-Z
Cybersecurity Education, Training and Awareness Online Training
Home Server Show
The Outspoken Wookie: Bootable Windows Server 2012 ISO
GraphViz Examples and Tutorial
Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions
Building a Windows Vagrant Base Box with Packer
explainshell.com - match command-line arguments to their help text
Remove Extra Registry Settings from GPO - emtunc"s Blog
Index of /140410/products/datfiles/4.x/nai
Every Program Should Have a Philosophy
gressgraph - visualize your iptables firewall
Open Source Software FAQ
setup - Gathers facts about remote hosts — Ansible Documentation
Playbook Roles and Include Statements — Ansible Documentation
Intro to Playbooks — Ansible Documentation
Getting Started — Ansible Documentation
Frequently Asked Questions — Ansible Documentation
HowTos/Network/IPTables - CentOS Wiki
Small getopts tutorial [Bash Hackers Wiki]
Improve your web application security with Burp Suite web vulnerability scanner
Validating an IP Address in a Bash Script | Linux Journal
rConfig - Network Configuration Management
SQL Server 2014 Best Practice: Set built-in Sysadmin(sa) account as an default o...
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
Speed up your ssh connections with compression
BLACKLISTALERT.ORG - Test if your IP or DOMAIN is listed in a spamdatabase
Volkswagen Restoration Tips, Resources, and Pictures, from BusTopia.com
Microsoft Advanced Threat Analytics – My best practices – MSitPros Blog
10Gbps over 62.5µm Multimode Fiber
Train SharePoint Users within SharePoint sites | VisualSP Blog
24 hours of air traffic over northern germany. - c0t0d0s0.org
pshitt: collect passwords used in SSH bruteforce » To Linux and beyond !
Using DOM with nftables » To Linux and beyond !
Multicast on a LAN in Linux
DNS Loops – how to not configure DNS forwarding
Proof that you can loop any tcp service?
Well-Known Intervals | Router Jockey
Using the Kindle as an information display | Randomcoderdude"s blog
WWoIT - Wayne"s World of IT: VMware PowerCLI commands
WWoIT - Wayne"s World of IT: VMware vSphere PowerCLI commands
The downsides of collaboration between coworkers - Business Insider
- 10 home repairs to tackle this spring - Bargaineering
75 Frugal Hacks for Your Home
10 Things Your Boss Wishes You Knew
Conquer the Chaos of SharePoint End User Support | VisualSP Blog
Raspberry Pi-based signage stack gets Snappy
Speedup your KVM migration in Proxmox · Igor Moiseev
SSD - the definitive guide for Linux! · Igor Moiseev
How to Scan for Rootkits, backdoors and Exploits Using "Rootkit Hunter" in Linux
Learn Python Control Flow and Loops to Write and Tune Shell Scripts - Part 2
Build your very own PC keyboard
Hardening Framework
DISA Security Guidance, Security Readiness Review
Bundler: The best way to manage a Ruby application"s gems
Easy IIS SSL Hardening – Cooking Computers
Boxstarter
How Many of These Meeting Etiquette Rules Do You Follow?
Are ESXi Patches Cumulative - VMware vSphere Blog
Virtual Appliances getting more secure with vSphere 5.5 - Part 4 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 3 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 2 - VMware vSpher...
Virtual Appliances getting more secure with vSphere 5.5 - Part 1 - VMware vSpher...
VMware: VMware vSphere Blog: Automate the Hardening of Your Virtual Machine VMX ...
Response: Cryptech - A Open Source HSM - EtherealMind
VMware: VMware vSphere Blog: Quickest Way to Patch an ESX/ESXi Using the Command...
TSCMD108 FAQ: How can I execute a script one line at a time to debug it? Assorte...
Errata Security: My Raspeberry Pi cluster
Microservices Gone Wild - Tech Dive Part 2 - MovingPackets.net
Microservices Gone Wild - Tech Dive Part 1 - MovingPackets.net
Remove-SQLDatabaseSafely My First Contribution to DBATools | SQL DBA with A Bear...
Get Antivirus Product Status with PowerShell
Extrasphere | Tools for managing VM data in vSphere environments
SSL | panticz.de
shelltestrunner
VMware backup script | blog.erben.sk
ISCSI_FC_Comparison.pdf
The analog frontend of the SDS7102
Cockos Incorporated | LICEcap
Continuous Integration and Deployment service for Windows developers - Appveyor
Hardening - Sam Stelfox - Software Engineer & Linux Gubernāre
OpenSecurityTraining.info
Josh Stone"s Web Site: SQShell
Healthcare / Health Care Security Services from HSS | HSS Inc.
Josh Stone"s Web Site
NIST.gov - Computer Security Division - Computer Security Resource Center
Tirasa Blog - OpenIAM Identity Manager vs Apache Syncope - first approach
A Quick Introduction to Vagrant · Scott"s Weblog · The weblog of an IT pro speci...
Sane shell environment on Windows
My Open Wallet: Telling Children About How Much Money You Make: A Personal Finan...
Performance impact when using VMware snapshots | blog.erben.sk
Max Berger"s Technical Goodies: PEM from/to P12
Replacing vCenter Server Appliance SSL certificates | blog.erben.sk
WPAD Persistence · Room362
Simple Virtualization With Ubuntu 16.04 and KVM
Promises, Lies, and Dry-Run Mode - A Fistful of Servers
Iterating over a list of tuples in bash @  Bergman Lab
8 Tips for creating better bash scripts | Benjamin Cane
blockdiag - simple diagram images generator — blockdiag 1.0 documentation
How To - Use VMware vSphere PowerCLI to patch hosts | 9to5IT
Visualizing your bash history with d3.js | Andrew Berls
D3.js - Data-Driven Documents
Cyber Explorer: Sniffing and decoding NRF24L01 and Bluetooth LE packets for unde...
Packer - Vagrant - Ansible - Windows (WinRMTransport Error) - EverythingShouldBe...
Mental Models I Find Repeatedly Useful — Medium
Home - Veertu - Run Windows and Linux on your Mac
Overview | Setting up a Raspberry Pi as a WiFi access point | Adafruit Learning ...
Pi-Point :: Home
NetPi - Raspberry Pi Network Analyzer - Blame The Network
Scheduling Veeam Backup Free Edition backups | mwpreston.net
Turn Your Raspberry Pi Into a WiFi Hotspot with Edimax Nano USB EW-7811Un (RTL81...
ESP8266 based Plane Spotter – How To | Squix TechBlog
ADS-B Exchange – World"s largest co-op of unfiltered flight data
Adam Caudill – Security Consultant, Researcher, & Software Developer
Adam Caudill
GNS3 | The software that empowers network professionals
Fluent Time Management Helps You Flow Efficiency Into Your Life.
From the archive: Parkinson"s Law | The Economist
Parkinson"s Law
Pick Parts, Build Your PC, Compare and Share - PCPartPicker
Microsoft Patches
Logical Increments - PC Buying Guide
OWASP Bricks - OWASP
Internet-Wide Scan Data Repository
int3.cc
The DBA"s Essential Index Monitoring and Maintenance Tasks - SQLServerCentral
Pre-Built Developer VMs for Oracle VM VirtualBox | Oracle Technology Network
Automated Printer Data Harvesting Tool
USGS CIDA Stig
Statistics for Engineers
Serverless Architecture - PragueJS 30.6.2016 // Speaker Deck
U.S. Government Publishes EDB Postgres Advanced Server Security Technical Implem...
History of the Capacitor – The Pioneering Years | Hackaday
Secure Software Design and Programming: Class Materials by David A. Wheeler
Ransomware Is Coming to Medical Devices | Motherboard
OpenVPN - Secure you server administration with multiplatform VPN connection
Great Wide Open 2016 lightning talks: Jason van Gumster | Opensource.com
Encrypt files and data with Ccrypt or Mcrypt on Ubuntu Linux
vCenter Server Versions Numbers - How to find?
Parsing an RSS News Feed with a Bash Script | Linux Journal
8 Best Screen Recorders for Desktop Screen Recording in Linux
Deleting Large amounts of data in SQL Server – Part 2 - Stuart Moore
Deleting Large amounts of data in SQL Server - Part 1 - Stuart Moore
Open Source Solar | Hackaday
Decentralized network 42
Windows-Hardening.pdf
Designing and Building Great Dashboards - 6 Golden Rules to Successful Dashboard...
CMDB.info : CMDB Evolution 2010
Home — CMDBuild
i-doit open - Open-Source CMDB
MSSQLSERVER_3417
iFountain.com
Main Page - OneCMDB
sharepoint2013 stigs
SQL Products - SQLSecurity Home
SamuraiSTFU
Enterprise — Decent Security
Make Your PowerShell Scripts Talk Back -- Microsoft Certified Professional Magaz...
Script Template with logging function - PowerShell.com – PowerShell Scripts, Tip...
Simple PowerShell Script Logging | Jack Fruh"s SharePoint blog
PowerShell: How to easily create log files for your scripts | 9to5IT
Solaris Unattended installation - Foreman
iTop: open source ITIL ITSM CMDB Software
Windows could not start the SQL Server (MSSQLSERVER) on Local Computer... (error...
"Alarming" rise in ransomware tracked - BBC News
Unattended installation of VM images with Packer
s10-security-dive.pdf
http://h17007.www1.hp.com/docs/interoperability/Cisco/HP-Networking-and-Cisco-CL...
Nyxbone - Ransomware Overview: Complete ransomware malware list.
How to properly harden your operating systems - SVERDIS
How to Install The Foreman and a Puppet Master on Debian Wheezy | Midacts Tech
Search for Windows Updates takes forever? - A possible solution
HAProxy, highly available using carp or keepalived… | Beck"s *nix Blog
DICOM Homepage
Managing DICOM images: Tips and tricks for the radiologist
Using PowerShell to compare a registry key before and after a change | Techazine
5 steps to a better Windows command line | 53 Bytes - by Justin Beckwith
Locking it down: Steps to Oracle database security • The Register
Open Security Research: Top 10 Oracle Steps to a Secure Oracle Database Server
Log Parser Rocks! More than 50 Examples! | LichtenBytes
What Makes Carbon Black Unique?
Woody’s no-bull news, tips and help for Windows and Office.
Managing many servers with Foreman - Lukáš Zapletal
"The Foreman" - Automatic installation of "The Foreman" with Puppet - codecentri...
"The Foreman" - A complete lifecycle management tool - codecentric Blog : codece...
Green Goddess Rice Recipe : Claire Robinson : Food Network
6 ways to improve SharePoint site speed and performance - SharePoint Maven
InfoSec Handlers Diary Blog - Pentesters (and Attackers) Love Internet Connected...
How To Survive A Database Disaster - Thomas LaRock
4 Good Open Source Log Monitoring and Management Tools for Linux
Raspberry Pi SD Card Image is too big for another SD Card
Facebook reveals open-source wireless platform, OpenCellular
High-Availability Storage with GlusterFS on CentOS 7 - Mirror across two storage...
Using the new SQLServer Powershell module to get SQL Agent Job Information | SQL...
10 Super-Fast, Super Free Ways to Improve Your Website | Technogog
Research & Community | ERNW – Providing Security.
Evil FOCA
How To Setup Bridge (br0) Network on Ubuntu Linux 14.04 and 16.04 LTS
How to Update Your Windows Server Cipher Suite for Better Security
Cipher Suite
MIIT_2009_DicomCompression_Clunie.ppt - MIIT_2009_DicomCompression_Clunie.pdf
myotherpcisacloud.com | AD Is Full of Bitmasks, Decipher Them with Powershell
7 Security Podcasts You Should be Listening to - TunnelsUP
Back to basics – Hot add new disk to Linux VM – Pragmatic IO
Thorstein Veblen Quotes - The Quotations Page
RMF for DoD IT - Risk Mangement Framework for DoD IT
DevOpsSec - devopssec.pdf
packer-build
Secure IIS Web Server & disable weak ciphers - redmad.com
Runnablog — 9 Common Dockerfile Mistakes
Latest Posts – dodwell.us
OpenNotes
Simple Windows Batch Scripting for Intrusion Discovery - simple-windows-batch-sc...
installing & Configuring WSUS in Windows Server 2016 | Nyazit
Oracle Database Security: What to Look for and Where to Secure - oracle-database...
GNUbatch - GNU Project - Free Software Foundation
Ysoserial
Packer
Report Generator
Managing Your Infrastructure Part 1: Setup Foreman
PowToon, free business presentation software animated video maker and PowerPoint...
HackMag – Security, malware, coding, devops
Opencover
Executive Dashboards | Dashboard Examples - Klipfolio
Responder
How to Crack Android Full Disk Encryption on Qualcomm Devices
Welcome to The Oracle FAQ | Oracle FAQ
Diigo - Web Highlighter and Sticky Notes, Online Bookmarking and Annotation, Per...
Open source software testing tools
Brakeman
SCC Home
What I learned while securing Ubuntu - major.io
Bvckup 2 | Simple fast backup
masscan
Sysdig | Home
EXPERIENCING INFORMATION | Thoughts on how we experience information in the digi...
5 SSH Hardening Tips | Linux.com | The source for Linux information
Understanding How to Stay Safe Online in 2016
Tips You Can Use to Take Better Photos of Fireworks
SCC Download
Managed Security Monitoring: Selecting a Service Provider
MATRIX - The World’s First Smart Home App Ecosystem by AdMobilize — Kickstarter
Active Directory Groups or SharePoint Groups? - SharePoint Maven
GraphDash by AmadeusITGroup
Golden times in IT security ‹ Japan Today: Japan News and Discussion
Why are hackers increasingly targeting the healthcare industry? - Help Net Secur...
Top 10 PowerShell Scripts that VMware Administrators Should Use | Virtual-Strate...
A List of FREE VMware vSphere Tools | Tech Blog
Secure home automation, without clouds or dedicated hubs
SQL Server Trace Flags - Thomas LaRock
The Four Hundred--The AS/400 At 28: A HENRY, Not A DINK
Crypto-ransomware attacks increase five fold
STARTING A BUSINESS ON A SHOE STRING BUDGET - Business Opportunities
SolveSpace - parametric 3d CAD
Remediating vSphere Configuration Drift with PowerShell Pester Tests - Wahl Netw...
Is BGP Really that Complex? « ipSpace.net by @ioshints
LACP Configuration Examples (Part 7)
HOW TO: Restore the Master Database in SQL Server 2016 - Thomas LaRock
How to roll up calendars in SharePoint - SharePoint Maven
17 Great Apps That"ll Make Your Life Easier
Smem - Reports Memory Consumption Per-Process and Per-User Basis in Linux
TOP 5 Backup Software for VMware Infrastructure
What is the Data Center Tier System? | The Server Rack FAQ
Linux Servers and Security Howtos - Chris Binnie - Redirecting Traffic Tutorial
Your Network Is Too Slow For Flash And What To Do About It | Long White Virtual ...
LucD notesvSphereDSC - VmwFolder - LucD notes
Horchata Made Easy Recipe - Allrecipes.com
Python - NMAP/SSH Fun - EverythingShouldBeVirtual
Pi Zero on a digital frame - Garage Tech
Vagrant - Multi-Group Ansible Provisioning - EverythingShouldBeVirtual
25 Practical examples of the find command | LibreByte
Getting started with GIMP | Opensource.com
Etcher by resin.io
Setting up Ubuntu & CentOS as a guests on bhyve
GitHub - churchers/vm-bhyve: FreeBSD Bhyve VM Management
bhyve - BSD Hypervisor
TeslaCrypt shuts down and Releases Master Decryption Key
MalwareJake: Securing healthcare? You need an MDM strategy, even for BYOD
25 Useful Basic Commands of APT-GET and APT-CACHE for Package Management
Auditd - Tool for Security Auditing on Linux Server
OpenFIPS Project - Axioma
Real World Computing: How to Create a Good Email Signature and Use it in IBM Ver...
@JKevinParker: Digital Transformation In Action: 21 Things You Need to Know
@JKevinParker: Solution Success Means User Adoption
The problems with forcing regular password expiry
Complete STIG List
Disa STIG Viewer Tutorial - YouTube
John"s Linux Blog: FIPS integrity verification test failed.
Microsoft Word - U_RedHat_6_V1R2_Overview_STIG-201306040830.docx - U_RedHat_6_V1...
Scanning remote machines with OpenSCAP | Martin Preisler
2013-07-21-MITRE-Dev-Days-Shawn-Wells-Red-Hat-Remediation.pdf
IronBee - Open Source Web Application Firewall
ModSecurity: Open Source Web Application Firewall
Mad Irish :: Home
Radiology, News, Education, Service
Alan"s Blog » Blog Archive » ShareEnum Alternative
Download Microsoft File Checksum Integrity Verifier from Official Microsoft Down...
Automatically testing and validating the Ansible STIG Role for Red Hat 6 | Davil...
Security Configuration Remediation with Tripwire | Tripwire
Ransomware Hackers Blackmail U.S. Police Departments - NBC News
Ansible Lockdown
InfoSec Handlers Diary Blog - Kippos Cousin Cowrie
cowrie
DISA STIG Remediation: Automagically
Defeating Ransomware with EventSentry & Auditing – EventSentry Blog
Making STIG Automation Possible: A Technical Deep Dive
MalwareJake
Cisco Talos Blog: Ransomware: Past, Present, and Future
Open Source Clinical Image and Object Management
WildFly - JBoss Application Server has a new name... WildFly.
NetBeast
InfoSec Handlers Diary Blog - DNS and DHCP Recon using Powershell
InfoSec Handlers Diary Blog - Neutrino exploit kit sends Cerber ransomware
How To Install and Get Started with Packer on an Ubuntu 12.04 VPS | DigitalOcean
How to Manage SharePoint Implementation (VIDEO) - SharePoint Maven
6 Pearls of Career Wisdom From Brian Tracy
1. Success Starts With a Positive Self Image 2. Use the Rule of Three to Maximize Your Priorities 3. Don"t Underestimate the Power of a To-Do List 4. Develop the Right Habits 5. First One to Work, Last to Leave 6. Invest 3% in Your Personal Growth
Clint Boessen"s Blog: Microsoft Word Performance Issues - KB3114717
SQL Server 2016: What Time Is It? - Thomas LaRock
How much swap should I use on my VM? | Jethro Carr
PETYA ransomware targets enterprise users via the cloud and overwrites MBRs
Slack for Non-Profits – EMail is Obsolete! | tfnp
Set default text editor in Ubuntu | tfnp
Hosting with Linode | tfnp
The Internet Enabled Kill-A-Watt | Hackaday
CryptoWall CryptoLocker – Here’s what you should be doing
O R G A N I C / F E R T I L I Z E R: Accessing a Protected Domain Administrator ...
Hackers have figured out how easy it is to take down a hospital | Fusion
Resolve IP Addresses to Hostname using PowerShell | Gary"s $this and that about ...
Cryptol Home
[rancid] Fwd: Re: Rancid-Ubiquity
Reducing Windows Deployment time using Power Management | The Deployment Guys
Amazon #AWS Tips and Gotchas – Part 3 | Tekhead.it
Boxcutter
8 Best Open Source Music Making Softwares for Linux
Miracast in Enterprise Environments – FAQ | The Deployment Guys
Lynis 2.2.0 Released - Security Auditing and Scanning Tool for Linux Systems
web.nvd.nist.gov
Security Guidance : Cloud Security Alliance
FFIEC IT Examination Handbook InfoBase - Security Guidelines
The security laws, regulations and guidelines directory | CSO Online
Information Security and Privacy Program | HHS.gov
NIST.gov - Computer Security Division - Computer Security Resource Center
alpine-3.3-x86_64.json
How to Build a Secure DevOps Environment for Government and Beyond - YouTube
How To List and Delete Iptables Firewall Rules | DigitalOcean
Microsoft Word - CHIME AEHIS Letter to FDA on Cyber Guidance V5 - CHIME-AEHIS-Le...
ORACLE-BASE - Linux Firewall (iptables, system-config-firewall)
Vagrantfile Explained: Setting Up and Provisioning with Shell
NVD - National Checklist Program Repository
Handy one-liners for SED
vulnerability scanners - Difference between hardening guides (CIS, NSA, DISA) - ...
Automatic Sonicwall Backup Script | Sysadmin Rambling
The Forwarding Plane - Routing, Switching, general security and anything else I ...
healthitsecurity.com
Home : Occupational Outlook Handbook : U.S. Bureau of Labor Statistics
Welcome to the LEDE project
How to Download Official Windows ISO Files Free from Microsoft
HOW-TO: Add live websites to GIT without interruptions or security risks « Dange...
How long did it take to encrypt the harddrive? – MSitPros Blog
$BitLockerEvents = get-eventlog -LogName system -Source Microsoft-Windows-BitLocker-Driver $BitLockerStart = ($BitLockerEvents | where{$_.Instanceid -eq 24577}).TimeGenerated $BitLockerFinished = ($BitLockerEvents | where{$_.Instanceid -eq 24579}).TimeGenerated $TotalTime = $BitLockerFinished – $BitLockerStart $Hours = $TotalTime.Hours $Minutes = $TotalTime.Minutes $Seconds = $TotalTime.Seconds
Samsung SmartThings Security Flaw: What You Need to Know
Crowdsource your security knowledge: A simple guide to OWASP Top 10
DevOps means Test Automation (too)
Waze vulnerability allows hackers to track you
4.2 Regulatory Affairs Basics - Medical Devices - YouTube
Harvard i-lab | Understanding Medical Device Development - YouTube
ISO 13485:2016 - Medical devices -- Quality management systems -- Requirements f...
Quality System (QS) Regulation/Medical Device Good Manufacturing Practices
WordPress Woes and .htaccess | tfnp
Visual Studio Code - Code Editing. Redefined
Free ebook: The Security Development Lifecycle | Microsoft Press blog
FossHub
How to Create, Deploy and Launch Virtual Machines in OpenStack
Low-Budget Hosting Tips
The I3P
Beans Place: AutoVer
 QStar Technologies
Why Giant Hospital Systems Might Be Getting it Wrong | Michelle Chaffee | Linked...
Why Giant Hospital Systems Might Be Getting it Wrong
DSHR"s Blog: Talk at Seagate
Windows Server 2016 Active Directory Installation Guide
ESXi Commands List - Snapshot Deletion Monitoring
Diskless true SSH honeypot using Alpine Linux - rationallyPARANOID.com
Static Site Generator | Nikola
Provisioning a Development Environment with Packer, Part 1 | End Point Blog
Open Source Software FAQ
OpenStack Summit interview with Massimo Ferrari and Erich Morisse | Opensource.c...
10 Useful "Interview Questions and Answers" on Linux Shell Scripting
How to Use Awk to Print Fields and Columns in File
How to deal with renamed network interface names? / Networking, Server, and Prot...
Unexpected predictable systemd network device names
Pubfig: Public Figures Face Database
Proxmox Auto-Migration of VM"s | Tek Syndicate
51 Best DevOps Tools for #DevOps Engineers | ProfitBricks Blog
Facilities Management Software | iOffice
dcept - Honeytoken
Day in Tech History - Daily Tech History Podcast & Blog 365 Days a Year
This Day in Tech History — The History of Technology in a Daily Blog!
Oxidize
Welcome to the LEDE project
How to add a slideshow to SharePoint Site - SharePoint Maven
OpenStack cloud’s “killer use case”: Telcos and NFV | Network World
Infiniband: An Inexpensive Performance Boost For Your Home Network - Patshead.co...
Would I Still Buy a QNIX QX2710 in 2015? - Patshead.com Blog
How to create an Employee Directory in Sharepoint - SharePoint Maven
How to implement Document Management System in SharePoint using Content Types - ...
4 Men with 4 Very Different Incomes Open Up About the Lives They Can Afford
VMware VCSA - Configure NTP
How to Get the Greenest Lawn on the Block — Naturally
9 Tools That All Electronics Labs Must Have | Random Nerd Tutorials
11 Clever Uses for Your Raspberry Pi | Random Nerd Tutorials
Random Nerd Tutorials
Raspberry Pi Web Server using Flask to Control GPIOs | Random Nerd Tutorials
About - Open Homelab
The Internet of Things has a dirty little secret — Internet of Shit — Medium
I’m over tech people. – Michael O. Church
Keygen alert: free password generator released for PETYA ransomware
Bulk Storage of AA and AAA Batteries using an Ammo Box - aBrainDump.com
/bin/bash based SSL/TLS tester: testssl.sh
Fix / update systemd in Debian Jessie LXC container | panticz.de
Docker Part 4: building and publishing custom docker images
Ultimate Guide to Cybersecurity for Employees
Platform 3 – The Build-Out of the Private Cloud, Converged Infrastructure and th...
FREE vs Paid - StarWind Virtual SAN
Understanding block sizes in a virtualized environment | vmPete.com
My vSphere Home Lab. 2016 edition | vmPete.com
O R G A N I C / F E R T I L I Z E R: Excel and the Mysterious Hang
9 Practical IKEA Hacks for Your Office & Workstation
Cool Things to Do with the Windows 10 Lock Screen
How to Change the Default Language & Region in Windows 10
How RAM Compression Improves Memory Responsiveness in Windows 10
Start Explorer elevated in one command – MSitPros Blog
How to Build a DIY Rack Case (and Why)
How to Install, Create and Manage LXC (Linux Containers) in RHEL/CentOS 7
Managed services killed DevOps | TechCrunch
How to setup HAProxy as Load Balancer for MariaDB on CentOS 7
Using Foreman, an Opensource Frontend for Puppet -
If you know Big Data, you must meet Liger | Pentaho
10 Ubuntu / Debian Linux apt Command Examples
11 Excellent Open Source Solutions for Home Automation - Linux Links - The Linux...
Continuous Integration, Delivery or Deployment with Jenkins, Docker and Ansible ...
private-vlan - CCIE Blog
DevOps | vMiss.net
dhcpcd - ArchWiki
How to use Vagrant on Windows — osteel"s blog
System Administration Screencasts
ExeFilter - an open-source tool and framework to filter files and active content...
Center for Internet Security
OhSoft(ohsoft.net) - Best Software Developer
Saveen Reddy"s blog
Home | OpenSCAP portal
How to Install and Configure "Ansible" Automation Tool for IT Management - Part ...
The Three Ways: The Principles Underpinning DevOps - IT Revolution IT Revolution
Shellshock Vulnerability and How to Patch Servers Using Ansible
Nortel Telephone Systems : The Nortel Specialists : 1st Communications Installat...
Start Learning Ansible With One Line And No Files | Mechanical Fish
CS1K Technical Docs
SharePoint 2013 Publishing feature and limited access - Bperson Everything Share...
8 Everyday Things That You Can Track with Text Files
Turn Your RPi 3 Into a BLE Beacon | Hackaday
14 Outstanding Backup Utilities for Linux Systems
InfoSec Handlers Diary Blog - Improving Bash Forensics Capabilities
OpenFrame
Raspberry Pi Art Frame using OpenFrame | Hackaday
AllPro Adapter
First Steps With Windows Containers | Thomas Maurer
Managing PowerShell Functions
Puppet + Vagrant VS librarian-puppet | The eternal fight between admins and comp...
Linked - One in five employees would sell their work passwords, some for less th...
Heating Help #1 Online Resource for Heating Answers
FBI"s Advice on Ransomware? Just Pay The Ransom. | The Security Ledger
New self-protecting USB trojan able to avoid detection
Applying Windows Updates to a base WIM using DISM and Powershell |
Best Ever Mushroom Soup
DNS Loops – how to not configure DNS forwarding
Car Speed Detector | greg tinkers
Size matters at Japan phallus festival ‹ Japan Today: Japan News and Discussion
Errata Security: Some notes on Ubuntu Bash on Windows 10
10 Steps to Living an Amazingly Wonderful Life
InfoSec Handlers Diary Blog - Tips for Stopping Ransomware
Use Software Restriction Policies To Block Viruses And Malware | Branko Vucinec
Errata Security: How to detect TrueCrypt blobs being passed around
reverse proxying attacker tools · Room362
pfSense without Internets · Room362
Powershell Popups + Capture · Room362
Why good leaders make you feel safe · Room362
Effective NTLM / SMB Relaying · Room362
Using PowerShell + Word Interop to Extract Tables from PDFs | chentiangemalc
ShareX - Take screenshots or screencasts, annotate, upload and share URL in clip...
DVDStyler - Free DVD Authoring Application
G"MIC - GREYC"s Magic for Image Computing: A Full-Featured Open-Source Framework...
How to set Security for a SharePoint site - SharePoint Maven
RHEL - Get Started
10 "ARGH!" moments every computer user experiences
vSphere HTML5 Web Client – VMware Labs
8 Annoying Windows 10 Issues & How to Fix Them
Training as Acting
Free Tools VMware
Amazon #AWS Tips and Gotchas – Part 4 – Direct Connect & Public / Private VIFs |...
TreeSheets : Free Form Data Organizer
Compare and Contrast - VSAN and VVols - CormacHogan.com
Vagrant and Windows
Git - Downloads
Varying Vagrant Vagrants is an open source Vagrant configuration focused on Word...
Getting Started with Vagrant on Windows
Setting up Your Raspberry Pi as a Git Server
#AWS Certified Solution Architect Associate Exam Study Guide & Resources | Tekhe...
Run the AWS Shell Quickly and Easily in a VirtualBox Instance Using Vagrant – Di...
Setting Sound Volume and Unmuting with PowerShell - DeployHappiness
Backup Switch Configurations with PowerShell - DeployHappiness
DSHR"s Blog: Dr. Pangloss loves technology roadmaps
Ansible - Using the set_facts module - EverythingShouldBeVirtual
Using Vagrant and VirtualBox to Run Sandbox Environments – DiscoPosse.com
Amazon shows you how to make an Echo with Raspberry Pi
Diffie-Hellman-Primes
Take a 360-degree video tour of Google"s Oregon data center
ZFS Automatic Snapshot Service for Linux
Secure File Transfer | Linux Journal
How to detect the type of virtualization from the command line - Ask Xmodulo
Transferring Conserver Logs to Elasticsearch | Linux Journal
LXC: create Ubuntu Xenial container | panticz.de
CLI | panticz.de
SharePoint Sync Issues? Stop syncing SharePoint Document Libraries! - SharePoint...
10 questions to ask your users before you create a SharePoint Site for them - Sh...
Decoding Prefetch Files for Forensic Purposes: Part 1
Active Directory Security » Active Directory & Enterprise Security, Attack Metho...
piStudio • Hackaday.io
Brother MFC-1910W | panticz.de
How to Sync MS Project with SharePoint - SharePoint Maven
SharePoint Debugging: Not without a trace | SharePoint Dragons
6 reasons to use SharePoint Out of the Box functionality - SharePoint Maven
12 Linux dd command examples - The Linux Juggernaut
29 Quick Money Tricks | Budgets Are Sexy
Docker: How to use it in a practical way - Part 3
Docker: How to use it in a practical way
How to use Docker in a practical way (part 1 - Introduction)
Details • Monitoring washing machines • Hackaday.io
Setting Up Web-Based Guacamole Tool To Access Remote Linux/Windows Machines
InfoSec Handlers Diary Blog - Forensicating Docker, Part 1
Powershell Malware - No Hard drive, Just hard times - SANS Internet Storm Center...
LFCS: How To Explore Linux With Installed Help Documentations And Tools - Part 1...
LFCS: How To Manage And Create LVM Using Vgcreate, Lvcreate And Lvextend Command...
Understanding & Learning Basic Shell Scripting And Linux Filesystem Troubleshoot...
Managing Users & Groups, File Permissions & Attributes And Enabling Sudo Access ...
Linux Package Management With Yum, RPM, Apt, Dpkg, Aptitude And Zypper - Part 9
LFCS: Managing System Startup Process And Services (SysVinit, Systemd And Upstar...
LFCS: Assembling Partitions As RAID Devices - Creating & Managing System Backup...
LFCS: How To Mount/Unmount Local And Network (Samba & NFS) Filesystems In Linux ...
LFCS: How To Archive/Compress Files & Directories, Setting File Attributes And F...
LFCS: How To Install And Use Vi/vim As A Full Text Editor – Part 2
LFCS: How To Use GNU "sed" Command To Create, Edit, And Manipulate Files In Linu...
Getting started with Network Packet Generators - The Network Sherpa
A Decade of Innovation | Perspectives
7 Life Lessons From The Very Wealthy - MoneySmartGuides.com
Performance Testing with Microsoft DiskSpd | Long White Virtual Clouds
The best microSD card
How to Improve Windows Performance with a New File System
Using Ansible to update Linux distributions – Geek and I
Vagrant - Complex Vagrantfile Configurations - EverythingShouldBeVirtual
VSAN Hardware Compatibility List Checker
Self-Hosted Alternatives to Delicious
Windows Server 2012 R2 Network Cmdlets: Part 7 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 6 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 5 | Hey, Scripting Guy! Blog
PowerShell Handy Commands - TechNet Articles - United States (English) - TechNet...
Windows Server 2012 R2 Network Cmdlets: Part 4 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 3 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 2 | Hey, Scripting Guy! Blog
Windows Server 2012 R2 Network Cmdlets: Part 1 | Hey, Scripting Guy! Blog
asciinema - Record and share your terminal sessions, the right way
JanVanRyswyck/awesome-talks
Sensible Bash · Small & opinionated selection of basic Bash configurations for a...
MostlyAdequate/mostly-adequate-guide: Mostly adequate guide to FP (in javascript...
Daniel Miessler : Technology | Philosophy | Culture
Group Policy Search
Borg Documentation — Borg - Deduplicating Archiver 0.30.1 documentation
PIN number analysis
#9980 8557 0.001191% #9981 9047 0.001161% #9982 8438 0.001161% #9983 0439 0.001161% #9984 9539 0.001161% #9985 8196 0.001131% #9986 7063 0.001131% #9987 6093 0.001131% #9988 6827 0.001101% #9989 7394 0.001101% #9990 0859 0.001072% #9991 8957 0.001042% #9992 9480 0.001042% #9993 6793 0.001012% #9994 8398 0.000982% #9995 0738 0.000982% #9996 7637 0.000953% #9997 6835 0.000953% #9998 9629 0.000953% #9999 8093 0.000893% #10000 8068 0.000744%
Shareholder Letters
It rather involved being on the other side of this airtight hatchway: Unquoted s...
Microsoft security advisory: Local Administrator Password Solution (LAPS) now av...
The Case of the App Install Recorder | Aaron Margosis" Non-Admin, App-Compat and...
SigCheck
SQL Server Linked Server Connection Test - Thomas LaRock
Target stores attacked by pornographic pranksters - BBC News
Docker - Building containers using Ansible - EverythingShouldBeVirtual
Amazon #AWS Tips And Gotchas – Part 2 | Tekhead.it
Amazon #AWS Tips And Gotchas – Part 1 | Tekhead.it
Repairing the HackRF | T4F
Understanding block sizes in a virtualized environment | vmPete.com
4 ways to create Drop down navigation in SharePoint - SharePoint Maven
How to build Intranet in SharePoint using out of the box features - SharePoint M...
Install Mod_Pagespeed To Speed Up Apache And Nginx Performance Upto 10x
25 Useful IPtable Firewall Rules Every Linux Administrator Should Know
Email inventor Ray Tomlinson dies
Ray Tomlinson
Vagrant - Ansible Provisioning multi-nodes - EverythingShouldBeVirtual
Fix for Windows 1511 ADK bug | Keith"s Consulting Blog
Is Your Smartphone Listening to You, or Is It Just Coincidence?
IEDigest | Analyze Internet Explorer settings
23105-fast16-papers-schroeder.pdf
LasLabs Blog | Change WebUI Port - Ubiquiti EdgeRouter Lite - LasLabs Blog
Configuring Vyatta router for use with my lab environment | Citrix Blogs
How To Configure Your Ubiquiti EdgeRouter Lite - SmallNetBuilder
Everything you need to know about Windows 10: product keys, secret tools, essent...
Pulse Secure Article: KB11941 - [PCS/PPS] How to use the Radius Test Rig Utility...
RADIUS Performance Testing | Network RADIUS
RADIUS test client (Radlogin v4)
ansible.yml | panticz.de
guide/Radtest
Ansible | panticz.de
Manpage of RADCLIENT
PlayStation 4"s Linux Hack | FOSS Force
Domino Admin Best Practices: Finding the Gremlins | The Notes Guy in Seattle
Install Ansible | panticz.de
InfoSec Handlers Diary Blog - Quick Audit of *NIX Systems
Dilbert’s Financial Advice on an Index Card — My Money Blog
Enable AD Authentication on Network Switches - DeployHappiness
5 Calculators to Decide If You Can Afford a New Car or House
Linked - The Perilous Side of the Cloud: Shadow IT and Excess Data
Putting the Dev in Devops: Bringing Software Engineering to Operations Infrastru...
Update Switch Firmware with PowerShell - DeployHappiness
The Ultimate EXE Silent Switch Finder - DeployHappiness
A Field Guide to the North American Utility Pole | Hackaday
SharePoint 2013: Moving the Usage and Health Database - SharePoint from the Tren...
Tech Bench
Major cities to become "smart" by 2020
How to Create and Run New Service Units in SystemD Using Shell Script
8 Best Video Editing Softwares I Discovered for Linux
ifconfig vs ip: What"s Difference and Comparing Network Configuration
InfoSec Handlers Diary Blog - Tip: Quick Analysis of Office Maldoc
Cloud network DVR - ProtectWise
ArduPilot | Open source autopilot
Kryder"s Law - Scientific American
Mark Kryder
Coretech Blog » Blog Archive » House of Cards–The ConfigMgr Software Update Poin...
Software Freedom Conservancy
Investor Education: 2016 tax rates, schedules, and contribution limits
Vagrant & Ansible Quickstart Tutorial - adamcod.es
The Top 5 Most Common Problems With SQL Server - Thomas LaRock
Tune Your Indexing Strategy with SQL Server DMVs
A case of "easy": Virto SharePoint Bulk Operations Toolkit | SharePoint Dragons
Profiling SharePoint databases | SharePoint Dragons
Implement SharePoint using KISS Principle - SharePoint Maven
5 ways IT leaders should prep for the mobile future | The Enterprisers Project
Change Control using Git(lab) at Brokenhaze
Hiding SharePoint Apps/Add-ins from users | SharePoint Rider
@JKevinParker: Plan a Successful Information Management Solution Implementation
Configuration Manager 1511 adventures | Annoying stuff I figured out (or am tryi...
What are SharePoint Sites, Pages and Web Parts? - SharePoint Maven
Doc Searls Weblog · Rethinking John Wanamaker
Raspberry Pi Gets OpenGL Support | Linux Journal
What"s in the Box? Interrogate Your Linux Machine"s Hardware | Linux Journal
Seth"s Blog: A manifesto for small teams doing important work
Seth"s Blog: Ten questions for work that matters
Architectural Folk Models | Kitchen Soap
A Shoutout to Reliability Monitor - DeployHappiness
perfmon /rel
How to Create Powerful Graphs & Charts in Microsoft Excel
Get Local Group Members with PowerShell
Ansible reboot UNIX-like systems, in sequence – Geek and I
Migrating VMs from PF9 KVM to ESXi - EverythingShouldBeVirtual
Ansible v2.0 vs Windows Update – Geek and I
Ansible - Setting up an Ansible Control Machine - Part-1 - EverythingShouldBeVir...
funoverip/mcafee-sitelist-pwd-decryption: Password decryption tool for the McAfe...
imc152-sicker.dvi - issues.pdf
7 Skill-Building Photography Exercises That Really Work
Why You Shouldn’t Be Hosting Public DNS | Postmodern Security
The Naming of Hosts - MovingPackets.net
Five things I will do different for my next startup — Life Tips. — Medium
Monetize earlier Scale slower Burn less Automate and outsource everything Measure everything
60 in 60 - Admin Tips Power Hour session slides from IBM Connect 2016 | IdoNotes...
The first MIPS processor celebrates 30th birthday
wissel.net :: The 3C of leader - leader: Clarity, Competence, Control
Hard Drive Reviews: Update on 2015 Hard Drive Reliability 
An Ansible Tutorial - Servers for Hackers
Jonathan Medd"s Blog | Automating anything that moves…..
9to5IT - IT Blog
Connecting Ubuntu to Windows shares and DFS trees | Matt Slay, PhC
Back-Flip
How to List all Disabled Indexes in a SQL Server Database | SQL Server Administr...
USE Database_Name GO SELECT i.name AS Index_Name, i.index_id, i.type_desc, s.name AS "Schema_Name", o.name AS Table_Name FROM sys.indexes i JOIN sys.objects o on o.object_id = i.object_id JOIN sys.schemas s on s.schema_id = o.schema_id WHERE i.is_disabled = 1 ORDER BY i.name GO
Small Business Susan | Migratin" over from SBSDiva
Mirrored databases are disconnected after you restart the database mirror in SQL...
Rostyslav"s blog: Encrypting and Decrypting Web.config Sections in .NET 4.0
Potential enhancements to ASPState - SQLPerformance.com
Fix broken shortcuts during file server migrations | Tailspintoys – 365lab.net
Glenn Berry"s SQL Server Performance | Semi-random musings about SQL Server perf...
Virtual LAN Security: weaknesses and countermeasures
Keep It Simple and Fast: Tips to improve performance of MS Reporting service rep...
Keep It Simple and Fast: More tips to improve performance of SSRS reports.
IIS logs sent via NXlog not showing up in Graylog | nxlog.co
Graylog collector and iis logs - Google Groups
Graylog
High Availability High Performance Web Cache - Alpine Linux
Jeff Botsford | Stuff to Refer Back To
Sysadmin continuous improvement | Useful tips and tools for system administrator
WSUSpect Proxy
WSUS – Declining all Superceded Updates – NOW! | Programming, PowerShell and Pan...
Get-WSUSUpdate -Classification All -Status Any -Approval AnyExceptDeclined ` | Where-Object { $_.Update.GetRelatedUpdates(([Microsoft.UpdateServices.Administration.UpdateRelationship]::UpdatesThatSupersedeThisUpdate)).Count -gt 0 } ` | Deny-WsusUpdate
Removing the 100Mb System Reserved Partition after Windows 7 or Windows 2008 R2 ...
Benchmarking Windows Guests on KVM:I/O performance | JRS Systems: the blog
Highly Available, Scale-Out SQL Server 2008 R2 Reporting Services Farm
Sandfeld.net - My substitute brain
Fix problems opening documents in SharePoint libraries - Office Support
New tool: Policy Analyzer - Microsoft Security Guidance - Site Home - TechNet Bl...
Carl Webster | The Accidental Citrix Admin
AdministratorsGuide.pdf
Supermicro IPMI BIOS upgrade fail [Solved!] - Hacker"s ramblings
A Multivendor Post to help our mutual iSCSI customers using VMware - Virtual Gee...
Remotely upgrading BIOS on a SuperMicro servers | Flameeyes"s Weblog
PSAppDeployToolkit/PSAppDeployToolkit: Project Homepage & Forums
Defending against CryptoLocker with Group Policy Software Restriction | Cloud So...
Force remote Group Policy refresh with PsExec and gpupdate - 4sysops
1 For /f "tokens=*" %%a in (c:\tmp\ComputerList.txt) Do psexec \\%%a -i gpupdate
sbilly/awesome-security: A collection of awesome software, libraries, documents,...
Script WSUS Approved Updates Status Report
WSUS Reporting with Powershell Part 3 | Get-Mailbox.net
WSUS Reporting with Powershell Part 2 | Get-Mailbox.net
WSUS Reporting with PowerShell | J. Gregs Brain Corral
Ceph: how to test if your SSD is suitable as a journal device? - Sébastien Han
WSUS Reporting with Powershell Part 1 | Get-Mailbox.net
Getting Ready…Troubleshooting unattended windows installation — Hurry Up and Wai...
WSUS Server HTML Report | Learn Powershell | Achieve More
smb-psexec.nse: owning Windows, fast (Part 1) » SkullSecurity
How To Resolve Active Directory Account Lockouts with PowerShell
How to use the EventCombMT utility to search event logs for account lockouts
But if I say I will not mention Him… » Blog Archive » squidguard logging with pf...
\$SERVER["socket"] == ":80" { \$HTTP["host"] =~ "(.*)" { url.redirect = ( "^/^(sgerror)(.*)" => "https://%1{$redirectport}/$1" ) } }
PowerShell: Searching Through Files for Matching Strings
Performance Tweaks - Proxmox VE
pentestmonkey | Taking the monkey work out of pentesting
PiPresentation_20160214.pptx - Google Drive
CIF 50-DPS | PC card PCI PROFIBUS DP-Slave | hilscher.com
Mondaiji - Life in Japan & Japanese Culture
Alpine Linux | Alpine Linux
Driving Robocallers Crazy With the Jolly Roger Bot | On the Wire
Discover user rights in SharePoint | J. Gregs Brain Corral
Windows file server aliases, NetBIOS over TCP, and Incomplete Documentation | J....
Leo-G/DevopsWiki · GitHub
Mattermost
VGA In Memoriam | Hackaday
VMware KB: Running custom quiescing scripts inside Windows virtual machine with ...
Status Reports - SQLServerCentral
Powershell: List all IIS WebApplications (.net version, state, identity) - Melch...
ULS Viewer is Back From the Dead! - Todd Klindt"s SharePoint Admin Blog
He"s dead, Jim: SharePoint 2013 Search Trobleshooting
Powershell Script to Efficiently Locate Large Files in SharePoint 2010/2013 - Me...
How to use the File Server Capacity Tool (FSCT) on Server 2012 R2 - Ask Premier ...
Fix IIS website hangs and slow loads
%windir%\system32\inetsrv\appcmd list requests /elapsed:10000
asp.net - How prevent CPU usage 100% because of worker process in iis - Stack Ov...
Import-Module WebAdministration $appPoolName = "DefaultAppPool" $appPool = Get-Item "IIS:\AppPools\$appPoolName" $appPool.cpu.limit = 80000 $appPool.cpu.action = "KillW3wp" $appPool.cpu.resetInterval = "00:01:00" $appPool | Set-Item
5 SQL Server White Papers Every DBA Should Read | Strate SQL
Administration | netnerds.net
Automating Your SQL Server Best Practice Reports:The Checks
SQL Server Query Plan Analysis: The 5 Culprits That Cause 95% of Your Performanc...
SQL SERVER – Find the Growth Size for All files in All Databases – Journey to SQ...
SELECT   "Database Name" = DB_NAME(database_id) ,"FileName" = NAME ,FILE_ID ,"size" = CONVERT(NVARCHAR(15), CONVERT(BIGINT, size) * 8) + N" KB" ,"maxsize" = ( CASE max_size WHEN - 1 THEN N"Unlimited" ELSE CONVERT(NVARCHAR(15), CONVERT(BIGINT, max_size) * 8) + N" KB" END ) ,"growth" = ( CASE is_percent_growth WHEN 1 THEN CONVERT(NVARCHAR(15), growth) + N"%" ELSE CONVERT(NVARCHAR(15), CONVERT(BIGINT, growth) * 8) + N" KB" END ) ,"type_desc" = type_desc FROM sys.master_files ORDER BY database_id
Back to Basics: Capturing Baselines on Production SQL Servers - SQLServerCentral
How to Host Multiple Linux Terminals for Viewing and Collaboration with Wemux
Ansible - Clean Formatted Playbooks - EverythingShouldBeVirtual
MDT package now on Chocolatey.org ready for Windows 10! | Keith"s Consulting Blo...
Has my WIM’s changed? – MSitPros Blog
Deleting all network printers on a client with PowerShell – MSitPros Blog
Get-WMIObject Win32_Printer | where{$_.Network -eq "true"} | foreach{$_.delete()}
ESP8266 BASIC - Home
esp8266
Reverse engineering the ARM1, ancestor of the iPhone"s processor
a
The Bro Network Security Monitor
How to Use 8 Useful "Debian Goodies Utilities" to Manage Debian Packages
Aethercast Developing Open Source Display Streaming for Ubuntu | Open Source App...
Aethercast
Automating PowerShell Empire Install | Room362
29 Practical Examples of NMAP Commands for Linux System/Network Administrators
Concurrent Remote Desktop (CRDP) for Windows 10 - DeployHappiness
Philip Flint » Blog Archive » Powershell launch options
Ansible - Debian Based Gotchas - Part-1 - EverythingShouldBeVirtual
Windows Server 2016 - What is the difference between Standard And Datacenter Edi...
Adding a USB power port to a switch for IoT - Designing Electronics in Spain
Microsoft PowerShell Tutorial & Training Course – Microsoft Virtual Academy
Control your Arduino over the Internet using Blynk
How to Add a Hostname Alias for a SQL Server Instance - David Browne"s Web Log -...
Using Friendly Names for SQL Servers via DNS
Stretch"s Hierarchy of Network Needs - PacketLife.net
Build a Large-Screen Command Center with the RPi 2 | Linux Journal
7 DIY Tech Skills to Teach Your Kids, Because Schools Won"t
Generate a parameter list for all SQL Server stored procedures and functions
SQL Server Backup
shaarli · GitHub
ownCloud.org
home | Wiki | Andrew Dolgov / tt-rss | GitLab
dokuwiki [DokuWiki]
Coppermine Photo Gallery
TechNet Diskspd, a Robust Storage Testing Tool, Now Publically Available
Xiaopan OS - Pentesting Distribution for Wireless Security Enthusiasts
Securi-Pi: Using the Raspberry Pi as a Secure Landing Point | Linux Journal
The Death of Surplus | Hackaday
How to Adapt your older SharePoint PowerShell Scripts to Support SharePoint 2016...
OpenALPR - Automatic License Plate Recognition
InfoSec Handlers Diary Blog - Nessus and Powershell is like Chocolate and Peanut...
A Quick Reference of vSphere IDs - Virtu-Al.Net
How to Retrieve Passwords Stored in Windows with PowerShell - Todd Klindt"s Shar...
How to Change Server’s Minrole in SharePoint 2016 - Todd Klindt"s SharePoint Adm...
Perl 6 Advent Calendar | Something cool about Perl 6 every day
Is your network ready for IoT devices?
The security risks of IoT devices
Welcome to kicost’s documentation! — kicost 0.1.12 documentation
KiCad EDA
Welcome to KiPart’s documentation! — KiPart 0.1.13 documentation
Details • Magic smoke enabled 18650 LiPo battery pack. • Hackaday.io
Qora, an open source cryptocurrency | Opensource.com
Friday Fun: Holiday Shopping with PowerShell
16 Excel Formulas that Will Help You Solve Real Life Problems
Sony employees on the hack, one year later.
Freelancers Union :: A Federation of the Unaffiliated
Can Tech Pros Really Win the Gig Economy? - Dice Insights
Why is hi-tech Japan using cassette tapes and faxes? - BBC News
Cable U Training - Communications Estimating
Using Logstash to Analyse IIS Log Files with Kibana
How to upgrade Debian Linux system from Wheezy to Jessie stable release
Knowm.org | How to Set Up the ELK Stack- Elasticsearch, Logstash and Kibana
asp.net - The Report Viewer Web Control HTTP Handler has not been registered in ...
QuickLabel Support & Training Videos
IIS logging to the ELK stack
Install Kibana4, Logstash, Logstash-forwarder and Elasticsearch on Debian 8 Jess...
NXLog Community Edition | nxlog.co
Sending Windows Event Logs to Logstash / Elasticsearch / Kibana with nxlog » Rag...
Sending Windows Event Logs to Logstash - /dev/random
Top 6 Open Source Disk Cloning and Imaging Softwares
lorengordon/ash-windows-formula · GitHub
Getting Started with GNU Radio | Hackaday
Remove Internet Explorer Open or Save Popup | Justin Cooney
The Report Viewer Web Control HTTP Handler has not been registered in the applic...
american fuzzy lop
IIS load balance and failover configuration with Haproxy | Technical Journeys
UsingKVM < CampusGrids < TWiki
Accidental DBA Series - SQLskills.com
Automated Restore Script Output for Ola Hallengren’s Maintenance Solution | Jare...
Script Schedule Ola Hallengrens Maintenance Solution Default Jobs with Powershel...
20 ways to improve SharePoint User Adoption - SharePoint Maven
How to Caulk a Bathtub: 10 Steps (with Pictures) - wikiHow
How to replace blank/space with line break (Alt Enter) in Excel | sitweak
Synchronising Service Applications Between SharePoint Disaster Recovery Farms - ...
How SharePoint Recycle Bin works - SharePoint Maven
Solving the First-Launch Configuration Error with PowerShell"s Invoke-WebRequest...
mathpiper
Postfix Admin - Web based administration interface
Exploring the open development method | Opensource.com
Security Issues - Overview and Examples - Paulo Zemek"s blog - Site Home - MSDN ...
Mastering ASP.NET 5 without growing a beard - Tess blog - Site Home - MSDN Blogs
Mid-Priced Hardware Gets Serious About Software Defined Radio | Hackaday
Your First GNU Radio Receiver with SDRPlay | Hackaday
MQTT
Hackaday Dictionary: The Global Positioning System (GPS) | Hackaday
Grad School Abroad | Graduate Study Abroad | Masters Programs Abroad
Logstash configuration dissection
if [type] == "eventlog" { # Incoming Windows Event logs from nxlog mutate { # Lowercase some values that are always in uppercase lowercase => [ "EventType", "FileName", "Hostname", "Severity" ] } mutate { # Set source to what the message says rename => [ "Hostname", "@source_host" ] } date { # Convert timestamp from integer in UTC match => [ "EventReceivedTime", "UNIX" ] } mutate { # Rename some fields into something more useful rename => [ "Message", "@message" ] rename => [ "Severity", "eventlog_severity" ] rename => [ "SeverityValue", "eventlog_severity_code" ] rename => [ "Channel", "eventlog_channel" ] rename => [ "SourceName", "eventlog_program" ] rename => [ "SourceModuleName", "nxlog_input" ] rename => [ "Category", "eventlog_category" ] rename => [ "EventID", "eventlog_id" ] rename => [ "RecordNumber", "eventlog_record_number" ] rename => [ "ProcessID", "eventlog_pid" ] } mutate { # Remove redundant fields remove => [ "SourceModuleType", "EventTimeWritten", "EventTime", "EventReceivedTime", "EventType" ] } if [eventlog_id] == 4624 { mutate { add_tag => [ "ad-logon-success" ] } } if [eventlog_id] == 4634 { mutate { add_tag => [ "ad-logoff-success" ] } } if [eventlog_id] == 4771 or [eventlog_id] == 4625 or [eventlog_id] == 4769 { mutate { add_tag => [ "ad-logon-failure" ] } } if [eventlog_id] == 4723 { mutate { add_tag => [ "ad-password-change" ] } } if [eventlog_id] == 4724 { mutate { add_tag => [ "ad-password-reset" ] } } if "ad-logon-success" in [tags] { metrics { add_tag => [ "drop", "metric", "ad-logon-success" ] meter => "ad-logon-success-metric" } } if "ad-logon-failure" in [tags] { metrics { add_tag => [ "drop", "metric", "ad-logon-failure" ] meter => "ad-logon-failure-metric" } } }
Practical Technology: Logstash to Nagios - alerting based on Windows Event ID
Using logstash, ElasticSearch and log4net for centralized logging in Windows
Using Powershell to push registry fixes around multiple machines - Stuart Moore
Backup Plex For Ubuntu Reliably - Freedom Penguin
Vyatta 6 IPv6 Zone Policy Example | Long Term Storage
EdgeRouter Lite Configuration - Ubiquiti Networks Community
Japan its own enemy in push to improve cybersecurity ‹ Japan Today: Japan News a...
Escaped...From a Twisted Mind
Proxmox VE Cluster with Ceph - Re-purposing for Hyper-convergence
Ceph
Low Cost Scale-Out Nas for the Office - CephNotes
Corporations and OSS Do Not Mix - cat /dev/brain
A free solution to test VVOLs in my lab, at last! (thanks to EMC) - Virtual to t...
PrisonPC
SAS HBA crossflashing or flashing to IT mode, Dell Perc H200 and H310 | techmatt...
Your Real-World Git Cheat Sheet | Linux.com
Qi Wireless Chargers are now my friend | IdoNotes (and sleep)
Powerbot PB1030
Setting up the Edgemax EdgeRouter Lite (ERLite-3) in a Home Environment | Virant...
The rEFInd Boot Manager
rEFIt
DSHR"s Blog: Cloud computing; Threat or Menace?
Slide Rules were the Original Personal Computers | Hackaday
Hosts Block | Wilders Security Forums
High disk utilization by SQL server - SQL server blogs - Site Home - MSDN Blogs
How to downgrade a SQL Server from 2008 R2 to SQL Server 2005? - SQLAzureKKB - S...
Keeping Linux Clean - Freedom Penguin
How Will the Big Data Craze Play Out? | Linux Journal
C-Media cheap USB sound card
Python for the Data Scientist | Backyard Data Science
Windows Server 2012 / 2012 R2 - Logon restricted to members of Local Administrat...
Neptune RF water meter frequency hopping pattern | Eric"s Blog
Readme
How to Identify Why an Application Pool is Recycling in IIS 7 and DebugDiag 2 Fa...
The system is entering sleep. - Ken Werner - PFE - Site Home - MSDN Blogs
How to Setup Postfix Mail Server and Dovecot with Database (MariaDB) Securely - ...
Generate serie of numbers in SQL Server 2016 using OPENJSON - SQL Server Databas...
Dialects of the IoT - O"Reilly Radar
The first rule of management: Resist the urge to manage - O"Reilly Radar
@JKevinParker: Finally! A Way to Make SharePoint Useful
Celebrate the 200th Birthday of George Boole With Logic
Clint Boessen"s Blog: Active Directory Issues - Network Drives Not Mapping
KMBT_C284e-20151028113010 - SolderingAluminum_WalterFinnegan.pdf
Jan-Piet Mens :: A story of home automation with openHAB, Z-Wave, and MQTT
Jan-Piet Mens :: Who phoned? FritzBox, openHAB, and MQTT know
OpenHAB - Home Automation For Geeks
MySensors -
openHAB
Connect openHAB to hundreds of apps - IFTTT
Running Multiple Linux Servers as KVM Virtual Machines | Steven Gordon
VSAN resync behaviour when failed component recovers - CormacHogan.com
Linked - The Best Employees Stay With Companies That Help Them to Get Better
Lessons From a Decade of IT Failures - IEEE Spectrum
Talent, not shadow IT or hackers, is what keeps CIOs up at night | The Enterpris...
Best Linux Video Editors - Datamation
33 Ways to Feel 10 Years Younger
Cloud Monitoring as a Service | Datadog
Recap: Jim Whitehurst keynote, All Things Open 2015 | Opensource.com
is
Responsive Kanban Board – SharePoint Hosted App | SharePoint Rider
Clint Boessen"s Blog: Enable Firewall Logging on Windows
Benjamin Trigona-Harany - KMail with Maildir
Clean start after a failed migration
Automatic Restarts Make for a Smooth Day - DeployHappiness
Make jenkins Windows service use your preferred JRE « Only Software matters
Introducing the JEA Toolkit Helper - Building Clouds Blog - Site Home - TechNet ...
Check all database email profile in SQL Server by using sysmail_profile
Jon Galloway - 10 Things ASP.NET Developers Should Know About Web.config Inherit...
Jahid"s Blog - Using T-SQL - Database Mail configuration settings and Important ...
Use PowerShell to Find Windows XP Computers Still Alive in Your Active Directory...
sysmail_profile | SQL with Manoj
The Retr0bright Project
A guide to Alternate Access Mappings Basics in SharePoint 2013 | blksthl
10 DNS Errors That Will Kill Your Network -- Microsoft Certified Professional Ma...
The Global Language of Business |GS1 US
Understanding Thermal Dissipation and Design of a Heatsink - slva462.pdf
Why IoT Security Is So Critical | TechCrunch
CCTV Botnet In Our Own Back Yard | Incapsula.com
Audit which network ports are used by a Linux process - Linux Audit
The 101 of ELF Binaries on Linux: Understanding and Analysis - Linux Audit
5 Unique Sites for Finding and Sharing Free Recipes
tlsdate: The Secure Alternative for ntpd, ntpdate and rdate - Linux Audit
20 Awesome Target Shopping Savings Hacks for Dollar Squeezers Like Me! - More Wi...
Best Money Tips: The Keys to Successful Meal Planning
DevOps case study: Rabobank cuts deployment by 60 percent | The Enterprisers Pro...
Install SSH VPN server | panticz.de
Is Online Banking Secure? 5 Risks That Should Worry You
SharePoint 2013 Search: Even Better Best Bets with Exact Matching - Eric Dixon"s...
Why Should You Get a Ham Radio License? | Hackaday
An Improvement to Floating Point Numbers | Hackaday
SQL Admin Script Collection - Lukas Steindl`s BI Blog - Site Home - MSDN Blogs
DSC Resource Kit updates are here! - Windows PowerShell Blog - Site Home - MSDN ...
SharePoint Usage Database in SQL Server AlwaysOn - Build on SharePoint - Site Ho...
The SharePoint Timer Service service terminated unexpectedly - Murat Odabasi - S...
What Are You?
Configuring People Picker in a one-way trust environment with powershell - Murat...
Sorting and rotating photos | Erik Wramner
jhead -n%Y/%m/%d/%f -autorot -exonly *.*
Walmart, Lagging in Online Sales, Is Strengthening E-Commerce - The New York Tim...
Hindsight: What 7 IT leaders wish they had known early in their careers | The En...
.
OpenStack Summit interview with Ian Lewis of Google | Opensource.com
9 habits to make you sound smart - Business Insider
eloquen
Sony Laptop “experiment” – part 3, benchmarks | MX372.net
Sony Laptop “experiment” – part 2, the details | MX372.net
Sony laptop “experiment” | MX372.net
Project: PiDesk – A Raspberry Pi controlled, futuristic desk | Frederick Vandenb...
Cool Tools – The Best Factual Podcasts
TEMPEST: a Tin Foil Hat for Your Electronics and Their Secrets | Hackaday
Teradata releases the power of IoT data
5 New Networking Requirements Driven By Internet of Things and Big Data - Plexxi
OpenHAB Beginner"s Guide Part 2: ZWave, MQTT, Rules and Charting
Getting Started with OpenHAB Home Automation on Raspberry Pi
Is Wall Street Eating Your 401(k) Nest Egg? : NPR
PowerShell/EWS: Searching for and deleting duplicate mailbox folders - EMEA Deve...
Identify queries that consume a large amount of log space in SQL Server | SQL-Tu...
Scheduling Ola Hallengrens Maintenance Solution Default Jobs with Powershell | S...
Clint Boessen"s Blog: Remove all Printers Deployed from a specific Print Server ...
Populating My DBA Database for Power Bi with PowerShell – Databases | SQL DBA wi...
INSS 453 - Internet and Network Security
check_domino Nagios plugin
A Software Developer"s Guide to HTTP Part II - Messages
Forgotten vCenter (vcsa) 5.5 root password | VMware Communities
RasPiHacks.pdf
Behind the Racks | Redundant Load Balancers – HAProxy and Keepalived
Using VMware vSphere/ESXi as a Provider for Vagrant
The programmer"s guide to breaking into management | InfoWorld
10 principles for sane automobile manufacturing - O"Reilly Radar
Theory, practice, and fighting for terminal time: How computer science education...
Dice Data: How Tech Skills Connect - Dice Insights
IBM Error: "This database has local access protection..." when trying to open lo...
How to Pass the CompTIA Linux Certification ?
How To Kill All Users In Specific Database On SQL Server — DBA to DBA
How To: Deploy a Set of Power Settings to ALL Workstations - BrianDagan.com
Azeez"s Notes: TCP Load Balancing with HAProxy
100 open source Big Data architecture papers for data professionals. | Anil Mada...
Python SUDS with Windows Authentication (SOAP) | C. Bess Wonders
NTLM Authenticating Proxy Check Script
How to upgrade to Debian 8 Jessie from Debian 7 Wheezy | Linux Veda
Install HAProxy and Keepalived (Virtual IP) : Severalnines Support
How Stack Exchange gets the most out of HAProxy at Brokenhaze
HAProxy Load Balancing IIS with Sticky Session and SSL | Net Tweets
clomd strange errors, | VMware Communities
What do the fiber terms 9/125, 50/125 and 62.5/125 refer to?
VMware KB: Powering on virtual machines in VMware Virtual SAN 5.5 fails with err...
Automating the setup wizard on the Lotus Notes client
My VSAN Nightmare : vmware
Making the switch from 62.5- to 50-micron fiber - Cabling Install
Evernote and LinkedIn perfect the business card
Contact Management Software & API - FullContact
Installig SQL 2008R2 SP3 failed – Crytographic Error | Thoughts from the recycle...
How Many Virtual CPUs Per VM? « vPivot
DNSCMD Kung Fu | edgeblog
Snapshot: CLOM experienced an unexpected error. Try restarting clomd. | Helweg"s...
Home - Concerto Digital Signage Project
adammcewen | SharePoint Uncovered | Page 2
How to create a SQL Alias 32 bit and 64 bit - Jeremy Taylor | Jeremy Taylor
Important Tips on Router & SMTP mail routing - docview.wss
How to circumvent the 417 Expectation failed behind a Squid proxy
ignore_expect_100 on
23 things you should know about Excel pivot tables | Exceljet
Remote Registry with Powershell (PLUS: Create-ListBox function) | PeetersOnline....
info-beamer pi - A Digital Signage Player for the Raspberry PI
Binary Emotions | Operating Systems
Home - PiWall
ProjectWise News and Blogs | Published by Bill DiGregorio, Bentley Systems
ProjectWise V8i Administrator Client Course Guide
Why Firewalls Won"t Matter In A Few Years - EtherealMind
Using the docker command to root the host (totally not a security issue) // reve...
Tech for Non-Profits
The Pros and Cons of Using NOCs for Wireless E-Mail - gartner_pros_and_cons_of_u...
Error opening file: "The file format differs from the format that the file name ...
Virtual SAN Automatic "Add Disk to Storage Mode" Fails - VMware vSphere Blog - V...
How to Format and Create VMFS5 Volume using the CLI in ESXi 5 | virtuallyGhetto
Clearing datastores in ESXi (Call "HostDatastoreSystem.RemoveDatastore" for obje...
Clint Boessen"s Blog: The Windows Backup engine could not be contacted. Retry th...
Group Policy Object filtering by security group - TechRepublic
Allen-Bradley and Rockwell Software support for Windows 7
Geek of All Trades: Why, When and How to Use Windows 7 XP Mode | TechNet Magazin...
Networking and Using Windows XP Mode - Windows Virtual PC - Site Home - TechNet ...
My VSAN journey - all done! - ESX Virtualization
My VSAN journey - Part 2 - How-to delete partitions to prepare disks for VSAN if...
My VSAN Journey Part 3 - VSAN IO cards - search the VMware HCL - ESX Virtualizat...
Lane"s Tech Blog: SQL Server Reporting Services Service Start Timeout
Fix my IT system: IPv4 DNS records removed from DHCP clients with IPv6 Enabled
sql server - How To Profile Stored Procedures - Database Administrators Stack Ex...
Less Than Dot - Blog - Creating a baseline for SQL Server
EFF"s Top 12 Ways to Protect Your Online Privacy | Electronic Frontier Foundatio...
Sql Server : How to check if a user define table type exists using query (TSQL) ...
user define table type
Josh Steimle: Speaker, Writer, Entrepreneur
The Promise of the Internet of Things and the Web of Things - Introduction to th...
The Rise of the Internet of Things Offers the Promise of Impactful Innovation
The Promise and the Peril of the IoT - Peak 10
Three Ways to Convert Text-Based Numbers to Values | AccountingWEB
The Code Log | Quietly Alive!
The Promise of IoT | Features content from Global Purchasing
The 54 Excel shortcuts you really should know | Exceljet
The Promise and Challenges of an Internet of Things (IoT) World
FloorPlanner
Holding Down 0 (zero) Key To Recovery Screen Doesn... - TOSHIBA FORUMS
Toshiba,press 0 to recovery
How to boot from USB on ASUS X551CA? - Super User
Under Security disable Secure Boot Control Under Boot disable Fast Boot, then enable Launch CSM, then enable Launch PXE OpROM Save changes and restart and press the esc key and choose boot from USB. If that doesn"t work...at least you have somewhere to start looking.
Server Service: IRP Stack Size - Monitors - Public MPWiki
IRPStackSize
[vdi2qcow2, qemu] How to Convert vdi to qcow2 - Google Docs
How To Install Primavera P6 15.1 standalone with SQL Express
Primavera
MSDgen - Global Regulatory Compliance Suite - 3E Company
Simon Sinek: Why good leaders make you feel safe | TED Talk | TED.com
This hilarious Cisco fail is a network engineer"s worst nightmare
Create Interactive HowTo"s for the Web - whatfix
Puppetized mFi controller
Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution
MobaLiveCD - Run your LiveCD on Windows
Security Onion
Pentoo
Sharegate"s SharePoint Blog | Sharegate
Configure Product Activation using Group Policy or the Licensetoolcmd - SELECTse...
Browse by Tags - Hey, Scripting Guy! Blog - Site Home - TechNet Blogs
Using the Time Domain Reflectometer (TDR) | OSP Magazine
Start a K2 process from PowerShell | sparepoint
Automated Restore Script Output for Ola Hallengren’s Maintenance Solution - SQLS...
Why IT staff are unhappy at work
Three ways to design your DFS Namespaces - Jose Barreto"s Blog - Site Home - Tec...
Using Domain Controller Account Passwords to HashDump Domains | Room362
AWS in Plain English
How to: Set Tomato Firmware for Wireless Client Modes
Print all attachments from documents – Kwintessential Notes
Re: Saving attachments from multiple e-mails.
This tiny "e-mailable" solar house snaps together like a 3D puzzle without a sin...
Our World in Data — Visualising the Empirical Evidence on how the World is Chang...
OpenNTF.org - Print attachments with OLE Aut
How to Bypass and Reset the Password on Every Operating System
Updated UniFi Repo info/APT howto - Ubiquiti Networks Community
Scheduling Ola Hallengrens Maintenance Solution Default Jobs with Powershell - S...
Power Bi, PowerShell and SQL Agent Jobs | SQL DBA with A Beard
Jenkins, Docker, Proxies, and Compose | Riot Games Engineering
WaveGuard WG-UB-RM1 – Indoor enclosures – ISP Supplies
Home : Geographic Information : U.S. Bureau of Labor Statistics
tuptime - Shows Historical and Statistical Running Time of Linux Systems
How to Use Ansible Playbooks to Automate Complex Tasks on Multiple Remote Server...
The Local Frontier: Data Centers Coming to a City Near You
Million-Dollar Words - million-dollar-words-by-godin-and-mandell.pdf
The eight critical issues holding back IT
PowerShell Blog - Mirror-Database
InfoSec Handlers Diary Blog - Data Visualization,What is your Tool of Choice?
8 Useful Commands to Monitor Swap Space Usage in Linux
Hash Tables—Theory and Practice | Linux Journal
How to map your mouse on Linux
Choosing between OneDrive for Business and SharePoint
ThingWorx Developer Zone | ThingWorx
Why the Internet of Things isn"t the same as the new hardware movement - O"Reill...
Joe Biron on what"s new about the IoT - O"Reilly Radar
Linux Text to Speech Tool Reaches Beta | FOSS Force
How to Make Your Graphs & Tables Look More Professional
SharePoint High Trust Add-In Provider Hosted Quick Start/Walkthrough - Danimal52...
Team Foundation Server 2015 upgrade planning - Premier Developer - Site Home - M...
Automate SSRS Report Generation using PowerShell - Canadian Developer Connection...
Forrest M. Mims III
GnuCOBOL (formerly OpenCOBOL) / Discussion / Forums
IonicaBizau/node-cobol · GitHub
OpenCobolIDE/OpenCobolIDE · GitHub
Open Source GPS Tracking System - Traccar
How to protect your network in the BYOD era
BYOD and BYOA (Bring Your Own Application) have become natural parts of our day to day lives. As this trend continues to grow, the
PlantUML : Open-source tool that uses simple textual descriptions to draw UML di...
Get started with Sweet Home 3D on Linux
Create Your Own Video Sharing Website using "CumulusClips Script" in Linux
Multiheaded NVIDIA Gaming using Ubuntu 14.04 KVM - Puget Custom Computers
Active Directory Change Control and Other Advanced Adaxes Features - DeployHappi...
The 20 Websites You Need to Learn Math Step by Step
SQL Script to set all Log and Database files to fixed size absolute growth value...
Discovering SSRS Report Parameters using PowerShell - Canadian Developer Connect...
Script to defragment SQL Server Log Files – improves DML and Backup/Restore perf...
Docker: Containerize your Startup – Your journey from virtualization to Containe...
Reading - The Internet of Things: It"s Not Just Data Collection, It"s Evidence
A Smattering of Group Policy and Modicum of AD - Paranoid Humanoid - Site Home -...
FreedomBox/LeavingTheCloud - Debian Wiki
How Floods in Thailand Made AWS Rethink Its Supply Chain • Data Center Frontier
The Linux Works: Linux Security: Lock Down a New System Immediately
5 ways to learn SharePoint - SharePoint Maven
Raspbian Jessie Lives Up to the Hype | FOSS Force
Debug Diagnostics Tool v1.2 is now available
Improve Database Performance Without Changing Code
Money moves for graduates: How to set up a budget
Building Carrier-Grade Cloud Infrastructure « ipSpace.net by @ioshints
Sharepoint User Profile context Filter webpart using powershell - rakhiguha - Si...
How to use BizTalk throttling feature to achieve throughput control like receive...
CoreOS is Funding Kubernetes Development on AWS - The New Stack
Linux Foundation straps a rocket on Real Time Linux ·  LinuxGizmos.com
How to Create Multiboot USB Stick With Veeam Recovery ISOs for Different Systems...
A Brief History Of Android Easter Eggs - #NatAndLo Ep 8 - YouTube
DIY 110v Temperature Controlled Soldering Station | PCB Smoke
Agile team evaluation - Eric Gunnerson"s Compendium - Site Home - MSDN Blogs
Sharepoint Query String Filter webpart using powershell - rakhiguha - Site Home ...
Ancient SCO Unix Crash
Using KDE Connect to Sync your Android Device with Your Linux Computer
Configure Syslog for VMware ESXi via vMA | Geek and I
Microsoft Patchchart
How to Install and Use Linux Malware Detect (LMD) with ClamAV as Antivirus Engin...
eBook_SQL_Server_Setup_Checklist.pdf
Migrate print server script
Save print server settings script
SPSWakeUp - Wake Up Your SharePoint ! - Home
Quick way to query IIS logs for 40x and 50x requests - Peter Hahndorf
Sysads Gazette Split SQL TempDB per number of Processor Core - Sysads Gazette
Development With A Dot - SharePoint Field Reference
Get-SPScripts : PowerShell Scripts for SharePoint
Demystifying SharePoint Performance Management Part 11 – Tales from the Microsof...
Demystifying SharePoint Performance Management Part 10 – More tools of the trade...
Demystifying SharePoint Performance Management Part 9 – Don’t believe everything...
Demystifying SharePoint Performance Management Part 8 – More on SQL and SQLIO - ...
Demystifying SharePoint Performance Management Part 4 – Making use of RPS - Clev...
Demystifying SharePoint Performance Management Part 7 – Getting at Latency, IOPS...
Demystifying SharePoint Performance Management Part 6 – The unholy trinity of La...
Demystifying SharePoint Performance Management Part 2 – So what is RPS anyway? -...
Demystifying SharePoint Performance Management Part 5 – So what is latency anywa...
Demystifying SharePoint Performance Management Part 3 – Getting at RPS - CleverW...
Perfmon Counter Templates – SharePoint Server, Project Server and SQL Server | S...
Demystifying SharePoint Performance Management Part 1 – How to stop developers b...
reSP
Four Tips for SQL tuning for SharePoint Part 2 - Shrink DB - SQLPFE.IL - Site Ho...
Four Tips for SQL tuning for SharePoint Part 1 - MAX DOP - SQLPFE.IL - Site Home...
SQL Alias PowerShell script - SQLPFE.IL - Site Home - TechNet Blogs
SQL Protocol How to secure and disable unnecessary protocol with a Power Shell s...
Four Tips for SQL Tuning for SharePoint Part 3 TEMPDB - SQLPFE.IL - Site Home - ...
A trip down Unix memory lane | ITworld
30 years a sysadmin | ITworld
Hard Drive Configurations for SQL Server
The Technology chronicle!!!: DHCP Dora process
SharePoint Foundations 2013 Offline Part 2 ( Install Prerequisites ) - the Conne...
SharePoint Foundations 2013 Offline Part 1 ( Download all Prerequisite software ...
LXC: create Ubuntu Trusty container | panticz.de
Securosis Blog | Building Security Into DevOps: Security Integration Points
Automatic motion trail effect with OpenCV | en art | ao2.it
Managing Printers with Group Policy, PowerShell, and Print Management
VMware KB: Extracting the drivers from VMware Tools bundled with VMware Workstat...
Create UEFI disc | panticz.de
Using Group Preferences in AD to Install and Map Network Printers - IT Knowledge...
The Invisible Things
Qubes OS Project
How to Monitor Progress of (Copy/Backup/Compress) Data using "pv" Command
Dealing with Boundary Issues | Linux Journal
Storage performance troubleshooting with ESXTOP [Guide] - ESX Virtualization
iOS 9"s WiFi Assist is killing your data plan
SharePoint- Export/Import Managed Metadata Terms through CSV - Thiru"s SharePoin...
Q Light Controller
Home: LinuxMCE home automation
Avidemux - Main Page
Mumble, the open source VoIP solution
OZW Utilities
- The Internet of Things is powered by Z-Wave.
Active Directory: How to update User thumbnail photo using Service Account - rak...
Building the Ultimate IKEA Bed | Hackaday
Disney Research » Visible Light Communication
Better approaches to unit testing PowerShell scripts that call SharePoint cmdlet...
Companies grow using the power of the cloud
How bimodal IT is helping companies hire and retain workers | CIO
Vagrant Simplified | Linux Journal
All Things Open interview with Seth Vargo | Opensource.com
How to trigger commands on File/Directory changes with Incron on Debian
Protecting your Linux system | Opensource.com
Hesitant to embrace continuous deployment? Start small | The Enterprisers Projec...
Windows Server 2003 Migration (Part 1) - coping when reality interferes with the...
MSDN Blogs
Tracking Administrator Sessions in Windows Environments - /dev/random
Fragmentation Needed: Just some quick points about DHCP
Make a Weather Station with a Raspberry Pi 2 - Raspberry Pi Blog
VSAN: As Always, Latency Is the Real Killer « ipSpace.net by @ioshints
Version Control Guidance – Frequently Asked Questions - Visual Studio ALM Ranger...
The Security of Virtual Infrastructure
Bluetooth Hacks | Linux Journal
RainLoop Webmail
SquirrelMail - Webmail for Nuts!
Roundcube - Free and Open Source Webmail Software
Flowblade
Light Table
My VMworld Session - VSAN Monitoring & Troubleshooting - now available - CormacH...
Descriptive Statistics - Initial Evaluation of the Data - Carpe Datum - Site Hom...
Leveraging Internet Explorer Enterprise Tools to More Quickly Upgrade to IE11 - ...
The (Amateur) Data Science Body of Knowledge - Carpe Datum - Site Home - MSDN Bl...
New extended event to track backup and restore progress - SQL Server Team - Site...
PowerShell Summit Europe 2015 Presentations
Delayed Folder Redirection File Screens with PowerShell - DeployHappiness
PA-Gapps - Community - Google
Inside Amazon"s Cloud Computing Infrastructure
BYOD adoption slowed by policy issues
VSAN 6.1 New Feature - Problematic Disk Handling - CormacHogan.com
DFS Replication Improvements in Windows Server 2012 - The Storage Team at Micros...
Step-By-Step: Migrating a 2003 file server with Microsoft File Server Migration ...
51 Useful Lesser Known Commands for Linux Users
Linux and the Internet of Things | Linux Journal
FileBot - The ultimate TV and Movie Renamer / Subtitle Downloader
HuePl: A Perl command line controller for the Philips hue lighting system
Emby - The open media solution
How to Record and Replay Linux Terminal Sessions using "script" and "scriptrepla...
How to Setup SSH Keys on a Linux System - Freedom Penguin
Continuous Delivery: Getting Started | Linux.com
TECH BULLETIN - 109A Soldering Tip Care and Use.pdf
Best Raspberry Pi Server Linux Distribution | TechFindings
ExTiX :: The Ultimate Linux System | All about ExTiX
Philip Flint » Blog Archive » Common PowerShell commands for Hyper-V
Philip Flint » Blog Archive » Delaying DHCP Offer (80/20 rule)
How To Wakeup Backup Nas Server and Mirror Files Using Rsync in Linux
Open Tree of Life
The Scribus Community - ScribusStuff.org
gLabels
Musing: Skipping 10Gig Ethernet and Going Direct to 25Gigabit ? - EtherealMind
per port basis is about 1.4 times that of 10GbE. Some vendors may charge more but t
TidBITS: Learn iOS 9 Fast with “iOS 9: A Take Control Crash Course”
Hardware Virtualization in Microcontrollers | Hackaday
In-Place upgrade to Team Foundation Server (TFS) 2015 from TFS 2013 - Microsoft ...
Version Control Walkthrough (Branching Strategies) Part 2 - Development Isolatio...
MSDN Blogs
The Linux Setup - Jim Whitehurst, President/CEO,... - My Linux Rig
Using Command Line Aliases – Frequently | Freedom Penguin
Assisted Serendipity – Fostering Peer to Peer Connections in Your Organization -...
Securosis Blog | Pragmatic Security for Cloud and Hybrid Networks- Introduction
IBM Using the Lotus Notes Install Cleanup Executable (NICE) tool - United States
Home Page - ABC-Deploy
DiskSpd, PowerShell and storage performance: measuring IOPs, throughput and late...
Create a W3WP memory dump, quick and easy - benjamin perkins - Site Home - MSDN ...
psexec -i -s cmd.exe - Chris Sugdinis" Configuration Manager Blog - Site Home - ...
psexec -i -s cmd.exe
Using Ola Hallengrens SQL Maintenance Scripts (1).pdf
undefined
Configuring Shared IPMI Ports on Supermicro Servers for the Home Lab - Wahl Netw...
Using PowerShell Desired State Configuration to build the first domain controlle...
Deploy Active Directory with PowerShell DSC (a.k.a. “DSC-PROMO”) - Goatee PFE - ...
TagSpaces - Organize Your Files
LasLabs | Initial Configuration - Ubiquiti EdgeRouter Lite - LasLabs
Create a Guest VLAN with a Ubituiti Edgerouter Lite
EdgeOS CLI Primer (part 1) - Ubiquiti Networks Community
Configuring Interface Based Firewall on the Vyatta Network Appliance | Knowledge...
The Ubiquiti EdgeRouter: Configuring this extremely low-cost, enterprise-grade r...
7 presentation tips from the 2015 world champion of public speaking - Agenda - T...
SolarBeat
Home - Ultimate Guide to Logging
Teach Scrum through games - Scrum Simulation with LEGO
NitroShare — Send Any File to Any Device
Debian: Install Cacti | panticz.de
SharePoint Navigation Best Practices - SharePoint Maven
SharePoint 2013 server shows "Upgrade Required" because AppFabric 1.1 was uninst...
The Jewish Fruitcake: Honey Cake Is A Sweet And Stodgy Tradition : The Salt : NP...
Cleaning temporary ASP.NET files - Octopus Deploy
Using PowerCLI to assist in right-sizing Memory for VMs | vNoob
PowerCLI & vSphere statistics - Part 1 - The basics - LucD notes
Upgrading from SharePoint 2010 to SharePoint 2013 - Fadi Abdulwahab"s Blog - Sit...
Think your meeting"s important? 25 years ago, this one spawned Wi-Fi | Network W...
Vic Hayes
Internet Crime Complaint Center (IC3) | Internet of Things Poses Opportunities f...
Resistance is… There’s an Augmented Reality App for That! | Hackaday
5 Utterly Fascinating History Education Resources
Containerize Your Startup: Image Management–Part 3 - Canadian Developer Connecti...
Prepare for Team Foundation Server (TFS) 2015 Upgrade - Microsoft Team Foundatio...
SharePoint Data Retention Policy - rakhiguha - Site Home - MSDN Blogs
Seth"s Blog: How idea adoption works--The Idea Progression
Law Firm IT Security: Unsolvable Problem or Risk Management Process? | Business ...
The 7 Best Web Apps For People Approaching Retirement
How to Run ISO Files Directly From the HDD with GRUB2
Effective NTLM / SMB Relaying | Room362
Why Windows Server Containers and Why You Need to Look at Containers? Hands on… ...
Simon Sinek: Why good leaders make you feel safe | TED Talk Subtitles and Transc...
Simple USB Power Meter | Hackaday
10 Tools to Make a Bootable USB from an ISO File
How To Install Puppet To Manage Your Server Infrastructure | DigitalOcean
pfSense Without Internets | Room362
How to Use PowerShell to Fix Duplicate User Principal Name for On-Premises Activ...
Whatever for free: Tuning Windows Server 2003 TCP/IP Stack
Top Ten IIS Configuration Tips - byronpate.com
Tuning IIS 8.0 | Web Application Performance - Best Practices
Puppet Network Device Management | Puppet Labs
netem
NIST SP 800-12, An Introduction to Computer Security : the NIST Handbook - handb...
How to manage SharePoint Implementation
The real confusion bug - Mostly True - Site Home - MSDN Blogs
SentinelOne - Next Generation Endpoint Protection
FreeDV | HomePage
Prevent SQL Server Reporting Services Slow Startup
Download Reporting Services Migration Tool from Official Microsoft Download Cent...
Microsoft SQL Server Product Samples: Reporting Services - Home
Linux Foundation Sysadmins Open-Source Their IT Policies | Linux.com
The True Internet of Things | Linux Journal
Life and layoffs - I. M. Wright’s “Hard Code” - Site Home - MSDN Blogs
https://www.loweslink.com/pubdocuments/edi860ProcurementImpGuide.pdf
The many (surprisingly realistic) hacks of "Mr. Robot"
A brief overview of the new Virtual SAN 6.1 - CormacHogan.com
VMware VSAN 6.1 Details - ESX Virtualization
Setting Up High-Performance HHVM and Nginx/Apache with MariaDB on Debian/Ubuntu
Coffee Break 16 – Using Windows PowerShell to Mark and Compare - Microsoft Dynam...
droppeDPackets » Patch more, patch faster
20 Command Line Tools to Monitor Linux Performance
Desired State Configuration(DSC) for SQL Server - Troy Ault"s Blog - Site Home -...
CloudPhysics - Data-Driven Insights for Smarter IT
How to Defragment Linux Systems - Make Tech Easier
1401_08-12_mickens.pdf
Save Encrypted Passwords to Disk with PowerShell - Todd Klindt"s SharePoint Admi...
An In-Depth Look at What"s New in Primavera P6 15.1
John Conway"s Life in Game | Quanta Magazine
HP announces mt42 -- an AMD-powered Windows 10 IoT Enterprise mobile thin client
What"s new in SharePoint 2016? - Azure, SharePoint & More - Site Home - MSDN Blo...
Ddrescue-GUI: Front-End for Ddrescue Command-line Tool - Ubuntu Portal
Install PXE Server And Configure PXE Client On CentOS 7 | Unixmen
How to configure virtual hosts in Apache HTTP server - Xmodulo
Microsoft Advanced Threat Analytics in now GA! - Active Directory Blog - Site Ho...
Microsoft Advanced Threat Analytics
Designing at the intersection of disciplines - O"Reilly Radar
The Big Picture: A nebula with the grace of a butterfly
Butterfly Nebula
Why I Hate ITIL So Much - EtherealMind
Why everyone must play a part in improving IoE privacy | The Enterprisers Projec...
10 Time-Management Skills That Will Help Your Kid Win at School
Veeam Whiteboard and PowerShell
Updated PowerShell Formatting Functions
Create Your Custom PDF Template for Planning Anything
Partitioning - ArchWiki
Partitions: Planning Your Linux Installation — Guide to Linux for Beginners
New HTML5 Embedded Host Client for ESXi | virtuallyGhetto
SharePoint Department Site Example - SharePoint Maven
How to add a Video in SharePoint - SharePoint Maven
4 IT leaders discuss how they are driving digital transformation | The Enterpris...
Using Cloud storage safely – encrypt & sync with Ubuntu | Scratch Uncle Gurrier"...
Buying cheap Arduino clones | TechFindings
Doing Astronomy with Python | Linux Journal
Texas Linux Fest: Interview with Robert Booth, SaltStack | Opensource.com
Mhddfs - Combine Several Smaller Partition into One Large Virtual Storage
51 Open Source Tools for the Internet of Things - Datamation
Spectrum Painting on 2.4 GHz | Hackaday
Handling VSAN trace files when ESXi boots from a flash device - CormacHogan.com
ACM Classic Books Series
A Deeper Look: Patching SharePoint 2013 Farms - Build on SharePoint - Site Home ...
Teeing Up to the Clipboard
From Skateboards to Drug Pumps, Welcome to Our Hackable Future - The Daily Beast
8 Formatting Tips for Perfect Tables in Microsoft Word
Creating network diagrams with Inkscape | Simplebeian
Accessing your modem from OpenWRT Router | Simplebeian
What Is Cumulus Linux All About << Data Center Fabric Architectures << ipSpace W...
Interesting Dell iDRAC Tricks – The Lone Sysadmin
The 10 Best Pieces of Cooking Advice From Julia Child
Docker: Containerize your startup! - Canadian Developer Connection - Site Home -...
Setting up an IIS Site Using PowerShell - Canadian Developer Connection - Site H...
What is this thing called Big Data? - PowerBI - Site Home - MSDN Blogs
Steps to check the code coverage of a web application via command line - Microso...
6 Musical Projects for Arduino Beginners
ESXi Commands List - Getting started - ESX Virtualization
Broadcast Your Own FM Radio Station, with a Raspberry Pi
TFS Upgrade - Long Lead Preparations - Visual Studio ALM Rangers - Site Home - M...
The Value of a Hacked Email Account — Krebs on Security
TFS 2015 released (RTM of Team Foundation Server 2015 available now) - Microsoft...
Buying a router for OpenWRT | TechFindings
Snapwatcher For VMware - Product Review - ESX Virtualization
Visual Studio 2015 FAQ - The Visual Studio Blog - Site Home - MSDN Blogs
TFS Upgrade - Short Lead Checklist - Visual Studio ALM Rangers - Site Home - MSD...
5 Career Tips I Learned From John Chambers and Cisco - EtherealMind
Use different wallpapers on multiple monitors in Linux - blackMORE Ops
Convert system information into DSC format | sepago
Rapid Provisioning Linux VDI Desktops with Horizon View | Long White Virtual Clo...
Samba Server Installation on Debian 8 (Jessie)
How to set up TFS 2015 in a dual server configuration - Microsoft Application Li...
TFS Upgrade - New Elements of TFS 2015 that influence an upgrade - Visual Studio...
Team Foundation Server 2015 Now Available - Somasegar"s blog - Site Home - MSDN ...
Unit testing with DNX (ASP.NET 5) projects - .NET Web Development and Tools Blog...
5 YouTube Videos To Get Really Excited About Smart Homes
7 Reasons Why The Internet of Things Should Scare You
Cooking for Diabetics: How to Find Safe and Delicious Recipes
good-and-cheap.pdf
lucadentella.it – irrighino
How To Run Cronjob Script On The Last Day Of a Month
SharePoint Permission Levels explained - SharePoint Maven
UNDERGROUND TOUR
Windows Support — Ansible Documentation
How to activate Windows 10"s secret God Modes
What Is Multihoming and What Do You Need to Set It Up?
5 Things to do before the SharePoint 2016 Beta Drops - Todd Klindt"s SharePoint ...
Operating System Version (Windows)
12 reasons folders in SharePoint are a bad idea | SharePoint Maven
Handling Deadlocks in SQL Server
InfoSec Handlers Diary Blog - Your Security Policy Is So Lame
Will violation of your security policy eventually lead to the policy violator realizing their opportunity to violate security policy at a different company? It should - Otherwise your document is really a suggestion and not a policy.
Useful Samba Networking Commands | toasterz
What should my backup strategies be for system databases? - SQLAzureKKB - Site H...
How shadow IT threatens the enterprise and what to do about it
Jailhouse | Linux Journal
10 Job Interview Questions for Linux System Administrators | Linux.com
Best Practices to Protect You, Your Network, and Your Information
Install Elastix Unified Communication Server | Unixmen
Command Prompt vs. Windows PowerShell: What"s the Difference?
CubCadet CC500 Electric Mower – LiPo Battery Conversion | PlastiBots
Multi-Terabyte SQL Server Database Backup Strategies for Azure Virtual Machines ...
DBCC CHECKDB - Good to know! - SQLAzureKKB - Site Home - MSDN Blogs
EXEC sp_msforeachdb "DBCC CHECKDB(""?"") WITH ALL_ERRORMSGS, EXTENDED_LOGICAL_CHECKS, DATA_PURITY" If you feel that you need to run the DBCC CHECKDB on the MDF (live, not snapshot) then use TABLOCK.
SQL Server Agent jobs collecting useful information, how to save them? - SQLAzur...
9 Ways to Organize Your Office With These 3D Printables
Using PowerShell Direct for Script Locking - Ben Armstrong - Site Home - MSDN Bl...
PowerShell Direct - handling authentication for better scripting - Ben Armstrong...
The Best Free eBooks to Teach Yourself About Personal Finance
ho
Soylent - Free Your Body
Maximize Evernote with 5 Powerful Features
.NET Framework setup verification tool, cleanup tool and detection sample code n...
PowerShell Direct & Waiting for an IP Address - Ben Armstrong - Site Home - MSDN...
# Wait for DHCP while ((Get-NetIPAddress | ? AddressFamily -eq IPv4 | ? IPAddress -ne 127.0.0.1).SuffixOrigin -ne "Dhcp") {sleep -Milliseconds 10}
Celestia: Home
Stellarium
Patching in 2 days? - "tell him he"s dreaming" - SANS Internet Storm Center
Slides and Scripts from SharePoint Cincy 2014
Default Search Index File Location for SharePoint 2013
LibreQDA public release | Tryolabs | Blog
Secure Server Deployments in Hostile Territory, Part II | Linux Journal
Secure Server Deployments in Hostile Territory | Linux Journal
Audio Programming with Open Source Languages - Linux Links - The Linux Portal Si...
Capital One Out to Display its Geekdom with Open Source DevOps Dashboard - The N...
How to Update Linux Kernel for Improved System Performance
Tips and Considerations When Creating Virtual Machines in Azure
How to install a Raspberry Pi SMS Server
Mr. Robot TV Show Now Uses BackTrack Linux"s Successor, Kali Linux, for Hacking ...
Pydio - An Open Source Alternative To Dropbox - Unixmen
Slides and Scripts from SharePoint Cincy 2015
Be Careful Installing .Net 4.6 / Visual Studio 2015 with SharePoint 2013 (July 2...
How to update Debian or Ubuntu Linux containers (lxc) VM
SOUPS - Symposium On Usable Privacy and Security
Building a commandline interface with boost::program_options - By Ulrich Krause ...
Building ONTF DomBackUp with TeamCity - By Ulrich Krause - eknori.de
How the Experts Protect Themselves Online (Compared to Everyone Else)
InfoSec Handlers Diary Blog - Patching in 2 days? - "tell him he"s dreaming"
SoftLayer launches new pricing and configuration options | IdoNotes (and sleep)
Tiny Yocto-ready ARM COM supports industrial temps ·  LinuxGizmos.com
Cloud security myths busted
Self forming teams at scale - Brian Harry"s blog - Site Home - MSDN Blogs
Dukto - An Easy, Multi-platform File Transfer Tool - Unixmen
Enterprise cloud economy is booming
vSphere Performance Improvements - New PDF - ESX Virtualization
Compare zones between two Nameserver | panticz.de
Performance Baselines and Benchmarks For SQL Server
Getting baseline and performance stats – the easy way. – Simple-Talk
Shaps/haproxy_check_mk
Osquery: Introducing query packs | Engineering Blog | Facebook Code | Facebook
Licensing and packaging changes for TFS 2015 - Brian Harry"s blog - Site Home - ...
Measure that Folder with PowerShell Revisited
Error while connecting to SQL Server – “Could not connect because the maximum nu...
Arduino Project Ideas for an Automated Home
An introduction to testing, part 3: Different types of tests · Paul Graydon
Childhood Tech Exposure Is Slowly Killing The Keyboard | Hackaday
What are the perks that employees want the most?
High-availability with HAProxy and keepalived on Ubuntu 12.04 | Tony"s press
Backups with rsnaphot to external USB drives | workaround.org
21 Surprising Uses for Vinegar
Give Your Raspberry Pi Night Vision With the PiNoir Camera | Linux.com
Using Huginn Scenarios to Save Money - andrew makes things
Virtualized Exchange Storage: VMDK or RDM or…? | Virtualize Business Critical Ap...
Doing It Wrong: Virtualizing SQL Server - Thomas LaRock
The SANMAN: vSphere"s Virtual CPUs - Avoiding the vCPU to pCPU ratio trap
SQL Server 2008 Management Data Warehouse
Automate and Improve Your Database Maintenance Using Ola Hallengren"s Free Scrip...
BlackbaudKnowHow.com: For Blackbaud Software Users » Our Recommended SQL Server ...
Free SQL Server tools that might make your life a little easier
Create, review and deploy code together with GitLab open source git repo managem...
4 HTTP Security headers you should always be using | ibuildings
Building an open source Nest — Particle Blog
Technology is run by the wrong people | Michael O. Church
Polychart.JS
Satya Nadella on a Mobile-First, Cloud-First World - J.D. Meier"s Blog - Site Ho...
How To Get Smarter By Making Distinctions - J.D. Meier"s Blog - Site Home - MSDN...
Application monitoring tools are often underused
PowerShell script to deploy/rebuild an ASP.NET Web application (a.k.a. Building ...
PowerShell Script: IIS Log Files Cleanup
Vicky Koul: IIS Powershell: Script To delete all sites
foreach ($i in get-childitem IIS:\Sites\ -Name) {remove-item ("IIS:Sites\"+$i) -R}
Welcome to Bob Aiello"s CM Best Practices Website!
Learn X in Y Minutes: Scenic Programming Language Tours
Orchard | Instant Docker hosts in the cloud
ClusterHQ: The Importance of Container Plugins for Extending Docker"s Functional...
Multilateration (MLAT) now available on PiAware! : ADS-B Flight Tracking
How to manage the IEHarden Setting for users using Group Policy Preferences(GPP)...
How can I configure Proxy AutoConfigURL Setting using Group Policy Preference (G...
A Complete List of Windows Development Tools @ Scott Ge
LAPS and permission to join computer to domain - LAPS - Local Administrator Pass...
C6100 IPMI Issues with vSphere 6 | vNetWise
Functional Python Made Easy - Hackflow
CloudRouter® | Router Distribution for the Cloud
Systemd - What You Need to Know - Make Tech Easier
Freshen stagnant skills with training and certifications | Opensource.com
"Recruiters are in hot pursuit of Linux talent. As business continues its tectonic shift to an open source model, employers are hungrier than ever for skilled Linux professionals who can demonstrate their competencies."
Zeal - Offline Documentation Browser
Key principles of an open organization | Opensource.com
Using the New iproute2 Suite | FOSS Force
PiDrive A Low Power Raspberry Pi mSATA Solid State Disk (SSD)
HOW TO: Recreate SQL Server Statistics In a Different Environment - Thomas LaRoc...
The Dinner Party Collective | Reinvigorating the Delicious Lost Art of Dinner Pa...
30 Trendy Internet Slang Words and Acronyms You Need To Know To Fit In
Restore content from Backed Up DBs -SharePoint 2013 - Part 2 - ashishranjan - Si...
Restore content from Backed Up DBs -SharePoint 2013 - Part 1 - ashishranjan - Si...
SharePoint 2013 - PSCONFIG is mandatory after installing July 2015 CU for ShareP...
These 9 Cloud Computing Skills Could Give You The Next Career Jump
OpenFire Microsoft Active Directory Security = Awesome Enterprise Instant Messen...
The WTF economy is transforming how we do business - O"Reilly Radar
Packer: In 10 minutes, from zero to bootable VirtualBox Ubuntu 12.04 | kappataum...
Restore Gene Version 3 – Technical Documentation | Paul Brewer
5 ways to keep your financial information safer from hackers
10 of the Coolest Sayings About Saving
Deduplication: Why Computers See Differences in Files that Look Alike | Ball in ...
How to Turn Your Android Phone or Tablet Into a Mouse and Keyboard for Windows
Software
HomePage - Wireless Battle of the Mesh
InstallCDCustomization/PreseedExamples - Community Help Wiki
partitioning - How do I preseed multiple partitions on one disk; /tmp /data /usr...
expert_recipe string
Notes on using expert_recipe in Debian/Ubuntu Preseed Files | Semi-Empirical She...
Script Use PowerShell to Migrate SQL Server Instances (db, logins, jobs, etc)
What is the best combination for your SPF record, DKIM record, and DMARC record?...
Check manual page of ipmi
SuperMicro - Nagios Exchange
A Simple Bash Script for Automated Backups | System Administration Desk
Puppet vs Chef vs Ansible - Probably
Comparison of Puppet and Ansible | Ifblog (ponderings 2.0)
Why "ASAP" is a craptastic deadline - SysAdmin1138 Expounds
Sysadmin Notebook: Removing hosts from backuppc
Sysadmin Notebook: Purge Removed packages
dpkg --list |grep "^rc" | cut -d " " -f 3 | xargs -r sudo dpkg --purge
Business Rules, Security Roles, and Logging - A Deeper Look at Adaxes for Active...
Skilled for Life - J.D. Meier"s Blog - Site Home - MSDN Blogs
Import / Deployment / Execution of SSIS packages fails after you migrate SSISDB ...
Moving from Zabbix to Check_MK · Paul Graydon
Trying out Ganeti with Vagrant
Virtual LCD Using Python | Hackaday
Grandstream Networks, Inc :: GVC3200
The history of Windows
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
Enterprise-class Wi-Fi for the SMB: 15 best practices from the field
Home Automation with Raspberry Pi | Linux Journal
How to automate VM deployment from large USB keys using ESXi Kickstart? | virtua...
gosddc/vagrant-vcenter
VMware Automated Lab: ESXi With Packer |
Go SDDC!
Time to replace RJ-45 connectors in the data center?
Automating Private Cloud Infrastructure with Puppet Enterprise and Razor | Datap...
Evernote Knowledge Base | Evernote
Interview with Emma Jane Hogbin Westby, Git | Opensource.com
How to set up your Raspberry Pi in Linux | TechRadar
From Iso To Vagrant Box
Sample Vagrantfile for vagrant-vsphere - Virtxpert
Everything You Need To Know About AC Routers
Oaktree Memo from our Chairman
The Chef, the Puppet, and the Sexy IT Admin | WIRED
Configuring USB Wifi TP-Link TLWN725N adapter on Kali Linux | l33t tutorials
TLWN725N
An introduction to testing, and its value to sysadmins. Part 1 · Paul Graydon
Using ZFS replication features in FreeBSD to improve my offsite backups | icefla...
Dune, 50 years on: how a science fiction novel changed the world | Books | The G...
Installing and Configuring X2Go Server and Client on Debian 8
Host specific SSH settings · Paul Graydon
Sysadmin Notebook: One line web server
while true; do { echo -e "HTTP/1.1 200 OK\r\n"; cat index.html; } | nc -l 8080; done
Howto setup High-Available HAProxy with Keepalived | Patrick"s Blog(2)
Octopress
Increasing performance in KVM virtualization within a Tier-1 environment
HowTo Improve IO Performance for KVM Guests - MDLog:/sysadmin
Free database backup software for MS SQL Server including Express | www.SQLServe...
Actifio - Copy Data Virtualization for the Enterprise and Cloud
Indian Rice Pudding Recipe : Aarti Sequeira : Food Network
Kheer (Rice Pudding) Recipe - Allrecipes.com
Simple keepalived failover setup on Ubuntu 14.04 - Raymii.org
F5 Alternative using HAProxy and keepalived | thejimmahknows
The culture-shift of moving to public cloud - SysAdmin1138 Expounds
Cloud Computing Price Comparison | Cloudorado - Find Best Cloud Server from Top ...
Two Factor Authentication for ownCloud
NAPS2 (Not Another PDF Scanner 2) download | SourceForge.net
Lessons in IT security: 5 rules small businesses need to follow by Matthew Stibb...
1024px-zip_code_zones.svg 2.png (1024×701)
Soldering Station | DebuggingLab
Psensor - A Graphical Hardware Temperature Monitoring Tool for Linux
LUA Buglight 2.3, with support for Windows 8.1 and Windows 10 - Aaron Margosis" ...
A High-performing Mid-range NAS Server - Pivotal Labs
xraj / windows-fromscratch — Bitbucket
Automating Website Creation with PowerShell v3 | Ponderings on Business, Finance...
How to - Create multiple IIS sites from text file using Powershell - API/SDK Dev...
Fig | Fast, isolated development environments using Docker
Custom error pages in ASP.NET MVC. Easy, right? - Ben Foster
Dogs, Rush hour traffic, and the history of storage I/O benchmarking–Part 1 | vm...
OpenProject - Overview - OpenProject
Managing IIS and ASP with Puppet | Andrew Krug: tech.web.net.reviews
9 Steps to Becoming a Better Public Speaker
6 Creative Uses for Wireless Surveillance Cameras in Your Home
Automating IIS with PowerShell | Windows Server Help
Backup with these DeDuplicating Encryption Tools - Linux Links - The Linux Porta...
Install MySecureShell SFTP Server In Linux
How to install and configure ZoneMinder – Linux CCTV – Debian 8 Jessie. » termin...
Cambozola
Deb Multimedia Packages::Home
apt-get install deb-multimedia-keyring
Efficient SQL Server in Azure VM Backup Strategies using DS-SERIES and Premium S...
VoIP done right: 11 best practices for moving to cloud-hosted PBX
10 Practical Examples Of Linux "nmap" Command | Unixmen
How to benchmark your GPU on Linux
glxgears
How to Crack a Wi-Fi Network"s WPA Password with Reaver
The Antenna Theory Website
9 DIY Landscaping and Gardening Skills That Will Save You Money
101 Things I Wish You Knew About SQL Server - Thomas LaRock
Fixing Errors with Windows Updates - The Blog of Todd
net stop wuauserv Rename the Software Distribution folder. Then start the Windows Update service. net start wuauserv
24 Quick Daily Habits You Can Use to Be Smarter
The Next Era of IT - Plexxi
Languages made easy with OneNote - Australian Teachers Blog - Site Home - MSDN B...
Online Reading for Kids: 5 Ideas to Motivate Struggling Readers
Remove an Offline Domain Controller
Securosis Blog | My 2015 Personal Security Guiding Principles and the New Rand R...
Turn Your Raspberry Pi into a Network Monitoring Tool
load balancing, affinity, persistence, sticky sessions: what you need to know | ...
active directory - NTLM through proxy server - Server Fault
Smart building: Building bridges between IT and facilities - O"Reilly Radar
ASP.NET Mixed Mode Authentication
NTLM Authentication Scheme for HTTP
Zero-Downtime Restarts with HAProxy - igvita.com
Screen Capture Made Easy with these Dedicated Tools - Linux Links - The Linux Po...
DSC Resource Kit flourishes as open source - Windows PowerShell Blog - Site Home...
NASA Images
5 cyber security tips for travellers
Replaying Linux CLI commands with history - Myles Gray
Safe Computing In An Unsafe World: Die Zeit Interview | Dan Kaminsky"s Blog
Scanning for network vulnerabilities using nmap - Myles Gray
The H-1B visa program is a scam
The problems facing chief information officers
Kitchen Soap – Some Principles of Human-Centered Computing
The Hex Colors in Small Basic - Small Basic - Site Home - MSDN Blogs
Leadership Skills for Making Things Happen - J.D. Meier"s Blog - Site Home - MSD...
Zero Copy I/O Aggregation (Bizarre ! Vous avez dit Bizarre ?)
Lantern: A New 925 MHz to 2175 MHz RTL2832U Based SDR for Satellite Reception | ...
204 Wireless Intrusion Detection System with Raspberry Pi Chris Jenks - YouTube
Refreshing A SQL Mirrored Database Using Powershell « SQL DBA with A Beard
Check MSSQL Database Mirroring - Nagios Exchange
Using Powershell to Set Up SQL Server Mirroring | Personal Weblog of a DBA
sql server - Tools to manage sql 2008 database mirroring? - Server Fault
PearBudget | a really simple budget
,
Cheap Domain Names-Domain Name Registration-Transfer-Renewal: NameSilo
openHAB - empowering the smart home
HomeGenie, Home Automaton Server in the Internet Of Things era
How To Configure A High Available Load-balancer With HAProxy And Keepalived | Un...
Keepalived & HAProxy in AWS: An Exploratory Guide
The Scale-Out Blog: Virtual IP Addresses and Their Discontents for Database Avai...
Open Source Industrial Smart Camera • Hackaday.io
Rethinking security: Securing activities instead of computers
puppet-community/puppet-windowsfeature
puppet-community/puppet-iis
Keycloak - JBoss Community
Kubernetes by Google
Stop Disabling SELinux
Control X10 with Mochad and PHP on a Raspberry Pi | Will"s Blog
Deploy and Manage Your Docker Containers. — Project Atomic
Home Automation with X10, Raspberry Pi, Linux and Ruby on Rails | harmdelaat.com
Installing mochad on a Raspberry Pi | X10 Linux
Using ltree for hierarchical structures in PostgreSQL
Ltree module for PostgreSQL
Git Workflow and Puppet Environments | Puppet Labs
Tackling Windows with Puppet!! | OlinData
Managing Windows with Puppet | Puppet Labs
A Git Horror Story: Repository Integrity With Signed Commits
git - the simple guide - no deep shit!
What Phones Looked Like Before And After The iPhone Transformed The Industry [Im...
Vintage Spirits and Forgotten Cocktails | Drinks From the Past for the Future
wview - Linux/FreeBSD/Unix/Mac OSX Weather Station Software
Home » OpenStack Open Source Cloud Computing Software
Discourse
- The Doubleclicks
linux - How to blacklist a correct bad RAM sector according to MemTest86 error i...
8 tools for visualizing data with open source | Opensource.com
Pragmatism in the History of GNU, Linux and Free/Open Source Software | Open Sou...
CIOs must lead their organizations in digital | The Enterprisers Project
entire
Four things businesses need to know about payment card compliance
How businesses should tackle information security
Why I won’t run another startup — Medium
Database Mirroring Monitoring and Alerting | SQL TWIST - This Week in SQL Server...
The 11 deadly sins of product development - O"Reilly Radar
Deploy plugins / workflows assemblies with Powershell - Aymeric @ Microsoft - Si...
TeeJee Tech: TimeShift
Buildroot project reports progress, releases update ·  LinuxGizmos.com
Buildroot: making embedded Linux easy
Connecting Strategy to Tactics - Josh Can Help
Jailhouse | Linux Journal
Troubleshooting SQL Server: A Guide for Accidental DBAs
Airtime  |  Sourcefabric
Understanding Storage Architectures. - Virtual Geek
Remus - Xen
failure
CNC Router Plans: Download free CNC router plans
InfoSec Handlers Diary Blog - Checking for BACNet devices inside corporate netwo...
On Managing Developers | TechCrunch
Working with SharePoint Workflow inside Outlook add-in – Part 2 - Experiments Wi...
The application "ASP.NET 5 (vNext) Real-Time Data Editing" was updated for using...
Why “Agile” and especially Scrum are terrible | Michael O. Church
Working with SharePoint Workflow inside Outlook add-in – Part 1 - Experiments Wi...
Creating Dev and Test Environments with Windows PowerShell - Kirk Evans Blog - S...
There is no /8TB flag on 64-bit Windows - The Old New Thing - Site Home - MSDN B...
Cloud Security as a Shared Responsibility - Microsoft Azure Security - Site Home...
fsck of vCenter Server Appliance 6.0 partitions | CormacHogan.com
Crockpot Creamy Cheesy Chicken Spaghetti | Crockpot Gourmet
The Food Lab: The Road To Better Risotto | Serious Eats
10 Cheap and Easy Summer Meals | Cheapism.com
Charlie"s Diary
alessandro.carminati: Access your PBX using voice channels
reasons can be many. The most obvious is that this software is already there, it is quite old and tested. But if you need another, I can add that old modems produce a
users.ece.cmu.edu/~omutlu/pub/flash-memory-failures-in-the-field-at-facebook_sig...
static.googleusercontent.com/media/research.google.com/en/us/archive/disk_failur...
www.cs.cmu.edu/~bianca/fast07.pdf
German government cloud: "Open source where possible" | Joinup
Cost of Living
Building your own SDR-based Passive Radar on a Shoestring | Hackaday
Expat on the Cheap: A Quick Guide to Affordable International Living
Open Source History: What if GNU and Linux Had Cloned MS-DOS, Not Unix? | Open S...
ting sti
Gluten Free Macaroni And Cheese Recipe - Food.com
Michael DeHaan • The Case for Test Driven Development
How To Map User Location with GeoIP and ELK (Elasticsearch, Logstash, and Kibana...
Adding Logstash Filters To Improve Centralized Logging | DigitalOcean
How To Use Kibana Dashboards and Visualizations | DigitalOcean
How To Install Elasticsearch, Logstash, and Kibana 4 on Ubuntu 14.04 | DigitalOc...
Why do events logged by the ReportEvent function show up in the wrong order in t...
How to develop your child"s full potential
Another look at the impact of the coming 2015 leap second (not much) - Satisfy M...
Red Hat CEO: Public cloud "obscenely expensive at scale" - TechRepublic
Raspberry Pi Rack • Hackaday.io
connected to the GPIO pins the Pi to provide power, with the other ends glued to the sled. Power and ethernet are really the only connections I care about in this project, as the Pis will be ran headless. The Pi can be powered by these GPIO pins using any 5v source, but it bypasses protections on the usb micro p
Dairy-Free Vegetable Quiche (With Eggs) | Gimme Some Oven
How to Rename SharePoint 2013 Site Collections Without Prayer or Sobbing - Todd ...
13 Things IT People Wish You Knew About Computers
Creating a Wildcard DNS Record for Fun and Profit - Todd Klindt"s SharePoint Adm...
W3wp High CPU Usage Scenario - Support Engineer Days Online - Site Home - MSDN B...
Blessay: Linux on Network Switches Makes Sense. For Your Career - EtherealMind
Troubleshooting Null Reference Exceptions in live ASP.NET applications - TechRef...
How the modern IT team should look
Finding Printer IPs Easier in Print Management - DeployHappiness
Best Practices for Group Policy Printer Preferences - DeployHappiness
Apps by Sven Faw
graydon2 | Rust release lightning talk
Eltechs ExaGear Desktop
Rename SSAS databases with Powershell - namburis - Site Home - MSDN Blogs
Copying data from one SQL server table to another SQL Server table - Sonam Rasto...
SharePoint Clustering Techniques for High Availability SharePoint - Build on Sha...
Foreman
mist.io :: cloud management in your pocket ::
Management Tools - KVM
Have I been pwned? Check if your email has been compromised in a data breach
The RetroPie Project | petRockBlog
Pi MusicBox - A Spotify, SoundCloud, Google Music player for the Raspberry Pi, w...
FrontPage - Raspbian
Forensic investigations: Retrieving data from the cloud
Install Freeradius on ubuntu 15.04 Server and manage using daloradius (Freeradiu...
When it comes to risk-taking, CIOs must have their team’s back | The Enterpriser...
SQL Server 2014 Service Pack 1 Unattended Setup Error - "The specified value "Up...
SSH ProxyCommand example: Going through one host to reach another server
Working the EDRM Backwards
How Job Interviews Have Changed Over the Years
The 25 KPIs Every Manager Needs To Know | Bernard Marr | LinkedIn
OpenStack Making Progress, but Manageability Remains a Concern
5 Great Reasons to Upgrade to Kibana 4 - Logz.io
WaveDrom - Digital timing diagram everywhere
How to do simple screencasting on Linux
Linux secrets most users don"t know about | ITworld
Top 10 Key Considerations for Deploying SAP Applications on Azure - Running SAP ...
Case of Transaction Log backups not getting restored - TechReflections - Site Ho...
Key Considerations for WSUS 6.2 on Windows Server 2012 R2
Mouse freezes on VDI machines: A surprising solution - Part 2 | sepago
Installing Reporting Services extensions on SQL Server 2014 - Microsoft Dynamics...
Deploying OEM machines with MDT | MSitPros Blog
A forgotten/hidden GEM | MSitPros Blog
SQL Server Backup Audit - SQLRockstar - Thomas LaRock
17 Tools Every Startup Needs - Business Opportunities
Reset User Passwords with AD Self Service Portal - DeployHappiness
Windows 8 has new policy to prevent users from being connected to your corporate...
Griffon"s IT Library » PROXMOX VE » Install PROXMOX VE From a USB STICK
Manufacturers and Utilities Are Leading the IoT Charge with 600M "Things" - Data...
Walmart Delivers Every Day Low Prices with OpenStack Cloud Power - Datamation
Get into Docker – A Guide for Total Newbies | Voxxed
How to Install Seafile on Ubuntu 15.04 (Vivid Vervet)
Interview with Rob Hirschfeld of RackN | Opensource.com
Rob Hirschfeld
Using Hiera with Puppet | Linux Journal
Encrypting and decrypting files with password in Linux - blackMORE Ops
IE11 and the Mysterious Missing Browser Modes
Virtual Machine (VM), Windows Virtual PC & Browserstack : MSEdge Dev
Lessons from managing an open source CMS project | Opensource.com
Seth"s Blog: A new way to move forward
altMBA
Introductory Gear Equations | Application Bulletin
Emulating browsers and weird CSS problem | SharePoint Dragons
Adding Help to your PowerShell Script | Keith"s Consulting Blog
Time For a Change (of Environmental Variables) — Steven Murawski
How to find which user deleted the user database in SQL Server - Microsoft SQL S...
Oh, not again! SQL Server Service is not starting… - TechReflections - Site Home...
Unix and Linux startup scripts Part 4, Systemd
Unix and Linux startup scripts, Part 3
Mouse freezes on VDI machines: A surprising solution | sepago
An Excel Template for Every Occasion
13 Hacks to Avoid Burnout at Work
33 DIY Dog Toys from Things Around the House | BarkPost
10 DIY Dog Toys You Can Make for Pennies
Writing Windows PowerShell DSC Resources and Configurations | Microsoft Ignite 2...
MenuetOS
Some practical notes on WSUS – Early 2015 | Keith"s Consulting Blog
lzybkr/PSReadLine
How to obtain versions of Internet Information Server (IIS)
Learn Statistics for Free with These 6 Resources
Symantec - Communication ports used by Symantec Endpoint Protection
Send Mail To Team using Custom Workflow Activities in CRM 2013/2015 - Shraddha D...
CISCO VPN Client dropping with “Reason 422: Lost contact with the security gatew...
The maths most SAN engineers do not understand in context of Database Servers
VMware KB: Tips for configuring Microsoft SQL Server in a virtual machine
e
Migrating SQL Reporting Services to a new server by moving the Reporting Service...
akjoshi"s Blog - Using RS Scripter to create deployment script for reporting ser...
SQL Server Performance Tuning : Table Variable Vs Temporary Tables - naga - Site...
Query of the day: finding SQL Server queries with large memory grants - Esoteric...
Three Techniques for Changing Vibration Alerting Signal
13 International Crock-Pot Recipes That Are Out of This World
GitLab: Web-based Git repository manager | panticz.de
Driverless Mouse and Keyboard Sharing • Hackaday.io
Weekend Scripter: Use PowerShell to Automate Active Directory Accounts - Hey, Sc...
Wappalyzer
Netflix/Fido
Transparency Toolkit | Watching the watchers
OMI
Windows PowerShell Desired State Configuration Overview
PowerShell DSC for Linux is now available! - Windows PowerShell Blog - Site Home...
www.msi.com/pic/faq/10015790@2015-0206-0239-237248@faq_0000000001178_en.pdf
Cmap | CmapTools
Pixiewps, Reaver & Aircrack-ng Wireless Penetration Testing Tool Updates | Kali ...
Berkshire Hathaway Official Reading List 2015: Approved Books by Buffett and Mun...
SQL Server and ‘Instant File Initialization’ Under the Hood – Part 1 - Esoteric ...
The Best Questions to Ask a Job Seeker During an Interview - Business Opportunit...
The Seven Sins against TSQL Performance
Deploying a DNS Server using Docker - SAMEER NAIK
5 videos to help you learn about Docker | Opensource.com
LXC: create Debian Wheezy container | panticz.de
aim4r/VolDiff
How to build nginx with Google PageSpeed module on Debian 8 (Jessie)
How to install a Debian 8 (Jessie) Minimal Server
How to Securely Store Passwords and Api Keys Using Vault
American Airlines flights delayed because of iPad app glitch
Terminating Suspended SharePoint 2013 Workflows | SharePoint Voodoo
Forward My Good SysAdmin, Forward I Say! — Steven Murawski
PowerShell Script to Limit SharePoint Site Templates Available
SNMP Server(snmpd) and Client(snmp) Installation and Configuration in Debian
How I shrunk a Docker image by 98.8% – featuring fanotify | Yet another enthusia...
Fix for ubuntu 15.04 screen resolution issue on Virtualbox | Ubuntu Geek
sudo apt-get install virtualbox-guest-dkms
Google Provides Detailed Analysis of GitHub Attack Traffic | Threatpost | The fi...
Windows 8 Password Recovery On Systems With Secure Boot - Kirk Miller
Screencast - Pontão Nós Digitais
SQL Server Performance Tuning: Creating a Shell Database to tune your Production...
Transforming data in a data warehouse through SQL views - Andreas De Ruiter"s BI...
Batch Script to Backup All Your SQL Server Databases
August 2012 - Timothy Khouri"s Blog
Disk Partition Alignment Best Practices for SQL Server
fsutil fsinfo ntfsinfo c:
Visual Studio 2010 – Unattended Silent Install | The Code Log
SQL Server 2008 R2 – Unattended Silent Install | The Code Log
Snap4Arduino beta
Getting Started with ArduBlock | Ardublock
Learn How to Solder, with These Simple Tips and Projects
ffDiaporama | Movie creator from photos and video clips
Getting started with RANCID
Demo: Monitoring Traffic on Cumulus Switches with sFlow – Cumulus Networks® Cust...
Chris Harrison | Zensors
The top 5 reasons why IT projects fail
e
My Two months with Moto 360 [review]
Managing Web Site Compatibility in Enterprise Mode for IE11 | Windows 8.1 conten...
Clearing the Windows Update Cache - The Blog of Todd
Understanding MS DTC Resources in Windows Server 2008 Failover Clusters
Install MSDTC onto 2008 R2 Failover Cluster
annotated
MSDTC Troubleshooting « GAPTHEGURU
begin distributed tran select * from [remoteservername].master.sys.sysprocesses commit tran
Interview with James Schweitzer, IBM | Opensource.com
James Schweitzer
Distributed Transaction Coordinator | Services Guide | Smallvoid.com
msdtc -resetlog
MS Distributed Transaction Coordinator (MSDTC) | SQL Server Performance Forums
Monitor MSDTC Distributed Transaction Coordinator Performance
strComputer = "." Set objWMIService = GetObject("winmgmts:" _ & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2") set objRefresher = CreateObject("WbemScripting.SWbemRefresher") Set colItems = objRefresher.AddEnum(objWMIService," & _ "Win32_PerfFormattedData_MSDTC_DistributedTransactionCoordinator"). _ objectSet objRefresher.Refresh For i = 1 to 5 For Each objItem in colItems Wscript.Echo "Aborted Transactions: " & objItem.AbortedTransactions Wscript.Echo "Aborted Transactions Per Second: " & _ objItem.AbortedTransactionsPersec Wscript.Echo "Active Transactions: " & objItem.ActiveTransactions Wscript.Echo "Active Transactions Maximum: " & _ objItem.ActiveTransactionsMaximum Wscript.Echo "Caption: " & objItem.Caption Wscript.Echo "Committed Transactions: " & objItem.CommittedTransactions Wscript.Echo "Committed Transactions Per Second: " & _ objItem.CommittedTransactionsPersec Wscript.Echo "Description: " & objItem.Description Wscript.Echo "Force Aborted Transactions: " & _ objItem.ForceAbortedTransactions Wscript.Echo "Force Committed Transactions: " & _ objItem.ForceCommittedTransactions Wscript.Echo "In-Doubt Transactions: " & objItem.InDoubtTransactions Wscript.Echo "Name: " & objItem.Name Wscript.Echo "Response Time Average: " & objItem.ResponseTimeAverage Wscript.Echo "Response Time Maximum: " & objItem.ResponseTimeMaximum Wscript.Echo "Response Time Minimum: " & objItem.ResponseTimeMinimum Wscript.Echo "Transactions Per Second: " & objItem.TransactionsPersec Wscript.Sleep 2000 objRefresher.Refresh Next Next
dotnetbase.co.uk | Enabling and Reading MSDTC trace files
Distributed Transaction Coordinators, Port 135, and Firewalls – Oh My! | Fairway...
www.chicagotech.net/netforums/viewtopic.php?f=1&t=14300
truncated
Troubleshooting Problems with MSDTC
database
Note to Self: Don’t forget to add to indexed properties | SharePoint Dragons
The Puppet design philosophy - O"Reilly Radar
The log: The lifeblood of your data pipeline - O"Reilly Radar
InfoSec Handlers Diary Blog - Reminder: Secure Your Tomcat Admin Interface
PacketFence: PacketFence v5.0 released
Linuxphile.org
ClouDNS: Free DNS hosting and domain names
fossBytes - fresh bytes of technology and more
How to make Linux"s desktop look good on HiDPI displays
MS15-034 Detection: Some Observations | Didier Stevens
RaspArch :: Run Arch Linux on your Raspberry Pi 2 | RaspEX for Raspberry Pi 2
Disaster Recovery, WinTech and WinPE | Simon Says - Musings of a Technology CTO
SQL Server Monitor with Version Control - CodeProject
executing
Minion Reindex | Midnight SQL Consulting, LLC
Simple Talk: SQL Server and .Net articles, forums and blogs
Database Health Monitor | Software to Improve SQL Server Health
SQL Hammer
Part 4: Install pfSense on ESXi 5.5 - Calvin Bui
u
Part 1: Install pfSense on ESXi 5.5 - Calvin Bui
Part 3: Install pfSense on ESXi 5.5 - Calvin Bui
Part 2: Install pfSense on ESXi 5.5 - Calvin Bui
PfSense 2 on VMware ESXi 5 - PFSenseDocs
Pssdiag and Sqldiag Manager - Home
SQL Server Performance Tuning: Data Access Method - naga - Site Home - MSDN Blog...
The Most Popular Hyper-V PowerShell Cmdlets - by Bing - Ben Armstrong - Site Hom...
30 Days of Bootstrap with the MVC Framework - Revisited - Canadian Developer Con...
SP2013 Search Index health reports for monitoring and troubleshooting - SharePoi...
4 TED Talks to Help You See Your Money in a New Way
The Five Tibetans | Hugh Howey
The many "modes" of multimode - The Network Sherpa
Notion – Document Reimagined
Hackpad
How to Root Your Chromecast
IE Enterprise Mode in a Nutshell - NoTime - Site Home - MSDN Blogs
joeware – never stop exploring… :) » Blog Archive » They said it couldn’t be don...
devttys0/binwalk
Advanced Endpoint Security - Threat Detection - Red Canary
Ansible - sudoers safety and sanity checking in playbook - Raymii.org
OpenRemote - Home of the Digital Home
Projects
Optical Fiber and 10 Gigabit Ethernet
Doing Your Taxes? 5 Excel Formulas You Must Know
New to Craft Beer? Start with the Best Beer Websites & Communities
ScraperDecryptor utility to fight against Trojan-Ransom.Win32.Scraper (TorLocker...
Unlock a secret dark theme in Windows 10 with a registry hack
Klocman software - BCUninstaller
Microsoft SQL 2012 Licensing in a VMware environment VMGuru
Finding Your SAN Bottlenecks with SQLIO by Brent Ozar Unlimited®
community.wacom.com/en/inspiration/blog/2013/october/unique-use-for-wacom-tablet...
Don’t Be Fodder for China’s ‘Great Cannon’ — Krebs on Security
How To Write PowerShell Functions in a Week of Blog Posts - Todd Klindt"s ShareP...
Is any of your ESXi vmnics saturated?
Real World Computing: Cloud Services and the Business
Windows Physical to Virtual Bare Metal Restore - Unitrends
Are P2V conversions still worth doing? - TechRepublic
on’t create an obsolete operating system museum. While a P2V may solve a need, don’t set yourself up for running an obsolete operating system forever. Start the conversation, including the budget part, to get a system retired or migrated to the correct platform. The benefits
Dead Drops | Un-cloud your files in cement! "Dead Drops’ is an anonymous, offlin...
InfoSec Handlers Diary Blog - Guest Diary: Xavier Mertens - Analyzing an MS Word...
A 5 Second Boot Optimization If You’ve Disabled IPv6 on Windows Client and Serve...
DisabledComponents performance increase while disable IPv6
How To Desolder Components | Hardware Secrets
Importing / Deploying / Executing the SSIS packages fails on the newly migrated ...
Customize the background colour of Office 2010 tiles on the Start screen - dai -...
erwbgy/check_mk · Puppet Forge
My VSAN Journey - Part 1 - The homebrew "node" - ESX Virtualization
BlackArch Linux | Penetration Testing Distribution
Cannot format hard disk with VMFS5 after removing it from RAID array | vBrain.in...
partedUtil setptbl /vmfs/devices/disks/naa.5000c50023397a33 msdos
EMET Deployment
server - How do I remove the "Write the Changes to the Disks?" question during p...
debian 6 preseeding keeps asking "Write the changes to disks and configure LVM?"...
VM Snapshots with VSS – Traditional versus VVols | CormacHogan.com
VSAN 6.0 Part 7 – Blinking those blinking disk LEDs | CormacHogan.com
VSAN 6.0 Part 6 – Maintenance Mode Changes | CormacHogan.com
VSAN 6.0 Part 5 – new vsanSparse snapshots | CormacHogan.com
InfoSec Handlers Diary Blog - Wireshark TCP Flags
VSAN 6.0 Part 4 – All-Flash VSAN Capacity Tier Considerations | CormacHogan.com
More Virtual Volumes (VVols) and Snapshots goodness | CormacHogan.com
VSAN 6.0 Part 3 – New Default Datastore Policy | CormacHogan.com
VSAN 6.0 Part 2 – v2 On-disk Format Upgrade Considerations | CormacHogan.com
VSAN 6.0 Part 1 – New quorum mechanism | CormacHogan.com
MYTHBUSTING Outlook IS NOT better than Lotus Notes, pt 8: Reply without History
FraudRecord - Report and Query Unpleasant Clients, Frauds, Fraudsters, Scammers,...
That grumpy BSD guy: In The Name Of Sane Email: Setting Up OpenBSD"s spamd(8) Wi...
VSAN: the performance impact of extra nodes versus failure | @hansdeleenheer
(iBoyd) » Applying KB2506143 to an offline Windows 7 SP1 WIM = Windows Setup fai...
SEP 12.1 and Notes Multi-user install location | Symantec Connect
Hacker Tradecraft
Active Directory Powershell – Advanced Filter - Active Directory Powershell Blog...
Active Directory Powershell – Advanced Filter (Part – II) - Active Directory Pow...
VMware VSAN - Virtual SAN - How to configure - DavidHill.co
Rapid7 Community | Rapid7 Community
AD ACL Scanner - Home
Getting Our Computername in a PowerShell Script - Michael"s meanderings...
$computer = gc env:computername
Sanesecurity ClamAV blog: zero hour malware, phishing and scams
Dewhurst Security Blog -
Pitfalls When Managing Groups in Active Directory | Active Directory content fro...
Windows 8/8.1 system clock changing randomly while powered on and in use - Stack...
H.323 Video Conference Codec behind PFSense *Guide / Explanation*
Rescatux
Cryptowall 3.0: Back to the Basics
of attacks.
MagicInfo Pro Quick User Guide
DFS Replication in Windows Server 2012 R2: Revenge of the Sync - The Storage Tea...
IPv6 to Standard
Lego Computer | Total Geekdom
DFS Replication in Windows Server 2012 R2: If You Only Knew the Power of the Dar...
Monitoring | Bits and Bytes
Low End Box - Cheap VPS Hosting Providers Listing & Reviews
Managing Active Directory with PowerShell
Fast Troubleshooting for Windows Time Service (w32time) Synchronization
Windows XP Folders and Locations vs. Windows 7 and Vista - TechNet Articles - Un...
Batch File to Correctly Determine Operating System Version - Windows XP and DOS
ProjectWise DMSKRNL.cfg Database Encryption - Content Management - Blog - Conten...
Shodan
How to determine the OS type in a logon script
Public domain recordings
UC Corner: NTP - Network Time Protocol
windows - How can I query my system via command line to see if a KB patch is ins...
wmic qfe get hotfixid | find "KB99999" wmic qfe | find "KB99999" Get-WmiObject -query "select * from win32_quickfixengineering" | foreach {$_.hotfixid}
Deploying the vCenter Server appliance (Back to Basics)
SecurityNewsPortal.com features the latest cyber security news about security, h...
Dyre Wolf attack swipes $1 million in wire transfers
Terraform 0.4 - HashiCorp
Setting up HAProxy | Knowledge Center | Rackspace Hosting
HAproxy - Quick and Dirty HTTP Load balancing Tutorial on Redhat/Centos - Hostin...
Load Balancing with HAproxy
HAProxy Quickstart w/ full example config file
Load Balancing with HAProxy - Servers for Hackers
3 Tier Deployment Setup (HAProxy-IIS-SQL) - RightScale Technical Support
ELBs do not cater for your environment? Set up HAProxy for your IIS servers | Kl...
Mailcleaner – adding uceprotect.net RBLs | The Wacky World of Chris Knight
Multi-RBL Check | The Anti-Abuse Project
How to interview a prospective employer
Managed DNS considered harmful - O"Reilly Radar
Not So Dynamic Updates | Linux Journal
How to test if 9000 MTU/Jumbo Frames are working - Myles Gray
How to actually get the AS400 oledb connection with .net | Michael Ellerbeck
Thought for The Day: NetBIOS over IPX - EtherealMind
InfoSec Handlers Diary Blog - SSH Fingerprints Are Important
3 Tips for Deploying a RADIUS Server for Wi-Fi Security
New Site Recovers Files Locked by Cryptolocker Ransomware — Krebs on Security
Recovering Ransomlocked Files Using Built-In Windows Tools | Symantec Connect
We Have Your Files. If You Ever Want To See Them Again... Pay Now. — Cyber Secur...
FireEye - Fox IT Scanner
CryptoLocker Ransomware Information Guide and FAQ
Destructive malware “CryptoLocker” on the loose – here’s what to do | Naked Secu...
Cryptolocker Ransomware: What You Need To Know | Malwarebytes Unpacked
Cryptolocker 2.0 – new version, or copycat?
Manual Data Recovery With A Hex Editor | Hackaday
The 9 Types of Horrible Bosses – And How to Manage Them
18 Easy and Delicious Recipes for Your Dutch Oven
How to Generate/Encrypt/Decrypt Random Passwords in Linux
pwgen
Contributor spotlight on David Both | Opensource.com
Default Search Index File Location for SharePoint 2013
Digital Asset Management with digiKam | Scribbles and Snaps
Decompile a Video File Into Images with FFMPEG on Linux
$13 HAT aims Raspberry Pi at real-world I/O projects ·  LinuxGizmos.com
Converting VMware thin disks to thick using Inflate - Myles Gray
Apache -- 20 years of the world"s favorite web server
Why Windows 10 is the best platform for your modern business! - Microsoft UK Sma...
Updates in AD not reflecting in SharePoint - Voyage - Site Home - MSDN Blogs
blogs.msdn.com
Integrating the Shipping Carrier Interface in AX 2012 with UPS WorldShip - Part ...
Integrating the Shipping Carrier Interface in AX 2012 with UPS WorldShip - Part ...
[Sample Of Apr. 01] Create a three-tier ASP.NET web application with Entity Fram...
SQL Updates Newsletter - March 2015 - SQL Server Updates and Lessons Learned - S...
Some time away - I. M. Wright’s “Hard Code” - Site Home - MSDN Blogs
Removing a Missing Network Adapter - Ben Armstrong - Site Home - MSDN Blogs
Driver Signing changes in Windows 10 - Windows Hardware Certification blog - Sit...
Move to PowerShell for WinRM Management - Windows Management Infrastructure Blog...
Application Insights: Choose your own Performance Counters - Microsoft Applicati...
How to convert a short 8.3 path name to a long path name in PowerShell - Sergey ...
$long_path = (Get-Item -LiteralPath $path).FullName
https://otalliance.org/system/files/files/best-practices/documents/2014otadatabr...
10 Quick Things You Can do to Make Your Next Trip Better
5 Tools to Analyze Laptop Battery Life
Open Atrium
joeware – never stop exploring… :) » Blog Archive » AD Sites Without Domain Cont...
5 Lesser-Known Free Sites for Watching TV Shows
Get Started On DIY Electronic Projects with These Learning Sites
Google Gold: 15 Essential Chrome Extensions
PowerShell, Executing Internet Explorer as Network Service - MiguelNunez - Site ...
Q1 2015 Site Performance Report - Code as Craft
Home · SnabbCo/snabbswitch Wiki
Snabb
The IPython Notebook — IPython
Using VMWare and Automation Software (part 3 of 3) | Doug Brock
Virtualizing Automation Software for the Lowest Up-Front Cost (part 2 of 3) | Do...
Windows Compatability with Rockwell Software | Doug Brock
MDT 2013 Update 1 private – What’s new! | Keith"s Consulting Blog
CM Hyper 212 - Alternative G34 Mounting Method - [H]ard|Forum
SSD VPS Servers, Cloud Servers and Cloud Hosting by Vultr - Vultr.com
MIME | Premium Glass Protection
The Definitive Guide to Winning an Argument
Munger"s Advice on Shamans, Humility, and Attention Spans -- The Motley Fool
MultiBoot USB with Grub2 (boot directly from iso files) | panticz.de
Talk is cheap. Show me the code.: GRUB2 Multiboot USB Stick
Understanding DFSR conflict algorithms (and doing something about conflicts) - A...
Windows Server 2012, File Servers and SMB 3.0 – Simpler and Easier by Design - J...
Adblock Everywhere: The Raspberry Pi-Hole Way
adamkramer/dll_hijack_detect · GitHub
How the cloud can benefit smaller enterprises
Introducing videolooper 3.0 | Steves Computer Vision Blog
Developer dashboard on SharePoint 2013 | System Admins
organic fertilizer: DHCP Scope Information
Linux Performance Analysis: New Tools and Old Secrets
Home - LinuxUbuntu Apps Reviews | Tutorials | HowTos | News
Data Collection, Storage, Processing & Analysis Service | Treasure Data
GoAccess - Visual Web Log Analyzer
6 open hardware projects for Arduino Day | Opensource.com
InfoSec Handlers Diary Blog - Repurposing Logs
Securosis Blog | Network-based Threat Detection: Overcoming the Limitations of P...
New project: PiDP-8, a PDP-8/I Replica
more
clinta/cdpinfo · GitHub
Flexible Access Control with Squid Proxy | Linux Journal
Businesses embracing BYOD face a potential pornography problem
KeySweeper
joeware – never stop exploring… :) » Blog Archive » Security is like…
Integrate Any App | On-Premise & Cloud Integration Made Easy
The Hacker"s Diet
7 Quirky "ls" Command Tricks Every Linux User Should Know
Samsung Galaxy Tab Pro 12.2, 10.1, 8.4 - XDA Forums
The 5 Charitable Donations That Do the Most Good
TuxArena | Guide: Show System/Hardware Information in Linux
Here"s how a lithium-ion battery degrades over time
vSphere 6: Using VMCA as a Subordinate CA | Long White Virtual Clouds
PEP 20 - PEP 20 -- The Zen of Python | Python.org
Meteor
Steve Bunting"s Computer Forensics Resource Site
Upgrading to SQL 2014: Report Server version mismatch - SQL Server Team - Site H...
Group Policy Settings Explained - Windows Time Service - Site Home - MSDN Blogs
indicates how many potentially accurate time samples the client must receive in a series before subsequent time samples are evaluated as potential spikes. After a period of not receiving any usable time samples, a time client ceases to evaluate tim
ESXi 5.5 – ESXCLI Command Mindmap | Virten.net
Active Directory Health Check Script - The Sysadmins
20 Cheap and Easy Soup Recipes
joeware – never stop exploring… :) » Blog Archive » 30 Second Admin – Default Do...
for /f %i in (‘adfind -sc domainlist’) do @adfind -hh %i -sc dompol -dloid
How to filter BGP routes in Quagga BGP router - Xmodulo
Setting Up Folder Redirection - Part 1 - DFS Namespaces - DeployHappiness
Mini Excel Tutorial: Using Advanced Counting and Adding Functions in Excel
10 Great Arduino Projects for Beginners
Discovering PostgreSQL Strengths | Robin Bate Boerop | LinkedIn
Why I Choose PostgreSQL Over MySQL/MariaDB - Dice News
Deduplicating Amazon S3 Storage with StorReduce - Wahl Network
Common Information Model (CIM) Data for Home Lab Server Hardware - Wahl Network
Virtual Router - Wifi Hot Spot for Windows 8, Windows 7 and 2008 R2 - Home
SharePoint Learning Kit - Home
BizTalk Scheduled Task Adapter - Home
teachmeipv6.com/IPv6-Essentials-Cheat-Sheet-v1.3.pdf
Best way to set GPO for Windows 7 Power Management so computer never sleeps
Would Rust have prevented Heartbleed? Another look
Worship Maintainers - O"Reilly Radar
Tighten Up SSH | Linux Journal
Disable hibernation on Windows 7 and Windows 8 based systems - standalone and GP...
20 Office Potluck Dishes Everyone Loves
Analog OPSEC 101 – operational security in the physical world - Securelist
30 years of dotcom -- what became of the first 100 domains?
Automating Network Security (Troopers 2015) << SDN Architectures and Deployment ...
10 Indulgent Desserts That Are Actually Good for You
Security in Three Ds: Detect, Decide and Deny | Linux Journal
{never} homemaker: Peanut Butter Hearts
GNU Terry Pratchett
PowerCLI and PowerShell Workflows - LucD notes
SharePoint Caching (Configuration and monitoring) | System Admins
Grabbing Eventlogs from busy servers - servergeeks - Site Home - MSDN Blogs
Coffee Break - Windows PowerShell Remoting - Microsoft Dynamics NAV Team Blog - ...
Andy"s House O" Blog: The horrors of migrating to Domino when Single Item Recove...
pfSense without Internets - Room362.com
How to connect to a Wireless WIFI Network from the Command line in Windows 7 - S...
Mini Excel Tutorial: Use Boolean Logic to Process Complex Data
Flowcharts - User Ed - The blog of Ed Price, Customer Program Manager - Site Hom...
Root cause analysis of my VSAN outage : vmware
StackVDI: Opensource Virtual Desktop Infrastructure
Spice - Home page
Ulteo - Application and Desktop delivery made easy! Open Virtual Desktop - Ulteo...
FOSS-Cloud - FOSS-Cloud
GraphPaper
Etherpad
SqlPad - A web app for running SQL queries and visualizing the results
Barracuda Labs Threatglass
Split screen video in Kdenlive | Opensource.com
Setup Your Own "Speedtest Mini Server" to Test Internet Bandwidth Speed
OpenNebula | OpenNebula for Virtual Desktops
Premeditated Leftovers - Naturally Frugal Living
DIY Sitting / Standing Desk
Graceful SharePoint AppFabric Restarts - Build on SharePoint - Site Home - MSDN ...
The keys to a successful BYOD policy
Cards Against Originality, an app for Cards Against Humanity.
Arduino v Arduino: Part II | Hackaday
Arduino v. Arduino | Hackaday
Creative DRAM abuse with Rowhammer | Hackaday
H.323 Proxies and Firewalls
openh323proxy.sourceforge.net
Rowhammer takes a big swing at DRAM memory security
Qcow2 - KVM
How to Clean Everything With Just 3 All-Natural Cleaners
Errata Security: Some notes on DRAM (#rowhammer)
Running Your Own Open Source Email Server - Tuts Code Tutorial
ZFS on Linux
How to Use the OneNote for iPad Drawing Tools – by Jonathan Wylie - Microsoft UK...
Checking the progress of ‘dd’ « the blog of Chris
Mounting QCOW2 images
How Does Encryption Work, and Is It Really Safe?
Wearables are perfect for the enterprise
Ask Hackaday: The Many Uses of Microwaves | Hackaday
FREE, Award-Winning Tools For finding Hidden Data On A PC
Do Employers Want Too Much From Candidates? - Dice News
The Curse of the Former Employee It’s hard to replace someone who’s been on the job for years, keeping pace with changes in technology and the evolving needs of the employer. “Many companies lose sight of the fact that their employees, especially those with some tenure, have evolved a great deal since their hire date,” Simm said. “They’ve gained knowledge of technologies that are specific to said employer and their environment.” Employers also want to leverage as much of their employees’ skill sets as possible, in order to get the most out of them—which can make it difficult to hire just the right person. “Outside candidates tend to be disciplined in one area, and employers are looking for them to not only be great at what they need but also have strong aptitudes to match their wants,” Schultz said. “Sometimes what they want doesn’t go hand-in-hand with what they need.”
Reducing OCR software processing cost with higer accuracy results
OneNote: Copy Text from an Image | a Tech-Recipes Tutorial
OCR anything with OneNote 2007 and 2010
least
The DTC service cannot start - Distributed Services Support Team - Site Home - M...
HKLM\SOFTWARE\Microsoft\MSDTC\SysprepInProgress. If the value is 1, change it to 0 and try starting DTC again, which may solve your problem. It is by design that DTC cannot run during sysprep. The default value of SysprepInProgress is 0, indicating the system is not in the middle of sysprep.
A brief history of Microsoft CRM | Mark Margolis"s Blog
10 Resume Mistakes That Will Hurt Your Job Search
Incremental Backup - btrfs Wiki
Do-It-Yourself Backup System Using Rsync and BTRFS
Security Tips for Apache Web Server - Debian-based Systems
10 Leadership Ideas to Improve Your Influence and Impact - J.D. Meier"s Blog - S...
What the FREAK? Huge SSL security flaw stems from US government backdoor
Hearty One-Pot Meal Miso Soup | recipe from FatFree Vegan Kitchen
15 Easy and Delicious Cast Iron Skillet Recipes
https://dl.dropboxusercontent.com/u/17340943/Toolkit-55.ps1
How to setup a LAMP development environment in Vagrant
Automated Malware Analysis - Cuckoo Sandbox
best practice for migrate file server from EMC NAS to a new File server cluster
Apache JMeter - Apache JMeter™
My experiences with DFS replication on Windows 2008 R2
Techunboxed: How to Set Up DFS Replication in Windows Server 2012 R2
Windows Storage Server 2012 R2 — Improved DFS Replication - Windows Storage Serv...
Step by Step Installation and Configuration of OpenLDAP as Proxy to Active Direc...
Migrating DFS Namespaces to Preserve Old Domain Names - Ask the Directory Servic...
Embrio
Possible to add a linux SMB share as part of a DFS tree (or whatever they are ca...
SharePoint PeoplePicker Filtering Active Directory accounts by using LDAP querie...
Report SharePoint Content Source Last Crawl Duration - Joe Rodgers - Site Home -...
OpenCV | OpenCV
jwcrawley/uWho · GitHub
Step by Step : Deploy DFS in Windows Server 2012 R2 | Just a random "Microsoft S...
cryptsetup - Setup virtual encryption devices under dm-crypt Linux - Google Proj...
OpenSCAP/container-compliance · GitHub
pfSense - Squid Squidguard / Traffic Shapping Tutorial
Year Zero: Our life timelines begin - O"Reilly Radar
Are Conference Talks Getting Too Soft? | GeekyBoy.com
5 Amazing Linux IRC Clients to Keep You Chatting
How You Can Use Geofencing to Improve Your Privacy & Security
PowerShell Lessons Learned from Building an Automated SQL Installation and Patch...
Excel Quick Tips: How To Flip Cells & Switch Rows or Columns
This Web Business IV: Business Entity Options · An A List Apart Article
Open Source LMS – 10 Alternatives to Moodle | Barry Sampson
Bridges: a kludge that shouldn"t exist « ipSpace.net by @ioshints
Before Talking about vMotion across Continents, Read This « ipSpace.net by @iosh...
This is what makes networking so complex « ipSpace.net by @ioshints
Love the image
FireEye, Inc. | Out of Pocket: A Comprehensive Mobile Threat Assessment of 7 Mil...
Starting with Vagrant on Ubuntu 14.10 - A Beginner"s Guide
RHCSA Series: Reviewing Essential Commands & System Documentation - Part 1
RHCSA
Announcing Docker Compose | Docker Blog
Announcing RancherOS: A minimalist distro designed explicitly to run Docker | Ra...
Rethinking CSS Grids | Journal | The Personal Disquiet of Mark Boulton
3 new trends pressuring CIOs | The Enterprisers Project
IT Revolution Manifesto IT Revolution
(61%) Piecon / Pie charts in your favicon!
AMiner - Open Science Platform
Mark Burgess Website
Laser Cut Settlers of Catan Board
Karōjisatsu « IT Revolution IT Revolution
Karōjisatsu
Slack: Be less busy
appear.in – one click video conversations
When Strong Encryption Isn"t Enough to Protect Our Privacy
Visual tools for network traffic analysis
vDos | SourceForge.net
PowerShell: Search for appointments - EMEA Developer Support for Messaging Team ...
PowerShell Script to Simulate Outlook Web Access URL User Logon - gokarthi - Sit...
PowerShell Script Analyzer: Static Code analysis for Windows PowerShell scripts ...
5 Lessons Education Research Taught Us In 2014 : NPR Ed : NPR
Android for Work
Why we run an open source program - Walmart Labs // TODO: Talk openly, develop o...
Great Computer Programming Quotes - Software Development Quotations and Programm...
Today In Science History
Understanding .NET 2015 - Beth Massi - Sharing the goodness - Site Home - MSDN B...
From the SocialBizUG Mailbox: Managed Replicas and Mail Delivery Time - Articles...
ReplicateOnNewMail=1 (Replicate new mail from the server every time we detect new mail has been delivered. This is crucial in keeping the cache "up to date")
What Interviewers REALLY Think During Job Interviews
Learning How to Learn
www.barbaraoakley.com/pdf/10rulesofstudying.pdf
ForUs provides the next-generation 401(k) for small companies.
BGP Configuration Made Simple with Cumulus Linux « ipSpace.net by @ioshints
Changing Default Database File Locations in SQL Server - SQLRockstar - Thomas La...
Top Linux distros for computer repair | Opensource.com
Turn a Raspberry Pi Into an Ad Blocker with a Single Command
[object Object]
Fabric: a System Administrator"s Best Friend | Linux Journal
7 Python Regular Expressions Examples – Re Match Search FindAll
What are some obscure but useful Vim commands - Xmodulo
Jorgen’s Weblog: Why systemd?
Symple — Planet Friendly Ubuntu Linux PCs
Localhost DNS Cache | Linux Journal
Scripted window actions on Ubuntu with Devilspie 2
Fix for CBT bug in VMWare Products - Myles Gray
Securing enterprise mobile systems [Q&A]
[object Object]
linux - Running Intel 7260 in AP mode under Ubuntu 14.04 [solved] - Stack Overfl...
iTALC
Teampass · A Collaborative Passwords Manager
nilsteampassnet/TeamPass · GitHub
Ghiro - automated digital image forensics tool
recalbox.com
Decrypting TLS Browser Traffic With Wireshark – The Easy Way! | Jim Shaver
NethServer
How to Setup Failover and Load Balancing in PFSense
How to migrate to Drupal with ease | Opensource.com
Raspberry Pi Doorbell is Fully Featured | Hackaday
SharePoint 2010 CUs and Windows Update - Microsoft Office SharePoint and related...
InfoSec Handlers Diary Blog - Leave Things Better Than When You Found Them
These At-Home Exercises Will Give You a Gym-Quality Workout for Free
Using Try and Catch with PowerShell"s Invoke-WebRequest - Wahl Network
Open Source Log Management with Graylog
RFC 7454 - BGP Operations and Security
Jerry Lawson, a self-taught engineer, gave us video game cartridges
TeamBins Project Management & Issue Tracking Tool | TeamBins
Todour | nerdur.com
Kanboard - Simple and open source visual task board
TaskBoard
Equation Group: from Houston with love - Securelist
Fighting cyber threats hampered by disconnect between IT and business
A PowerShell Weather Service
Datalossdb.org : See Who Has Been Breached | . . TheSecurityBlogger . . .
It"s not just Samsung TVs — lots of other gadgets are spying on you -- Fusion
How a MongoDB Database Can Better Organize Your Data
Upgrade Your Skills with the Best Microsoft Office Courses Online
App::Netdisco - An open source web-based network management tool. - metacpan.org
elitwin/pgtune · GitHub
Keeping the bad guys out with fail2ban | ITworld
My personal blog: Elizabeth"s sweet potato with red curry coconut
Delegating Active Directory password reset rights -take 2 | Chris Conklin"s Webl...
ServiceBus 1.1: "The database (SbManagementDB) located at SQL Server (10.xx.xx.2...
Battle RA Royale: More VDI For Less Moolah | Long White Virtual Clouds
Do you ChangeLog? | vNinja.net
Markdown All the Things! | vNinja.net
Atom
String2String - HackCooper 2015 | Hacker League
How to Use npm as a Build Tool
npm
Inventorying SQL Servers with the Microsoft Assessment and Planning Toolkit (MAP...
Beyond Stuxnet and Flame: Equation "most advanced" cybercriminal gang recorded |...
User Idle Starter | Launch applications based on events | Adminscope.com
4 Tips & Tricks Every Android User Needs to Know
Your HDDs were RIDDLED with NSA SPYWARE for YEARS • The Register
Nobody cares how your IT project works, lead with the business benefits | The En...
My podcast: Episode 2 – The Red Queen theory of cyber security - Terry Zink: Sec...
GForge: automssqlbackup: Project Info
AD Bulkcreator | Creating objects fast | Adminscope.com
TOPspin Security DECOYnet Resources and Downloads
The Great Bank Robbery: the Carbanak APT - Securelist
Equation: The Death Star of Malware Galaxy - Securelist
A Fanny Equation: "I am your father, Stuxnet" - Securelist
Worldwide Equation Group hid undetectable spyware on hard drives
Windows Shortcuts 101 - The Ultimate Keyboard Shortcut Guide
Allen White : Scripting Index Maintenance with PowerShell
Allen White : Use PowerShell to Add a Login to a Database Role in all Databases
Allen White : System Inventory and Performance Gathering SQL Connections Session
Allen White : Script and Migrate Agent Jobs between Servers using PowerShell
Voluntary DBA - Proactive database administration
Practical PowerShell for SQL Server Developers and DBAs – Part 1
Backup and Restore SQL Server with the SQL Server 2012 PowerShell cmdlets
Allen White : Scanning the Error Log with PowerShell
Automated deployment for .NET - Octopus Deploy
www.red-gate.com/assets/products/sql-development/sql-source-control/entrypage/as...
pachyderm/chess · GitHub
How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | A...
3 new rules to keep your enterprise secure | The Enterprisers Project
The Ultimate Garage Door Seal and Threshold Seal
Privoxy - Home Page
Wapiti : a Free and Open-Source web-application vulnerability scanner in Python ...
Home - OPNsense
The top 10 rural regions of Japan that Tokyo residents would like to move to ‹ J...
THE CYBER DEFENSE REVIEW | A Joint Production of the Army Cyber Institute and Ma...
IQEmu - mirage335 wiki
Windows PowerShell and Dynamics NAV for your coffee break - Deploy Dynamics NAV ...
Running Multiple SharePoint SSL Websites on Separate SSL Certificates Using Serv...
Multi-subnet SQL Server Clusters SharePoint 2013 SPDatabase.MultiSubnetFailover ...
Friday the 13th Fun
Tonido: A Free, Private Cloud And Streaming Media Server | Unixmen
Microsoft Windows - Docker Documentation
PowerShell Prank #2: Enable Hardcore Mode - DeployHappiness
GroupWyse Software Products: PingView Network Monitor
Rclone - Sync File and Directories to Cloud Storage in Linux
InfoSec Handlers Diary Blog - Did You Remove That Debug Code? Netatmo Weather St...
How to Install and Use Linux Malware Detect (LMD) with ClamAV as Antivirus Engin...
e em
Build your own combined OpenVPN/WiKID server for a VPN with built-in two-factor ...
Crack passwords | Linux Voice
Trash is for Tossers
IPv4 Addresses and CIDR Fun - Lessons Learned - Site Home - MSDN Blogs
Wireless Power Outlets RF from Raspberry Pi | Tim Leland
Why You Should Care About Software Defined Radio | Hackaday
gentilkiwi/mimikatz · GitHub
MRAN - Managed R Archive Network · Data Sources on the Web
Hard Drive Test Data - Determining Failure Rates and More
Anthem: Yet Another Victim of the “Highly Sophisticated Attack” | . . TheSecurit...
Securosis/DataCenterEncryption · GitHub
Using `esentutl.exe /vss` to examine an in-use database - martinc - Site Home - ...
esentutl.exe /vss
A More Flexible Active Directory One-Liner | PowerShell content from Windows IT ...
Managing AD in Bulk Using PowerShell | Active Directory content from Windows IT ...
Creating Bulk AD User Accounts using PowerShell | Microsoft Enterprise Technolog...
Mass Changes in Active Directory · Scott"s Weblog · The weblog of an IT pro spec...
r
Use PowerShell to Modify Existing User Accounts in Active Directory - Hey, Scrip...
Updating AD users in bulk | Richard Siddaway"s Blog
o
Utilizing Add-ADUser & Import-CSV Powershell Cmdlets to bulk create Active Direc...
Java JNDI/LDAP: Windows Active Directory Authentication, Organizational Unit, Gr...
User Attributes - Inside Active Directory
ActiveDir.org
Evolution of SharePoint - Office Blogs
Useful Static .NET Methods - Power Tips - PowerShell.com – PowerShell Scripts, T...
Burp Suite Professional - release notes
How to Setup High-Availability Load Balancer with "HAProxy" to Control Web Serve...
How to find Active Directory users NOT set to PasswordNeverExpires with PowerShe...
Three ways to keep IT from becoming the "Department of No" | The Enterprisers Pr...
How to automatically bypass Windows 10"s login screen
Buy Cool, Stylish Laptop Backpacks and Utility Messenger Bag Online
An Illuminating Guide to Low Light Photography
u
Linux FT232R Projects and Stuff
The 100 Best Beers in the World - MensJournal.com
How To Scan And Check A WordPress Website Security Using WPScan, Nmap, And Nikto...
A Clever Way to Manage Administrative Rights for Regular Users - DeployHappiness
Provide parameters to a command in PowerShell – another way | sepago
Zonemaster
Stay Healthy at Your Desk With These Quick and Easy Stretches
HyperKitty, the next-generation mailing-list archiver — HyperKitty 0.9.4 documen...
Netmagis - Introduction
How to create a custom backup plan for Debian with backupninja - Xmodulo
Welcome to Attic — Attic - Deduplicating Archiver 0.14 documentation
Wiki - SnoopSnitch - SRLabs Open Source Projects
Replace Local Cron With Jenkins - 22 Idea Street
a lo
Shadow Daemon: Introduction
DANE SMTP Validator
Project Calico
Tabula: Extract Tables from PDFs
Farm Hack - An Open Source Community for Resilient Agriculture
Microsoft Volume Licensing - Client Access License (CAL) Guide
The SSIS and Excel Story Continues - Data Access Technologies - Site Home - MSDN...
4 Mistakes to Avoid When Deploying a RADIUS Server
8 advantages of using open source in the enterprise | The Enterprisers Project
How to monitor MySQL database performance using mytop
Testing Strategies - Current Mule Documentation
Mule integration hacks: Mule mockless Integration testing tip, or "in wait for a...
Powershell for Changing AppSettings in Application Configuration File - MiguelNu...
SharePoint and auto statistics guidance - rshetwal - Site Home - MSDN Blogs
Pointless Programming Reference
Free online courses/MOOC aggregator - Class Central
No Excuse List
decac - A higher-level assembly language - Google Project Hosting
Programming Languages - Hyperpolyglot
apenwarr/sshuttle · GitHub
kb0mga.net
Raspberry Pi, GPS and NTP « Small Golden Sceptre
shelving - Nicely mounting 2x4s to wall - Home Improvement Stack Exchange
New Guidance from Microsoft for Packaging and Deploying SharePoint Solutions - V...
Get real - I. M. Wright’s “Hard Code” - Site Home - MSDN Blogs
Friday Fun: Aren’t You Special
6 Foods Scientifically Proven to Increase Your Lifespan
Optimising Raspberry Pi code | Linux User & Developer - the Linux and FOSS mag f...
How To Stress Test CPU and Memory (VM) On a Linux and Unix With Stress-ng
Sharing Admin Privileges for Many Hosts Securely | Linux Journal
Recommended updates and configuration options for SQL Server 2012 and SQL Server...
Free online background check -- Could a specialty consumer report be costing you...
Power Up Your DR with Tintri and SRM! | Virtual Insanity
Army cyber defenders open source code in new GitHub project | Article | The Unit...
USArmyResearchLab/Dshell · GitHub
Penetration Testing with Raspberry Pi - Book Now Available! | . . TheSecurityBlo...
Using PowerShell for Active Directory
Use PowerShell to Find the Location of a Locked-Out User - Hey, Scripting Guy! B...
Importing Photos into Active Directory and Outlook with PowerShell - DeployHappi...
Evolving ASP.NET Apps–Validating Redirects and Forwards - Canadian Developer Con...
Tune, modernise and optimise your website - Martin Kearn - Site Home - MSDN Blog...
Troubleshooting Memory Issues with Reporting Services - CSS SQL Server Engineers...
Small Basic Turtle: Comparing Angle and Turn - User Ed - The blog of Ed Price, C...
Small Basic Turtle: Absolute Motion VS Relative Motion - User Ed - The blog of E...
Small Basic: The History of the Logo Turtle - User Ed - The blog of Ed Price, Cu...
Do I really need to use DTC Transactions? - CSS SQL Server Engineers - Site Home...
Home of SyMenu
#5 The Four Most Powerful Types of Creative Thinking
7 Fun & Weird Things You Can Create With Microsoft Excel
73-Year-Old Man Creates Magnificent Paintings Using Nothing But Excel | Bored Pa...
CAMdrive - Camera & Slider Controller - r-tec
open source multi-axis control for time-lapse photography.
UltraKeet Australia - Filthy Casual - #003 (Hijack your co-workers label printer...
An Overview on SQL Server Checkpoints | Basit"s SQL Server Tips
Libreboot Project
Prometheus
Monitoring System Hardware - Cumulus Linux 2.2.2 - Cumulus Networks
Thousands of Free Business Ideas - Business Opportunities
IPv6 Renumbering – Mission Impossible? « ipSpace.net by @ioshints
The sysadmin skills-path. - SysAdmin1138 Expounds
P e r t u r b . o r g
Securosis Blog | New Paper: Security Best Practices for Amazon Web Services
fcambus/nginx-resources · GitHub
First Line of Defense: Blocking Bad POST Requests Using NGINX Rate Limiting | Fr...
Securosis Blog | Applied Threat Intelligence: Defining TI
122 Things Everyone Should Know About Investing and the Economy
Value Investing Explained in 9 Quotes
sensu/sensu · Puppet Forge
Fix_hdc plugin - The CD Forum
paragres 0.2 : Python Package Index
ROM Download | johnlewis.ie
Assess VM Performance, VM Health and Perform Capacity Monitoring with free tool
ZFS RAIDZ stripe width, or: How I Learned to Stop Worrying and Love RAIDZ » Matt...
vSphere 5.5 | BP.Performance.04 | Storage I/O Control - Data Center Dan
I/O Analyzer – VMware Labs
The Godmother of Virtual Reality: Nonny de la Peña
Esxcli - Thomas-Krenn-Wiki
Howto use ESXCLI in PowerCLI | Virten.net
Friday Fun: Creating Sample Files
2 Post Rack TV Stand | The Server Rack FAQ
Where in I create a lame .bat file for auto restoring a SQL Test DB | Michael El...
Foreign VPN service unavailable in China - Global Times
Five open hardware projects | Opensource.com
How to apply image effects to pictures on Raspberry Pi - Xmodulo
Ideal Backups with zbackup | Linux Journal
Delicious
Follow 10 Inspirational People & Their Personal Journeys Online
pmTrans - Home
Evolving ASP.NET Apps–Password Hashing - Canadian Developer Connection - Site Ho...
The Art of Promise-Based Architecture
Windows policy Lock Pages in Memory option and SQL Server instance in VM | Basit...
How to Perform a CSS Audit: Stylesheets Don"t Have to be Awful - Quick Left
6 free and open source video editing tools | Opensource.com
blender.org - Home of the Blender project - Free and Open 3D Creation Software
Mouse Box
help
Averie Cooks Homemade Peanut Butter - Averie Cooks
30 Ways Magnets Can Help You Stay Clean & Organized | Apartment Therapy
Librem 15: A Free/Libre Software Laptop That Respects Your Essential Freedoms | ...
VirtKick - Take Cloud Back
"Easy Disk Drive Repair" is not what it seems
ioerror/tlsdate · GitHub
PentesterES/Delorean · GitHub
Don"t update NTP – stop using it - Hanno"s blog
PDX DevOps Graphite replacement
Hyperfox HTTP/HTTPs traffic interceptor
Web Scraping with Ruby
The Future: A Cat Litter Box and DRM — Medium
catgenius - Don"t just own your CatGenie, p0wn it! - Google Project Hosting
Simple Directional WiFi Antenna | Hackaday
Deduplication Hidden Downsides - iForensics
Tech Tips: Backups with rsync
To Food with Love: Vegetable Medallions
A Proper Server Naming Scheme | via @codeship
Monitority - FREE Website Uptime Monitoring (Alerts via Email, SMS, Twitter)
Time for sysadmins to learn data science – Donnie Berkholz"s Story of Data
My Philosophy on Alerting
RIP Nagios. Hello Docker Shinken! | www.rohit.io
Monitoring vSphere ESXi servers with Nagios and check_mk plugins. - About monito...
12 of the Best Things Charlie Munger Has Ever Said
LII / Legal Information Institute
CVE security vulnerability database. Security vulnerabilities, exploits, referen...
Gluten Free (and Paleo!) Granola
Western Digital Green HDD, How To Stop Them Dying On You | GamingOnLinux
infosecrockstar.com/wp-content/uploads/2015/01/RockStarV21.pdf
Six Colors: How I rip DVDs and Blu-rays
find
Arduino Thermostat Project
Gizmosnack: Power Plug Energy Meter - Now wireless!
How to Use a Batch File to Make PowerShell Scripts Easier to Run
Step-By-Step: Windows 10 Start Menu Customization via PowerShell - Canadian IT P...
POSHChef/POSHChef · GitHub
HOW TO: Recycle the SQL Server Analysis Services msmdsrv.log File - SQLRockstar ...
ToolsWatch.org – The Hackers Arsenal Tools Portal » 2014 Top Security Tools as V...
Poho"s Blog: On Western Digital hard drives, PUIS and Rocket Raid controllers
Pandoc - About pandoc
Friday Fun: Search Me
Running ASP.NET 5 applications in Linux Containers with Docker - .NET Web Develo...
Blueprintf – A Bluetooth Serial Monitor » Galactic Studios
The Mortgage Professor
What Is Doxing And How Can You Avoid It?
Enterprise device management for Mac, iPad, iPhone, Apple TV | JAMF Software
start [Mailcleaner]
NETCONF YANG tutorial
edX | Free online courses from the world"s best universities
organic fertilizer: Jump to Conclusions About Leap Seconds
kahun/awesome-sysadmin · GitHub
ITIL’s dead elephant: CMDB can"t be done | The IT Skeptic
» Linuxaria – Everything about GNU/Linux and Open source 6 Open Source CMDB
IT Asset Naming Conventions
Drink from the firehose! Implement NetFlow data on your network with nfdump and ...
Network Device Naming Conventions | CCIE Pursuit Blog
www.nunoc.net/nunocweb/services_attchmt/Naming Standard Rev. 1.5.pdf
Device Naming Conventions - NetCraftsmen
Share your network device naming conventions | Network Management | Cisco Suppor...
Network device naming standard | Information Systems & Technology
Device Naming Conventions | The Networking Nerd
https://www.nanog.org/meetings/nanog31/presentations/ringel.pdf
Checking Power Supplies on SuperMicro Servers with Nagios – tummy.com, ltd.
SEP 12.1 & Dos commands | Symantec Connect
Enterprise Support - Symantec Corp. - Windows commands for the client service
Enterprise Support - Symantec Corp. - Available command-line options for smc.exe
racktables-contribs/rt-server-client at master · RackTables/racktables-contribs ...
command line options to disable SEP Policys | Symantec Connect
smc -disable -ntp
Zero Budget IT Admin
CACHE.NDK & BOOKMARKS.NSF | IBM Lotus Tech Blog
cache.nsf & bookmarks.nsf
Deploying PowerShell 4 with Group Policy - 4sysops
Active Directory Maximum Limits Scalability Capacity
Install RackTables on Debian 7 Wheezy | siddou.mynetgear.com
yaplej"s blog: Cloud & Hosted Security
Weekend Scripter: Use the Windows Task Scheduler to Run a Windows PowerShell Scr...
yaplej"s blog: Document Active Directory with GPO Reports
Documenting Active Directory Infrastructure the Easy Way - Ask the Directory Ser...
Active Directory Documents
4 Of The Best Online Sources For Learning Network Security
Sonarr - Dive in
tbaschak/Pantz-PFlog-Stats · GitHub
CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide, 9.1 - Configuring LAN-...
Raspberry Pi DNS/DHCP Server - CiscoDude.Net
Wsus Package Publisher - Home
I had the same problem, solved with this
AttachmentsUseCaption=0 to Notes.ini Delete bookmarks.nsf
Multihoming a Windows Server - NetworkAdminKB.com
ThreatFinder | AlienVault
How To Set up a repository cache with apt-cacher | Debuntu
Learn Python The Hard Way
unix-ninja :: A cheat-sheet for password crackers
The OpenNMS Project
VyOS
www.semicontaiwan.org/en/sites/semicontaiwan.org/files/docs/mitsubishifinal_ke_f...
The SQL Server Sqlio Utility
Download SQLIO Disk Subsystem Benchmark Tool from Official Microsoft Download Ce...
Sensu | The open source monitoring framework.
Stop using Nagios - Andy Sykes - YouTube
A Working Theory-of-Monitoring | USENIX
server - Setting up an anonymous public Samba Share to be accessed via Windows 7...
Ad GUI Copy Selected Groups from one user to another - Script Center - Spicework...
Top 10 Active Directory Tasks Solved with PowerShell | PowerShell content from W...
Add an Active Directory User to the Same Groups as Another User with PowerShell ...
Future DoD SIPRNET VMWARE VIEW | Blah blah blah
Getting Started with Extended Events in SQL Server 2012
VMware KB: VMware support of open-vm-tools
How to benchmark disk I/O : Binary Lane
Taking a deeper dive into VMware thick disks – vBOX | The VBOX
Unattended vSphere Utility Installs - Derek Seaman"s Blog
Luke Maverick: Scripted Install of vCLI & PowerCLI
CA Spectrum SNMP Profile Management | CA Communities
SPECTRUM MIB and SNMP basics
Using vSphere ESXi Image Builder to create an installable ISO that is not vulner...
Updating LSI firmware through the ESXi commandline
Build Custom ESXi 5.5 ISO using PowerCLI | vNelsonTX
RTL-SDR | Hackaday
Automating Windows environments’ setup with Boxstarter and Chocolatey packages
Drawbridge - Microsoft Research
WinCalendar: Calendar Maker & Word, Excel, PDF Calendar downloads
How a $10 USB Charger Can Record Your Keystrokes Over the Air | Threatpost | The...
Active Directory Merger, Acquisition, and Divestiture: Restructuring Limitations
Banana Pi Cluster
OpenBoxes
Linux Basics – LVM (Logical Volume Manager) Tutorial | Ostechnix
Rob Reynolds: Practical Ways to Simplify Windows Administration | Puppet Labs
How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS | Digit...
How to capture and replay network traffic on Linux - Xmodulo
What are useful command-line network monitors on Linux - Xmodulo
Free SSL Certificate with StartSSL and Mac OS X by freshly squeezed
Jobber: A replacement for cron, with sophisticated status-reporting and error-ha...
Getting started with SaltStack
Security Week – Locking down your deployment | Keith"s Consulting Blog
t
DIY Project: Replacing the Stock HP V1910 Fan with Golden Silence - Wahl Network
Why Disaster Recovery Farms are Essential for High-Availability SharePoint - Bui...
COS-461 Syllabus
and Je
OpenContrail is an open source network virtualization platform for the cloud.
PowerShell Magazine » Get started with Pester (PowerShell unit testing framework...
Towards a better console - PSReadLine for PowerShell command line editing - Scot...
Practical PowerShell Unit-Testing: Getting Started
Friday Fun: Updated ISE Scripting Geek Module
wayfair/Graphite-Tattle · GitHub
Ansible for Networking - Jason Edelman"s Blog
The Hacker"s Guide to Python | Julien Danjou
Git-based DNS Hosting [DNS-API.com]
Android IMSI-Catcher Detector (AIMSICD) by SecUpwN
Free Windows Security Tools from www.SecurityXploded.com
Chef Icculus
Demystifying Web-Scale IT | Long White Virtual Clouds
hughsie/gnome-multi-writer · GitHub
How to check memory usage on Linux - Ask Xmodulo
Etherpad - A Real Time Web Based Online Collaborative Document Editor for Linux
How to set up a cross-platform backup server on Linux with BackupPC - Xmodulo
namebench - Open-source DNS Benchmark Utility - Google Project Hosting
Internet Friendly Media Encoder | SourceForge.net
Better Best Bets with Lists in SharePoint 2013 - The Microsoft MVP Award Program...
Microsoft System Center Configuration Manager (SCCM) and Microsoft Deployment To...
Software Library: MS-DOS Games : Free Software : Download & Streaming : Internet...
SAP FICO: Attach Documents to a Journal Entry | WhyPad.com
How To Test Bootable USB
MobaLiveCD - Run your LiveCD on Windows
Test USB and ISO for boot
InfoSec Handlers Diary Blog - Defensible network architecture
Use a load-balancer as a first row of defense against DDOS | HAProxy Technologie...
h
Create a Test Wordpress Instance using Puppet and Vagrant
RapidSSL - Buy SSL Certificates and Wildcard SSL Certificates issued in minutes ...
Why “Puppet vs. DSC” isn’t Even a Thing | PowerShell.org
msutter/dsc · Puppet Forge
Configure HAProxy to Load Balance Sites With SSL
Load Balancing with HAProxy | Servers for Hackers
CLI way of uninstalling a Windows update? - Super User
wusa /uninstall /kb:{updateid}
Microsoft Installer: MSI: Installation and Uninstallation of MSU in silent mode
PowerShell Magazine » Client and patch management using the UpdateServices modul...
The Stony Brook Algorithm Repository
12 Books Every Leader Should Read:Updated - Bob Sutton
Another new Free Software machine: the Acer C720 Chromebook running Debian GNU/L...
SeaBIOS
Windows 7 Issues: Wake-on-Lan (WOL) for Windows 7 Made Easy!
HowTo: Wake Up Computers Using Linux Command [ Wake-on-LAN ( WOL ) ] - nixCraft
Why aren’t we using SSH for everything? — Medium
Powershell script blocks are not closures - Sergey Babkin - Site Home - MSDN Blo...
SQL Server Templates with VMware – Dude Where’s My Drive Letters? | Long White V...
organic fertilizer: how to retrieve your ip address with powershell...
Install NTOP on Debian and Configure to Use NetFlow on Mikrotik RouterOS | Lisen...
Cesanta Software
Use Logcheck to Spot Problems and Security Violations in System Log Files [Linux...
Why Replacing The Fibre Optic Patch Lead Often Fixes Network Problems - Ethereal...
Unreliable Multicast means Unreliable VMware VSAN - EtherealMind
How Many Hosts In An VLAN or IP Subnet and Why ? - EtherealMind
Seth"s Blog: Really Bad Powerpoint
Introducing alertR: Open-Source alerting system - sqall"s blog
Pitivi, a free and open source video editor for Linux
IT owns: Check Microsoft Office 2010/2013 activation type and status. Change fro...
cscript ospp.vbs /dstatus
The Ultimate History Of The Humble Hashtag
New version of the SP 2013 and SP Online solution packs - ISG - Italian SharePoi...
SharePoint 2013 Build number - ISG - Italian SharePoint Group - Site Home - MSDN...
Securely allocating GUIDs in PowerShell Desired State Configuration Pull Mode - ...
In-depth: PowerShell Out-GridView cmdlet | Keith"s Consulting Blog
Copying Configurations across Switches – Cumulus Networks® Customer Support Port...
Network Management and Automation with Chef | Ooyala Engineering
Mae Keane, The Last "Radium Girl," Dies At 107 : NPR
SQL Server 2014 Best Practice: Set built-in Sysadmin(sa) account as an default o...
ircmaxell"s blog: PHP Install Statistics
Website Monitoring with Bash and Nagios Plugins
PhotoSpills Collage Software
Secret Attic Library Door | Hackaday
Get Free Windows Support From These Experts & Communities
sysadvent: Day 25 - Windows has Configuration Management?!?
Sustained power outages in the datacenter | vmPete.com
» The Trouble Connecting vCenter Virtual Appliance to Active Directory Long Whit...
How ICMPv6 Multicast Listener Reports almost spoiled Christmas
Main Page - VickyWiki
Victoria 2 Wiki
Sony Pictures Hacked: The Full Story | . . TheSecurityBlogger . . .
android-screen-monitor - Android Screen Monitor - Google Project Hosting
Automating Display Resolution Configuration in MDT - DeployHappiness
Powershell Host Wizard - Home
Chthonic: a New Modification of ZeuS - Securelist
6 Basic PowerShell Commands To Get More Out Of Windows
Battery Basics – Choosing a Battery for Your Project | Hackaday
Employees are the biggest security risk in the cloud
redhotEngineer"s Blog: Bringing a Router back to life (Modding the Beetel 450TC1...
Wire Wrap 101 | Hackaday
Towards the Perfect Coin Flip: The NIST Randomness Beacon | Hackaday
Temple::USB Device Info - The SZ
Secret CoolReaper backdoor for hackers discovered in Chinese Android phones
Friday Fun: Another Christmas Prompt
The top 10 worst security breaches of 2014
Brothers On C-SPAN Divided By Politics, United In Mortification By Mom"s Call : ...
‘Destover’ Malware Now Digitally Signed by Sony Certificates (Updated) - Securel...
Certificate Life Cycle – A problem for everyone to watch out for
Powershell script to change windows service credentials - BizTalk Tips & Things ...
DNSQuery() Sample To Loop Through Multiple IP Addresses - Windows SDK Support Te...
Docker – a reading list - ThatDependsOnThis - Site Home - MSDN Blogs
How To Write A Resume With The Help Of 8 Ivy School Guides
Mobizen | Your Android, Anywhere
Inside Sony Pictures, employees are panicking about their hacked personal data -...
Executive ego and the Sony Pictures network hack
darktable | the photo workflow software
Defending Windows with Application Whitelisting | Patrick W. Barnes
LGA 771 to 775 Adapter (MOD) - Run faster Xeon CPUs in a Core 2 Quad motherboard
ITProTV
access
Home | WISPA
Powercode.com - The Leader in ISP Billing/OSS
An Unquiet Wiki: Solved an Ubuntu / Debian preseed problem after 3 years...
Dedicated Internet Access
Vulnerability Update for all products 2014 - Secunia
Powerful, highly stealthy Linux trojan may have infected victims for years | Ars...
How to Create Fillable Forms with MS Word 2010
The ‘Penquin’ Turla - Securelist
6. Scale your business at your speed with the cloud… - Microsoft Developer Netwo...
How To Add a Reset Switch To Your Raspberry Pi
Axiom Software - Profile Interpretations - High S and C
Ralph H. Baer, a father of video gaming, dies at 92 - The Washington Post
13 Linux Performance Monitoring Tools - Part 2
nhu12p41.jpg (800×600)
Jumbo Frames and Multi-NIC vMotion Performance over 10Gbe » ValCo Labs
» Installing Cumulus Linux from a MacBook Pro Long White Virtual Clouds
organic fertilizer: PowerShell: Retrieve site location of computer object
25 Best Steve Jobs Quotes
Before The Cat in the Hat, Dr. Seuss Was An Ad Man - Business Opportunities Webl...
10 Books for Aspiring Millionaires - Business Opportunities Weblog
10 Inspirational Quotes from Billionaires - Business Opportunities Weblog
15 Genius Kitchen Storage Solutions
How too many vCPUs can negatively affect your performance - Gabes Virtual World
Sizing VMs and NUMA nodes - frankdenneman.nl
This is what a 12-story fall will do to your iPhone 6 | TUAW: Apple news, review...
splat
Change Default Location for Domain Joined Computers
redircmp
HDMI dongles - active vs passive re-visited - danchar - Site Home -...
Improving Latency in Http Proxy scenario - Sharad Cornejo Altuzar"s blog - Site ...
Two-factor Authentication without the Hassle Factor — Two-Factor Authentication ...
ll sizes.
Set Up SSH Tunneling on a Linux / Unix / BSD Server To Bypass NAT
A Devuan and A-two… | FOSS Force
What is a good free control panel for VPS - Xmodulo
How to install a paravirtualized Xen guest - Xmodulo
The Linux Rain - Building a Desktop Wikipedia Checker
6 Tips for Windows Tablet Owners - Todd Klindt"s SharePoint Admin Blog
HackRF Blue | Software Defined Radio
SQLSaturday #337 View Session Details
Time Blocking -- The Secret Weapon For Better Focus
The Art of Finding Cyber-Dinosaur Skeletons - Securelist
Flash Memory Endurance Testing | Hackaday
The 6 Requirements for Data Center Networks - Plexxi
Enabling a data culture through continuous improvement
Bluetooth 4.2 is here -- chock full of new features
INCS-775 Data Center Security By Dr. Natheer Khasawneh
www.cs.cmu.edu/~dnaylor/CostOfTheS.pdf
0xsauby/yasuo · GitHub
Valerie Maguire"s "De-Mystifying Cabling Specifications From 5e to 7A" - Siemon ...
CoreOS is building a container runtime, Rocket
The Best Web Hosting Services
A Timeline Of The Robots In Films
Build Your Own Wireless Dead Drop For File Sharing
These 3 Types Of Lists Will Help You Be More Productive
Concerned About Copyright? A Guide For Legally Using Images On The Web
Make Every Workday A Rewarding Experience With These Activities
Among Dartmouth"s Lathes And Saws, Lessons In Creativity : NPR Ed : NPR
Finding a fit for autism in testing - SD Times
Want to work at a fun tech company? Practice your social skills. | ITworld
jwz: The CADT Model
This is, I think, the most common
“Serial”: The Podcast We’ve Been Waiting For - The New Yorker
Major Overhaul: How the FCC CIO plans to modernize 207 legacy IT systems | The E...
been
simplicity
Cybercriminals Use Citadel to Compromise Password Management and Authentication ...
11 Useful Utilities To Supercharge Your Ubuntu Experience - OMG! Ubuntu!
Business & Education - Apple Support
Medium"s "Charted" automatically visualizes CSV data - The Changelog
DailyJS: Mermaid: Like Markdown for Diagrams
Securing KeePass with a Second Factor | Kahu Security
GIS Wiki | The GIS Encyclopedia
Configuring Vyatta router for use with my lab environment | Citrix Blogs
VYATTA - The Easy Tutorial - Case Study 10 - Bridging
A user"s SID can change, so make sure to check the SID history - The Old New Thi...
Hacklet 24 – Raspberry Pi Projects | Hackaday
The Myth of the 4-Hour Workweek | SpartanTraveler
HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer
HAProxy Is Still An Arrow in the Quiver for Those Scaling Apps | The New Stack
Load Balancing with HAProxy | Servers for Hackers
Interview with Paul Ramsey of Boundless | Opensource.com
Boundless
Increase Inventory Control with Stitch | Stitch Labs
Boundless, formerly OpenGeo
SendSMTP - Tool to send SMTP email via command-line parameters or interactively
Real World Computing: IBM Notes: 25 Years and Counting...
In The Next Version - Happy 25th Birthday Lotus Notes
On the Menu: Spicy Tamari Tofu & Broccoli - Clementine Daily
18 Ultra Simple Hacks To Make Cleaning Easier | World inside pictures
The Colorful Kitchen - Vegan & Gluten-Free Recipe Blog
The Best Vegan Chocolate Mousse - I Quit Sugar
Sani Seal Toilet Gasket :: No Mess - Waxless – Repositionable
11 top tips to get the most from iPhone 6 and iOS 8.1
How to back up a Debian system using backupninja - Xmodulo
www.itsmfi.org/files/Simple Guide to Creating a Knowledge Base - Allen.pdf
Arduino, circuit boards with a sense of style - CNN.com
5 Tips for Building a Powerful Knowledge Base with Confluence - Atlassian Blogs
Gaining experience with encryption and key rotation - Terry Zink: Security Talk ...
My homemade Raspberry Pi smart thermostat - Imgur
Windows Gets A Package Manager - Download Software Centrally Via OneGet
1. The Pi Plane Project | Simon Aubury.com
Scott Forsyth"s Blog - URL Rewrite vs. Redirect; What’s the difference?
Xshell is a one-stop SSH, SFTP terminal emulator
Scott Forsyth"s Blog - Why is the IIS default app pool recycle set to 1740 minut...
recommend setting to a fixed time like 4:00am if you’re on the East coast of
11 "Avconv" Commands to Record, Convert and Extract Videos & Audios from Linux T...
check_vmware_snapshots – ConSol* Labs
The top 8 new OpenStack tutorials | Opensource.com
Top 20 Practical Cabling Tips for Network Engineers - Part Two - EtherealMind
10 Sed (Stream Editor) Command Examples
Host-Named Site Collections | SharePoint Administration content from SharePoint ...
12 lessons for entrepreneurs that Steve Jobs taught Guy Kawasaki | TUAW: Apple n...
Tech Notes: Difference Between OS1 and OS2 Fibre Optic Cable - EtherealMind
www4.ncsu.edu/~rhee/clas/csc495j/ip-multicast-part1.pdf
Cisco Layer 2 Switching with Multicast and IGMP Snooping
www.michaelfmcnamara.com/files/scripts/multicast.py.txt
Math Symbol Hierarchy - Murray Sargent: Math in Office - Site Home - MSDN Blogs
Powering up Powershell for Remote Desktop Services - Windows SDK Support Team Bl...
Data-Driven Quality explained – part 1: questions? what questions? - Your Softwa...
sed in PowerShell - Sergey Babkin - Site Home - MSDN Blogs
suckless.org st - simple terminal
New Tool: Chocolatey Application Wrapper for MDT | Keith"s Consulting Blog
Are Your Home Security Cams Being Streamed Online Without Your Knowledge?
Are E-Cigarettes Harmful To Your Computer"s Health?
Open Security Operations Center
bup, it backs things up!
vyatta transparent firewall | Zivo NiX BLog
Vyatta 6.1: Bridging The Cloud | Kelly Herrell"s Blog
Engineering Radio
LasLabs | Ubiquiti EdgeRouter - Active Directory Authentication - LasLabs
www.threatstop.com/sites/default/files/documents/HOWTO-vyatta-bridge.pdf
Vyatta Firewall Basics and Configuration | Read The Effin" Blog
5 Ways To Remote Control Your PC With Power Or Wake On LAN
How To Reset Your Mac"s SMC & PRAM – And Why
BadUSB – The Unpatchable Malware That Infects USBs Is Now on the Loose : netsec
The facts about BadUSB | NCC Group
BadUSB attack update: only half of chips are vulnerable...but it probably won"t ...
Badusb | LinkedIn
Sourcecode for "unpatchable" USB exploit now on Github - Boing Boing
BadUSB hack may be one of the biggest threats you have seen!
What You Need to Know About BadUSB - Security News - Trend Micro USA
S21sec Security Blog: The real danger of BadUSB
What BadUSB Is and Isn’t | Plugable
Big Mess o" Wires » BadUSB and the Hidden Microcontroller
Unpatchable BadUSB Code Is Now Publicly Available | Optimal Security: The Lumens...
Fear BadUSB? RGB Spectrum Has An Answer | RGB Spectrum
malware - How to identify which storage USB device is BadUSB-free at store? - In...
When Good USB Devices Go Bad
BadUSB Malware Code Released — Turn USB Drives Into Undetectable CyberWeapons
On The Ethics of BadUSB - Adam Caudill
Karsten Nohl BadUSB Patch Fall Short of a Fix | Threatpost | The first stop for ...
Types of Cybercrime, Fraud, Acts and Preventive Measures
Vagrant – Development Environments Made Easy | Ubuntu Geek
Using Nginx as a Reverse Proxy to Get the Most Out of Your VPS. | Ubuntu Geek
How to disable Webcam in Windows 8 / 7 laptop
BadUSB – now with Do-It-Yourself instructions | Naked Security
Patch for BadUSB unleashed: How to protect yourself from this new cyberweapon : ...
The BadUSB exploit is deadly, but few may be hit | InfoWorld
Why the Security of USB Is Fundamentally Broken | WIRED
Only Half of USB Devices Have an Unpatchable Flaw, But No One Knows Which Half |...
The Unpatchable Malware That Infects USBs Is Now on the Loose | WIRED
How to install Cacti (Monitoring tool) on ubuntu 14.10 server | Ubuntu Geek
7 Steps To Install And Optimize Minecraft For Linux
DorkbotPDX | people doing strange things with electricity
Better SPI Bus Design in 3 Steps | DorkbotPDX
Seth"s Blog: A three-step marketing ladder
GreatFire.org and BBC punch uncensored news through the Great Firewall of China
Web Hosting Benchmarks & Coupons
Ingemar Ceicer - ceicer.org
Obscurity is a Valid Security Layer
The Awesome Program You Never Should Use | Linux Journal
The Black Magic Of SSH / SSH Can Do That? on Vimeo
E-cigarettes can damage your PC"s health
Regin: Nation-state ownage of GSM networks - Securelist
China just blocked thousands of websites | GreatFire.org
Serve websites with Nginx | Linux User & Developer - the Linux and FOSS mag for ...
AngularJs – Introduction | SharePoint Rider
Synchronize Your Life with ownCloud | Linux Journal
Checking Active Directory Replication Using PowerShell
How to Configure and Use a PowerShell Profile - Obscurum per Obscurius - Site Ho...
Managing mobility in the age of BYOD
A Modern Woodworking Workbench | Hackaday
The Easiest Raspberry Pi Media Centre, With RasPlex
Static DOM XSS Scanner | /dev/null
Resist Surveillance
Assembly
Boost Your Productivity With Windows PowerShell Scripts
Purging Audit Data w/ PowerShell - MOSSy Business - Site Home - MSDN Blogs
Harnessing the Power of both worlds - SQL BI - Site Home - MSDN Blogs
Martin Melchior"s homepage: Configure your WR703n with a switch (or two)
WR703n
Martin Melchior"s homepage: Make your Raspberry pi b more power efficient with a...
gozoinks/unifi-pfsense · GitHub
Release Management as a Service - Musings on ALM and Software Development Proces...
10 pidstat Examples to Debug Performance Issues of Linux Process
The 8-hour rule is bunk: Why conventional wisdom about sleep is stressing us out...
Is there any method to protect your self from BadUSB on linux? : linux
"BadUSB" Exploit Makes Devices Turn "Evil" - Slashdot
Chris’ Miscellanea: Controlling USB device access on Linux (e.g. BADusb defense)
usb - How to prevent BadUSB attacks on linux desktop - Information Security Stac...
An Introduction to OpenGL Programming | Linux Journal
The Infinite Hows (or, the Dangers Of The Five Whys) | Kitchen Soap
A way to retrieve SQL statement from SharePoint native call stack - Michael Li -...
7 Unique Ways To Practice Your Coding Skills
Mask all important passwords in all MDT logs - AlexSemi"s Blog - Site Home - MSD...
www.andrewoswald.com/docs/NovArtzGoodallOswald2014.pdf
Sample MDT Web Service | Keith"s Consulting Blog
Customizing Your Windows Deployments | Keith"s Consulting Blog
From the Prototype to the Final Device | Lucky Resistor
SAP Knowledge Base: SAP Process Flow
Three Risks of Skimping on Training - The Many Faces of Mike McBride
the case for it
Chemistry - PhET Simulations
How to install (and upgrade to) Android 5.0 Lollipop on Nexus 4, 5, 7, 10
Products
VSUsbLogon
Transfer notes from an iPhone to a Windows PC
Manawyrm/FMBerry · GitHub
Beginner"s Electronics: 10 Skills You Need to Know
xposed wires and solder-points can create shorts. Applying electrical tape or heat shrink tape in tight enclosures sometimes won’t fit. Liquid electrical tape fi
The 5 SMART stats that actually predict hard drive failure | Computerworld
SMART 5 - Reallocated_Sector_Count. SMART 187 - Reported_Uncorrectable_Errors. SMART 188 - Command_Timeout. SMART 197 - Current_Pending_Sector_Count. SMART 198 - Offline_Uncorrectable
Stuxnet: Zero Victims - Securelist
Pi-Top launches: Get your own DIY Raspberry Pi laptop for $285
Intro to Systemd Runlevels and Service Management Commands | Linux.com
Putt"s Law Quotes - The Quotations Page
Visualize Your Data & Make Your Spreadsheets User Friendly With An Excel Dashboa...
Working With CSV Files In Ruby 1.8.7 Without FasterCSV - Alex Scoble"s IT Notes ...
Learn Angular.JS
Joyent Private Cloud - Products - Joyent
The 200 Best Entrepreneurship Quotes Ever - Business Opportunities Weblog
The Ultimate History Of Card Games
How to deregister your phone number from iMessage and take your texts back — Tec...
How to Record Your Desktop Video and Audio Using "Avconv" Tool in Ubuntu
Avconv
Make full screen sections with 1 line of CSS — Medium
Build Cheat Sheets and Share Your Favourites! - Cheatography.com: Cheat Sheets F...
5 Awesome Open Source Backup Software For Linux/Unix/OS X and Windows Systems
CONFESSIONS OF AN ACCIDENTAL SECURITY TESTER - "I DIDN"T BREAK IN, YOU LEFT THE ...
Confessions of an Accidental Security Tester
Nimble HR - Modern Hiring For Growing Businesses
Trial : Install SAP ERP 6 Ehp 5 with DB2 10.5 on SLES 12 using btrfs « SAP Basis...
Crypto 101
How To Improve the IT-Business Relationship - J.D. Meier"s Blog - Site Home - MS...
Best Practices for Higher Availability & Recovery (IaaS) - En un Lugar de la Nub...
PiFox • Hackaday Projects
Security Holes in Corporate Networks: Network Vulnerabilities - Securelist
Sweet Orange Web Exploit Kit | . . TheSecurityBlogger . . .
Videos |
In South Carolina, A Program That Makes Apprenticeships Work : NPR
At Cooper Standard, Harris is using his Air Force background as an electrician to learn an occupation called mechatronics. It"s a fairly new kind of job in manufacturing — a utility player on the factory floor with myriad skills. "They know a little about programming, they can work with automation," says Warren Snead, Harris" boss. "They know the basics of wiring, hydraulics, pneumatics — so really a Superman or Superwoman who can do everything." In other words, it"s someone who"s able to fix just about anything at a plant — and the kind of job that can"t be sent to a faraway country. Recently, Harris installed sensors for an alarm system. Four nights a week he attends a welding class. And he"s feeling pretty good about the direction his life has taken since leaving the Air Force.
iPhone Malware Spreads, Spotify Beats iTunes, Free Nest Thermostats [Tech News D...
People Don"t Just Want Tools - The Many Faces of Mike McBride
Founder stories: "People don"t want drills" | VentureBeat | Entrepreneur | by Ni...
Serious Tools. For Serious Collaboration. | Metalogix
5 things your CIO needs to know about identity
Thanksgiving vs. Black Friday vs. Cyber Monday: What to Buy Each Day
Overview - D Programming Language
DNS Zones for SharePoint Apps? - rshetwal - Site Home - MSDN Blogs
How to create a Windows Firewall Inbound Rule - To BizTalk and Beyond! - Site Ho...
Download PerfView from Official Microsoft Download Center
Regular Expressions - Searching for SSN Numbers Across Text Files
How to Organize Your Refrigerator Drawers and Shelves - Real Simple
Collector"s desire Achievement in Port Royale 3
Unix: Beyond owner, group, and everyone else | ITworld
Shell Scripting - Checking Conditions with if
Bob Young talks about the origins of Red Hat | ZDNet
"Customers are like your kids, they say they "need" ice-cream, but that"s what they want; what they really need is spinach. You need to understand the customers" needs better than they do."
All Things Open
Collection of Useful Bash Functions and Aliases | TuxArena
jaymedavis/hubble · GitHub
Ship List (New)
Understanding the cloud
Run Best Practices Analyzer Scans and Manage Scan Results
Offline Patching with help from MDT | Keith"s Consulting Blog
Cable Management Tools & Network Cables from SergeantClip
Scary PowerShell
WR Series, Roll Out Rotating Rack
Having Friends At Work Is Incredibly Important And Here"s Why
7 Non-Geeky Skills Every Geek Should Have
Skills for the non geek.
Powershell DSC ResKit Wave 8: Now with 100 Resources! - Windows PowerShell Blog ...
www.measurementlab.net/static/observatory/M-Lab_Interconnection_Study_US.pdf
Re-Size The Distributed Cache Service In SharePoint 2013 | Richard Skinner
Useful deployment links - Michael Niehaus" Windows and Office deployment ramblin...
Dovestones Software Active Directory Tools
adLDAP - LDAP Authentication with PHP for Active Directory
Shall we fork Fedora?
Maybe we"re not veteran enough?
Roll up your sleeves, we may need to fork Debian.
Library Index | Survival Library
Open source NAC solution PacketFence 4.5.0 released
The Linux Rain - Memo - Note Taking, Unix-style
organic fertilizer: Preparing for the End of Windows Server 2003
Networking"s atomic unit: Going small to scale up - Plexxi
To scale larger, technology has time and again become more atomic and adopted more distributed architectures. The 1990s were about storage’s transition, the 2000s about compute’s transition, and the 2010s are going to be about networking’s transition. - See more at: http://www.plexxi.com/2014/10/networkings-atomic-unit-going-small-scale/#sthash.JawW7F1U.dpuf
Fxos on RaspberryPi - MozillaWiki
Genetically Modified Organisms Risk Global Ruin, Says Black Swan Author — The Ph...
What is FAIR? - CXOWARE
Schneier on Security: Virginia Tech Lesson: Rare Risks Breed Irrational Response...
eDiscovery Daily Blog: Those Pesky Email Signatures and Disclaimers - eDiscovery...
How To: Debug missing Drivers in MDT (LiteTouch) | Keith"s Consulting Blog
12 Words From Warren Buffett That Can Mint You a Fortune
"Be fearful when others are greedy and greedy when others are fearful."
Asuswrt-Merlin - custom firmware for Asus routers | Merlin"s Tower
GoDaddy Updates Hosting Platform as Cloud Alternative
The cloud is not the panacea for all hosting and application delivery needs. GoDaddy is going another route.
PowerTip: Determine PowerShell Version - Hey, Scripting Guy! Blog - Site Home - ...
$PSVersionTable
5 Brilliant Online Resources For Fans Of Terry Pratchett"s Discworld
The history of JavaScript, as told by Douglas Crockford - Dave Voyles | Tech Eva...
Understanding AutoSPInstaller: What you need to know
Blogs - Steve Chen [MSFT] Sr. Support Escalation Engineer - Site Home - TechNet ...
Install SharePoint 2013 SP1 using AutoSPInstaller - Jonas Widriksson
-GetPrerequisites $true
AutoSPSourceBuilder - Home
SharePoint 2013 Service Accounts Best Practices by Vlad Catrinescu
Make better share point stuff with an agile methodology
Video: MDT 2013 log files basics (bdd.log and smsts.log) | Keith"s Consulting Bl...
How to scan Linux for vulnerabilities with lynis - Xmodulo
TechNet Download and Install SharePoint 2013 Prerequisites on Windows Server 201...
Filtering PowerShell Objects | PowerShell content from Windows IT Pro
Script Show Installed Windows Roles and Features
Import-module servermanager ; Get-WindowsFeature
Netdiscover - Active/Passive network discovering tool
activised arpwatch
An incompatible SQL Server version was detected - SQLRockstar - Thomas LaRock
How to turn your CentOS box into a BGP router using Quagga - Xmodulo
How to Hack Your Own Network and Beef Up Its Security with Kali Linux
Tech Notes: Ping Sweep an IP Subnet - EtherealMind
Learning Shell Scripting Language: A Guide from Newbies to System Administrator
Tracking a Bitcoin Thief pt. I:
ZTIWindowsUpdate.wsf fix … Part II | Keith"s Consulting Blog
Debugging : The 9 Indispensable Rules for Finding Even the Most Elusive Bugs - W...
Tim Berners-Lee & the trends driving the Web"s future - Microsoft UK Government ...
Please Do Not Leave A Message: Why Millennials Hate Voice Mail : All Tech Consid...
Make Your Own Wireless Printer With A Raspberry Pi
Shellshock BASH Vulnerability Tester
How You Can Avoid a BadUSB Attack
Turning USB peripherals into BadUSB | Security Research Labs
5 Deadly Linux Commands You Should Never Run - The Epoch Times
Iron.io Blog: Docker in Production — What We’ve Learned Launching Over 300 Milli...
What are useful Bash aliases and functions - Xmodulo
Amazing ! 25 Linux Performance Monitoring Tools
All You Need Are Two Top-of-Rack Switches « ipSpace.net by @ioshints
SQL–More memory and CPU is not always a win - mfp"s two cents - Site Home - MSDN...
There Is No Configuration Management Special Sauce — Steven Murawski
Red / Green: GP Preferences | System Admins
computer
Digita Vaticana | Digitalizzazione Manoscritti Biblioteca Vaticana
What Are the Five FSMO Roles
Payroll Medics Blog
UniFi - Lost password and username recovery - Ubiquiti Networks Community
Published for the First Time: a 1959 Essay by Isaac Asimov on Creativity | MIT T...
Read speeds dropping dramatically on older files; benchmarks needed to confirm a...
Samsung delivers fix for SSD slowdowns | Computerworld
Maybe?
10 Simple Ways to Lower Your Cholesterol
Psyllium Fiber
Deploy Google Chrome for Work with Group Policy - DeployHappiness
Scripting an Internet Explorer window - The Old New Thing - Site Home - MSDN Blo...
PowerShell and SQL Stored Procedure - The Microsoft MVP Award Program Blog - Sit...
SharePoint & SQL Server AlwaysOn Failovers – Video Demonstration - Build on Shar...
From the MVPs: PowerShell and SQL Stored Procedure - Microsoft Press - Site Home...
TL;DR Wikipedia
Tablets: Quest for the enterprise
Got 10GbE working in the lab–first good results | vNetWise
Errata Security: Some POODLE notes
How to monitor and troubleshoot a Linux server using sysdig - Xmodulo
How To Create Secure Communication Channel with Putty
How to Control Your Linux System Just with Your Head and a Webcam - Softpedia
How to check hard disk health on Linux using smartmontools - Xmodulo
Vagrant | Linux Journal
Python tuples: immutable but potentially changing - O"Reilly Radar
CipherShed | Secure Encryption Software
VeraCrypt - Home
Filtering HTTPS Traffic with Squid on pfSense 2.1.5 | sichent
11 Useful, Genius Math Tricks That Are Actually Easy
People Who Love Expanding Their Minds Do These 13 Things — Do You?
Welcome | MIRcon 2014
WSUS GPO Settings for the real world - Spiceworks
SSL broken, again, in POODLE attack | . . TheSecurityBlogger . . .
Configuring OMD for LDAP (Domain) Authentication UPDATE | sitweak
Multisite LDAP intregration
Raible Designs | Developing Services with Apache Camel - Part IV: Load Testing a...
Integrate SharePoint 2013 with Team Foundation Server 2013
Letter to David Wilson and Howard Chu regarding Python-LMDB
In-Memory Microbenchmark (Scaling)
Active Directory files and their functions - servergeeks - Site Home - MSDN Blog...
Using Event viewer custom views for troubleshooting - vimalsdesk - Site Home - M...
Extended vbs to start/stop all BizTalk host instances in several servers - BizTa...
Nmap NSE script for detecting POODLE-vulnerable servers (SSLv3 with CBC ciphersu...
Don"t overlook the most important cloud storage feature: Security
Fed Up Of Inefficient Meetings? Send These 8 Rules To Your Boss
How To Learn Color Theory In Less Than One Hour
How To Improve Your Programming Career Opportunities
10 Amazingly Useful Spreadsheet Templates To Organise Your Life
Impressive Internet Facts That Are Sure to Blow Your Mind! - Host Advice
Open General | SourceForge.net
Easily Set Up Trade Convoys in Port Royale 3 - Redirect
Steam Community :: Guide :: Complete Walkthrough of Port Royale 3 Trade Campaign
[Strategy] Tips and Tricks
Organizations struggle to balance security with systems integration
Create Copy of Web Site on Same Server or Remote Server using Web Deploy - Eric ...
Network Design -- Keeping it simple | Router Jockey
The Fappening: A Wake-Up Call for Cloud Users | . . TheSecurityBlogger . . .
Theory of Constraints and common staffing mistakes - Plexxi
Managing Local Group Memberships with Group Policy Restricted Groups - DeployHap...
Six ways consumer software can revolutionize your IT
How Millennials Are Reshaping Charity And Online Giving : All Tech Considered : ...
The Snappening: Hundreds of Thousands of Snapchats May Have Been Leaked
34 Tips To Help You Ace Your Next Job Interview
Visualizing Your SharePoint Farm with PowerShell - The Microsoft MVP Award Progr...
VeraCrypt a Worthy TrueCrypt Alternative - eSecurity Planet
Applying the Theory of Constraints to network transport - Plexxi
Open WhisperSystems
Four short links: 13 October 2014 - O"Reilly Radar
What"s Happening above Your Head? | Linux Journal
2014/7169 aka ShellShock - c0t0d0s0.org
13 Billing Tips for Keeping Clients Happy - Divorce Discourse
Video Streamer | Jaruzel.com
Better Living Through Robotics
What is the right connected garage door opener to buy? — Tech News and Analysis
Radio TFS and the GREAT curve ball question about (ex-nightmare) shorter deliver...
Backup Hard Drives: Expect Failure and Plan Accordingly — My Money Blog
e last drive was limping along. I turns out there isn’t that
Dependency management and organic IT integrations - Plexxi
Seth"s Blog: Four steps on the road to organizational growth, dominance or irrel...
Using SignalR to power ASP.NET Dashboards, Part 2 - Jerry Dixon"s Blog - Site Ho...
Using SignalR to power ASP.NET Dashboards - Jerry Dixon"s Blog - Site Home - MSD...
Your USB Devices Aren"t Safe Anymore, Thanks To BadUSB
8 Daily Rituals You Can Create To Boost Your Geeky Productivity
Cambridge Audio Bluetone 100: Room-filling, thrilling sound | TUAW: Apple news, ...
Has Your Data Gone Rogue? - SQLRockstar - Thomas LaRock
@JKevinParker: How to Leverage SharePoint 2013 to Organize, Label, Navigate, and...
Smartphone simulators | SharePoint Dragons
Call Page button click event using PowerShell | SharePoint Rider
Slides and Scripts from DogFood Conference 2014
OneTab extension for Google Chrome and Firefox - save up to 95% memory and reduc...
Doc Searls Weblog · Cavalcade of Tabs
CoreOS: Open Source Future of Enterprise Computing? - Technology Blog and Commun...
OpenMediaVault 1.0 review | LinuxBSDos.com
TrueCrypt Getting a New Life - eSecurity Planet
HDMIPi Raspberry Pi displays are shipping now! Touch screens and 10" model in th...
HDMIPi
Understanding and Using Systemd | Linux.com
How to use logrotate to manage log files in Linux - Xmodulo
How to monitor online prices on Linux - Xmodulo
[Phoronix] Uselessd: A Stripped Down Version Of Systemd
Wal Commander GitHub Edition | Multi-platform open source file manager for Windo...
Run Unix Commands in vi and vim editor
Only FOSSers "Get" FOSS | FOSS Force
How to monitor user login history on CentOS with utmpdump - Xmodulo
3 great scanner tools for Linux | Opensource.com
Attack a website using slowhttptest from Linux and Mac - darkMORE Ops
How to manage configurations in Linux with Puppet and Augeas - Xmodulo
Another 5 command line tips | Raspberry Pi Today
How to turn your CentOS box into an OSPF router using Quagga - Xmodulo
Hands-on review: Probox2 EX Android 4.4 TV box ·  LinuxGizmos.com
Using GIT to backup your website files on linux -
Phabricator - An Open Source Powerful "Project Management" Tool for Linux
Teaching kids game design with open source software | Opensource.com
How to set up RAID 10 for high performance and fault tolerant disk I/O on Linux ...
Open Source Lessons Learned: Two Years of Telescope - Telescope
2 Free CAD Programs for Linux: DraftSight and QCAD | TuxArena
Secure Linux Systems Require Savvy Users | FOSS Force
Uber Home Automation w/ Arduino & Pi
pcDuino SBC adopts i.MX6 Quad, loads up on storage ·  LinuxGizmos.com
How to configure HTTP load balancer with HAProxy on Linux - Xmodulo
What is good reference management software on Linux - Xmodulo
Dtrx - An Intelligent Archive Extraction (tar, zip, cpio, rpm, deb, rar) Tool fo...
Nginx, SSL & php5-fpm on Debian Wheezy | IO Digital Sec
InfoSec Handlers Diary Blog - Testing for opened ports with firewalk technique
InfoSec Handlers Diary Blog - Detecting irregular programs and services installe...
Errata Security: Two Minutes of Hate: Marriot deauthing competing WiFi
Errata Security: Who named "shellshock"?
Errata Security: Wget off the leash
Errata Security: Six-month anniversary scan for Heartbleed
Seize a FSMO Role with NTDSUtil
PowerShell Dates, Times and Formats
Friday Fun – Take a Chance with PowerShell
Are Haskell engineers second-rate? (Answer: no.) | Michael O. Church
Raspberry Pi As A Hacking Arsenal | . . TheSecurityBlogger . . .
Refactoring for Performance
organic fertilizer: using netsh to capture packets
[H]ard|Forum - View Single Post - BigAdv with Opteron 8300/8400 chips.
The Forgotten Female Programmers Who Created Modern Tech : All Tech Considered :...
Virtualization Concepts Part1 - Virtualization Concepts Part 1 - Site Home - MSD...
Programming Arduino in Visual Studio with Visual Micro - Canadian Developer Conn...
Part 4: Get started with Python: Object Oriented Approach - Canadian Developer C...
Part 3: Get started with Python: Functions and File Handling - Canadian Develope...
Part 2: Get Started with Python - Canadian Developer Connection - Site Home - MS...
Convert SID to User Name using PowerShell - Michael Pedersen"s Blog - Site Home ...
SharePoint Pod Show
Installing dll into GAC with PowerShell - MiguelNunez - Site Home - MSDN Blogs
10 Helpful Spreadsheet Templates To Help Manage Your Finances
Clinton Documents: 7 Excerpts You Should Read : The Two-Way : NPR
Bufferbloat Killed my HTTP Session… or not? « ipSpace.net by @ioshints
BadUSB Means We’re All Screwed
CP/M Source Code Released
Hackaday 10th Anniversary: [1o57] and the Art of Encryption
Flashback Friday: How two Stanford University whiz kids accidentally built Googl...
Flashback Friday: How two university dropouts created Microsoft
Intel Underestimates Error Bounds by 1.3 quintillion | Random ASCII
fsin
AnandTech | An Introduction to Semiconductor Physics, Technology, and Industry -...
OpenClonk
MichaelJCole/bithammer · GitHub
Web Deploy 3.5: The Official Microsoft IIS Site
about
eurysco
eurysco – Download
Why Go is elegant and makes my code elegant | PyTux
adamcaudill/Psychson · GitHub
Cables, Transceivers and 10GBASE-T - Plexxi
Marriott Gets Caught Blocking Mobile Hot Spots - The Many Faces of Mike McBride
OPSec for security researchers - Securelist
Windows 10 Technical Preview - Games for Windows and the DirectX SDK - Site Home...
Fun with PowerShell: Part 1 – Loading Demo Data - Bluewater SQL - Site Home - MS...
Provision a Home Directory for new Accounts - the Connector Space - Site Home - ...
Memorize Anything Using Active Recall Memory
The supercapacitor UPS for Raspberry Pi and for industrial, automation, IoT, and...
InfoSec Handlers Diary Blog - Security Onion news: Updated ShellShock detection ...
InfoSec Handlers Diary Blog - Shellshock: Vulnerable Systems you may have missed...
Little-Known Punctuation Marks That Need To Make A Comeback
GlassWire Network Security Monitor & Firewall Tool
Computer_hardware_poster_1_7_by_Sonic840.png (1280×1813)
Errata Security: Do shellshock scans violate CFAA?
Errata Security: Masscan does STARTTLS
Presentations - ipSpace.net by @ioshints
The curmudgeon"s guide to Microsoft"s embryonic Windows 10
Shellshock -- we ain"t seen nothing yet
Windows 10: Command Prompt"s experimental new features are genuinely useful
The IBM Desktop Utility for Lotus Notes Clients | IdoNotes (and sleep)
dsktool.exe
InfoSec Handlers Diary Blog - CSAM: The Power of Virustotal to Turn Harmless Bin...
TIOBE Software: Tiobe Index
Evil Tester: An exploratory testing example explored: Taskwarrior
NirSoft"s OpenSaveFilesView displays recently opened and saved files
How to install Windows 10 Technical Preview on Oracle VirtualBox
How to create a bootable Windows 10 Technical Preview USB drive
Roku learns a new trick -- Introduces Screen Mirroring Beta for Android and Wind...
Errata Security: Bash "shellshock" bug is wormable
InfoSec Handlers Diary Blog - What has Bash and Heartbleed Taught Us?
Bourne-Again Shell (Bash) Remote Code Execution Vulnerability | US-CERT
Taskwarrior - What"s next?
Errata Security: Bash "shellshock" scan of the Internet
Saving a read-only file edited in vi / vim | GeekyBoy.com
wissel.net :: Keeping up with all the GIT
wissel.net :: Creating nginx configurations for Domino SSL
Breaches in corporate network protection: access control - Securelist
I don’t need no stinking firewall ... or do I? « ipSpace.net by @ioshints
iPhone 6 and 6 Plus teardowns reveal internal details
Will you be prepared if disaster strikes?
The Internet of Things -- Chasing the waves
Home – Simply Secure
Automate processes for a sustainable supply chain
www.securingthehuman.org/newsletters/ouch/issues/OUCH-201410_en.pdf
Cumulus Linux: First Impressions - PacketLife.net
The best CRM software as selected by business professionals
Securosis Blog | Why the bash vulnerability is such a big deal (updated)
Estimating Hidden Bug Count -- Part 1/3 - Eugene Bobukh"s WebLog - Site Home - M...
EDI Line Item Data | [The Integration Engineer]
Friday Fun – Does Anyone Really Know What Day It Is?
Friday Fun: Pick Up Milk
Hacker School
Export SharePoint Solution Packages from the Farm | SharePoint Voodoo
Installing SharePoint 2010 Language Packs with PowerShell | SharePoint Voodoo
Working with CSV files in PowerShell | SharePoint Voodoo
Shellshock / Bash bug – 22 year internet vulnerability could be the biggest yet ...
Uploading files to SharePoint with PowerShell and Web Services | SharePoint Vood...
Use Power to get MSI Properties | Keith"s Consulting Blog
PowerCLI and the Linux Shellshock vulnerability - LucD notes
Document Choreography of an EDI Purchase | [The Integration Engineer]
Why is Dell crippling its low end server RAID cards?
6 Smart Interior Air Quality Monitors You Should Buy For Your Home
Virtual reality is coming to the workplace and it may be sooner than you think
Everyone should be a maker. So how do we get there? — Tech News and Analysis
Funders and Founders - Visual Startup Blog
Live Tile Framework for SharePoint
How To Pick A Color Scheme Like A Pro
IT Systems Resiliency 101: What it means and 5 ways SMBs can adopt it
Shellshock Bash bug could be bigger than Heartbleed
Shellshock Bash -- What every business needs to know
organic fertilizer: powershell: reset user password
organic fertilizer: powershell: limitation on retrieving members of a group
The Fappening -- 3 things we can learn from the celebrity nude photo leak
Cool Tools – Handy Paint Pail
Content Centric Networking and a tour of (Xerox) PARC
Mind, hands, and heart: John Leeke on Internet video for sharing knowledge about...
A cost-effective way to winterize windows | Jon Udell
9 Free Programming Books That Will Make You A Pro
Use Your iPad As A Recipe Book? 10 Accessories For Kitchen Tablet Users
5 Things Users Tell IT Support and What They Really Mean
Performance Quiz #14: Memory Locality, x64 vs. x86, Alignment, and Density - Ric...
Finally... JavaScript source line info in a dump - PFE - Developer Notes for the...
.NET Just in Time Compilation and Warming up Your System - I know the answer (it...
Subsystem for UNIX-based Applications is not affected by Shellshock - Services f...
Not vulnerable but no bash.
Simple REST api for Executing PowerShell Scripts - Windows PowerShell Blog - Sit...
Nobelist Muhammad Yunus: Be A Go-Getter, Not A Job Getter : Goats and Soda : NPR
On The Cusp: 11-Year-Olds Around The World Share Their Wisdom : Goats and Soda :...
How To Spark Personal Growth: 5 Tricks Of The Entrepreneur
How To Monitor Your Car"s Performance With Android
Learn 10 Simple Self Improvement Tips In 10 Minutes [Stuff to Watch]
OBD2 & Windows: Save On Auto Repair With Diagnostic Tools
Shellshock and its early adopters - Securelist
“Bash” (CVE-2014-6271) vulnerability – Q&A - Securelist
quux.de and DNSSEC | Jens" BLOG
Li-ion battery charging
How A Mastermind Group Can Help You Achieve More Goals
Jobs Of The Future: Where They Are, How To Get Them - Microsoft MVP Mentor Blog ...
2014
Troubleshooting SharePoint Event ID 6393 - Build on SharePoint - Site Home - MSD...
Event ID 6393
Get-spfarmconfig has misleading value - laleh - Site Home - MSDN Blogs
Get-spfarmconfig
Potential data latency with AlwaysOn Availability Groups and Memory Optimized Ta...
Using signed PowerShell scripts with configuration items and applications - Adam...
SharePoint 2013 On-Prem reset index stuck resolution - Kristopher Loranger - Sit...
Continuing the DSC Resource Kit Additions – Wave 7 is Live - Windows PowerShell ...
IBM Domino Servers STILL don"t support SSL SHA-2 Certificates - and it is about ...
Biohacking: The Creepy but Exciting Trend in Body Modification
Strange issue when enabling AlwaysOn AG feature in SQL 2014 - Esoteric - Site Ho...
Information for My Beginning Programming Course Using Python - Vance Morrison"s ...
Bash specially-crafted environment variables code injection attack | Red Hat Sec...
ASP .NET Authentication : OWIN middleware component for browser based sign-on us...
New DocumentDB quotas - Azure DocumentDB Team blog - Site Home - MSDN Blogs
Evolving ASP.NET Apps – Evaluating the Code - Canadian Developer Connection - Si...
CVE-2014-6271: Bash lets you do bad things. (Shellshock) | Invisible Threat
Apt-Cacher on Ubuntu Trusty | UNIX Administratosphere
VMware KB: Download URLs for VMware vSphere Client
PowerCLI in the vSphere Web Client–Announcing PowerActions - Virtu-Al.Net
How to rebuild WMI classes on Windows 2003 - AsiaTech: Microsoft APGC Internet D...
Apache OpenMeetings Project – Home
Post-It To Your Screen - 6 Sticky Note Apps For Windows
New To Android? Welcome, Here"s A Brief Intro
[GAPPS][4.4.x] OFFICIAL Up-to-Date PA-GOOGLE… | Paranoid Android | XDA Forums
Today I Learned: 10 Amazing Facts For Geeks Discovered On Reddit [Weird & Wonder...
How To Learn Programming Without All The Stress
Apache OpenMeetings Project – Home
Cleaning up Visual Studio project folders using PowerShell - Ricky"s Bing Maps B...
Don’t be #FresherWeak, be a Smart Student with Smart Apps - Microsoft UK - Site ...
Videoconferencing - Open Source Ecology
telepresence - the open source SIP TelePresence system - Google Project Hosting
Poor man"s comments: Inserting text that has no effect into a configuration file...
How To Live Like A Fortune 500 Leader
5 Secrets Of The Steam Client That You Should Be Using
Project Hieroglyph
Innovation Starvation | World Policy Institute
The Spooky Nature of Electromagnetic Radiation
Incident Management System for IT Monitoring Tools | PagerDuty
BlueStacks
Andy the Android Emulator
VESA announces DisplayPort 1.3 standard -- enables 5K resolution
#09 Grant Fritchey, Database Dev Ops | no dogma podcast
4 DIY Geeky Drink Recipes To Get Your Buzz On
organic fertilizer: powershell: converting int64 datetime to something legible
More Fun Creating PowerShell Tools
Docker Part 2 – HOWTO Remove / Delete Docker Containers | tekhead.org
Deploying Log Insight with PowerCLI 5.8 R1 new features - Virtu-Al.Net
Successful Men Carry These 7 Things Around With Them — Do You?
10 Useful Items You Should Never Throw Out
SQL Server on vSphere Workshop at VMware - SQLRockstar - Thomas LaRock
How to use Twitter in a Linux terminal with Rainbow Stream - Linux FAQ
KeySmart - Premium Pocket Key Organizers & Key Holders - Made In The USA
Fun building a CCIE Security home Lab | . . TheSecurityBlogger . . .
Delete Old Files with File Management Tasks - DeployHappiness
Cyclades, Avocent Console Connection Guide
MS Office 2007/2010 Deployment failure - Unknown Error Code 30059 - Desktop Cent...
Simple Ready to Roll Linux Backup Script | IO Digital Sec
How to Prepare for Linux Sysadmin Certification | Linux.com
Miracast in Enterprise Environments - FAQ - The Deployment Guys - Site Home - Te...
Miracast in Enterprise Environments - The Deployment Guys - Site Home - TechNet ...
BattBorg: power your Raspberry Pi with almost any kind of battery | Raspberry Pi...
Securosis Blog | Secure Agile Development: Agile and Agile Trends
wissel.net :: Foundation of Software Development
SQL Server Configuration Check - SQLRockstar - Thomas LaRock
Performance Metrics for SQL Server 2014 - SQLRockstar - Thomas LaRock
SQL Server Troubleshooting Useful Links - SQLRockstar - Thomas LaRock
Optimize Text with PowerShell
Creating Your Own PowerShell Command
Friday Fun - A PowerShell Popup Alternative
Docker Part 1 – Introduction and HOWTO Install Docker on Ubuntu 14.04 LTS | tekh...
SQL Server Index and Statistics Maintenance
Disabling vs. Dropping Indexes - Brent Ozar Unlimited® by Brent Ozar Unlimited®
My Simple Trick for Quickly Making Secure Passwords | The Nubby Admin
alias secpass="openssl rand -base64 24" alias hexpass="openssl rand -hex 24"
Female bosses not averse to sexual harassment ‹ Japan Today: Japan News and Disc...
Modern OpenFlow and SDN - Part II | Big Switch Networks, Inc.
SQL Server Index Analysis Script for All Indexes on All Tables
HustleCon 2014 - I went, I spoke, but Sam made $40K from it | Neville"s Financia...
Video: Seated stretches for the workplace - Mayo Clinic
The 6 Companies With the Best Customer Service
6 Easy Tricks to Become Instantly More Likeable
How do I find running Traces in SQL Server? - Stack Overflow
SELECT * FROM sys.traces
IIS Server and Site Comparison with Web Deploy - Eric Parvin - Site Home - MSDN ...
Backup Strategies with Web Deploy - Eric Parvin - Site Home - MSDN Blogs
Scaled Agile Framework: Using TFS to support epics, release trains, and multiple...
How to use cccheck to prove no case is forgotten - Francesco"s Blog on CodeContr...
Jeff Hengesbach: Fix Disappearing Windows 7 Desktop Shortcuts
SharePoint Sysprep - Shared technical tips from Emmanuel Bergerat - Site Home - ...
New update for Remote Desktop on iOS available now! - Remote Desktop Services (T...
Part 1: Get Started with Python - Canadian Developer Connection - Site Home - MS...
Foliotek Development Blog » Blog Archive » SQL Server Optimization Script with I...
-- This query identifies indexes on a database that need to be rebuilt. -- -- The recommendation is to rebuilt queries whose fragmentation exceeds 30.0% -- and who page count exceeds 50 pages. These parameters may be adjusted below. DECLARE @page_count_minimum smallint DECLARE @fragmentation_minimum float SET @page_count_minimum = 50 SET @fragmentation_minimum = 30 SELECT sys.objects.name AS Table_Name, sys.indexes.name AS Index_Name, avg_fragmentation_in_percent AS frag, page_count AS page_count, sys.dm_db_index_physical_stats.object_id AS objectid, sys.dm_db_index_physical_stats.index_id AS indexid, partition_number AS partitionnum FROM sys.dm_db_index_physical_stats (DB_ID(), NULL, NULL , NULL, "LIMITED") inner join sys.objects on sys.objects.object_id = sys.dm_db_index_physical_stats.object_id inner join sys.indexes on sys.indexes.index_id = sys.dm_db_index_physical_stats.index_id and sys.indexes.object_id = sys.dm_db_index_physical_stats.obje
HOW TO: Find Currently Running Long SQL Agent Jobs - SQLRockstar - Thomas LaRock
Fix Windows 7 Desktop Shortcuts Disappearing - gHacks Tech News
HDD Guardian
Check if on the health of your harddrives
Upgrading to SQL Server 2014: A Dozen Things to Check - SQLRockstar - Thomas LaR...
SQL Server Backup, Integrity Check, Index and Statistics Maintenance
Bolse 7-Port USB Charger Review and Giveaway
Beginner"s Guide To Setting Up SSH On Linux And Testing Your Setup
_
PowerShell Prank #1: R2D2 - DeployHappiness
F5 debugging fails for any SharePoint project types using Visual Studio Professi...
Bizlink, creating new doc types for tracking metadata | Michael Ellerbeck
The Fundamental Advantages Of Using A Chromebook
Make These 4 Changes Before You Delete Any Online Account
You Can Upgrade MS-DOS 6.22 To Windows 8, If You Really Want To [Stuff to Watch]
How To Be A Google Power User
Rebuild or Reorganize: Configure SQL Server Index Maintenance by Brent Ozar Unli...
PowerShell v5 Preview is Out. Here are my two favorite features - Todd Klindt"s ...
Securosis Blog | Secure Agile Development: New Series
File systems, Data Loss and ZFS - ClusterHQ
The State of ZFS on Linux - ClusterHQ
It"s time for business-led IT to come out of the shadows
Why is U2’s latest album on your iPhone? How to remove Apple’s publicity stunt —...
Best Excel Tutorial - Best Excel tutorial in whole Internet
Shell Runner - MOBZystems
Happy 15th Birthday, Wi-Fi! Thanks for letting us surf the web on the toilet
Using vscsiStats to better visualize storage I/O | vmPete.com
Netrunner - The Best Distro You"ve Barely Heard Of - Yet Another Linux Blog
Solarized - Ethan Schoonover
@JKevinParker: Managing SharePoint User Access
Debian PVHVM vs PV
Xen & Docker: Made for Each Other! | Linux.com
Convivea - Home of Bit Che - Torrent Search
SmoothVideo Project (SVP) - motion estimated frame interpolation with any video ...
Limerence | Sparkwood Records
Colourful ! systemd vs sysVinit Linux Cheatsheet
Seth"s Blog: Different kinds of broken systems
Battery Technologies That Are Going to Change the World
Getting Ready…Troubleshooting unattended windows installation — matt wrock"s sof...
ScratchJr - Home
Face Recognition: How It Works and Who"s Watching?
Less Than Dot - Blog - How to get information about all databases without a loop
10 High-Value Activities in the Enterprise - J.D. Meier"s Blog - Site Home - MSD...
gfxmonk/shellshape · GitHub
10 Easy Back Exercises That Will Help Eliminate Pain
Gutter Guard information from Consumer Reports
But you"ll pay less than $100 if you install the CR Best Buy Amerimax 85198 or 854054 yourself. You"ll still save thousands even if you add in the roughly $100 to $500 a contractor will charge to put in a do-it-yourself system.
Intro to Git and GitHub Part 4: Merging and Rebasing overview - Tobiah Marks
Intro to Git and GitHub Part 3: Branching - Tobiah Marks
Intro to Git and GitHub Part 2: Publishing, cloning, and forking. - Tobiah Marks
Intro to Git and GitHub Part 1: Your first repository - Tobiah Marks
Intro to Git and GitHub - Tobiah Marks
Find unused indexes using sys.dm_db_index_usage_stats | Basit"s SQL Server Tips
An Obsessively Thorough Battery (and more!) Showdown
CoreOS is Linux for Massive Server Deployments
CoreOS Brings Docker Container Tech to DigitalOcean
George Orwell, "Politics and the English Language," 1946
Foliotek Development Blog » Blog Archive » SQL Server Database Optimization – a ...
Discovering Unused Indexes tutorial and example
tsql - List of all index & index columns in SQL Server DB - Stack Overflow
List Indexes For Database using TSQL
The Ultimate Cheat Sheet To Becoming A Great Public Speaker
Revisiting FTP Basics - WebTopics - Site Home - MSDN Blogs
How to install a Service Pack at a SQL Server 2012 Failover Instance - Best Prac...
10 Big Ideas from The 7 Habits of Highly Effective People : Sources of Insight
skills
Disabling Lenovo Track Pad Edge Swipe - mschray - Site Home - MSDN Blogs
VS & TFS 2013 Update 4 CTP 1 is available - Brian Harry"s blog - Site Home - MSD...
Updating The SharePoint 2010 CSV Bulk Taxonomy TermSet Importer/Exporter For Sha...
Foliotek Development Blog » Blog Archive » Identifying Unused Indexes in a SQL S...
Friday Fun: Creating PowerShell Scripts with PowerShell
The evolution of the computer -- from 1613 to 2013
vmware/webcommander · GitHub
How to Share a Terminal Session with Friends - Make Tech Easier
byobu
7 Fresh Veggies You Can Grow From Kitchen Scraps
Tox: A New Kind of Instant Messaging
Windows Installer celebrates its 15th birthday
Free online cybersecurity courses | SANS Cyber Aces
Troubleshooting Slow Startup or Login Times Caused by Group Policy - DeployHappi...
Roundup of Software Defined Radios - rtl-sdr.com
rtl-sdr and GNU Radio w/Realtek RTL2832U, E4000 and R820T
Symbols and Emoji - Murray Sargent: Math in Office - Site Home - MSDN Blogs
SecurityLaxity: Cheap Entropy: Using your RTL-SDR as a hardware entropy source
Friday Fun Text to HTML
Tracking Your Day with PowerShell
CyanogenMod
Enable SharePoint 2013 Integrated SSRS To Send Email Alerts | Richard Skinner
Tri-Monitor Wood Mount - Imgur
Homemade Monitor Stand - Imgur
2014 Ultimount - Imgur
Sinkholing the Backoff POS Trojan - Securelist
After 13 years…Why do End Users Still Struggle with SharePoint? | Asif"s SharePo...
lab11.eecs.umich.edu/content/pubs/ghena14green_lights.pdf
Soon you’ll be able to use a Chromebook as an Android ADB server for phone mods ...
Teaching Engineering As A Social Science | Kitchen Soap
DSC... What is it for, really? — Steven Murawski
How-to recover from checksum mismatch errors in SVN · andrew.hedges.name
KDDI to build new TELEHOUSE data centers in Tokyo and Osaka ‹ Japan Today: Japan...
Build a $35 Time Capsule - Raspberry Pi Time Machine Backup Server - Raymii.org
Viewing the History of an Active Directory Object with Replication Metadata
Date and Time Math with PowerShell
Active Directory SPN Mappings and Kerberos
Managing Local Backups with Windows Server Backup
Getting Started with a Lotus Notes to Exchange Mail Migration
Script to Collect Hardware Inventory Data
Ping a List of Servers with PowerShell
Netflix/Scumblr · GitHub
Netflix/Workflowable · GitHub
Netflix/sketchy · GitHub
level: An Ultrawide-band Radio Module • Hackaday Projects
VMware KB: Increasing the size of a Linux ext3 virtual machine disk
Cluetrain at Fifteen | Linux Journal
gvb [Wikiston]
EasyNAS | making storage easy
How to Increase the size of a Linux LVM by expanding the virtual machine disk | ...
VMware KB: Extending a logical volume in a virtual machine running Red Hat or Ce...
/dev/
What’s better than sushi? Ramen sushi ‹ Japan Today: Japan News and Discussion
SharePoint Server Patch Mismatch Problems - Build on SharePoint - Site Home - MS...
Typical Programmer - How I work as a digital nomad
Twilio
Linux: Install Ansible Configuration Management And IT Automation Tool
Configure Network Bonding in Ubuntu Server
Viber for Linux PC | Viber Desktop
How to configure a network printer and scanner on Ubuntu desktop - Linux FAQ
Compatible web browsers and PDFMaker applications
Why Didn’t Technology Create a 4-Hour Workday? — My Money Blog
Downloading Dell Driver CAB files automagically with the Driver Pack Catalog | d...
Dell Driver Pack Catalog | Keith"s Consulting Blog
Twilio Cloud Communications - APIs for Voice, VoIP and Text Messaging
Karma Platform - The New Approach for Agile Business Management
Release Management tools to deploy an app
Improving Linux HiDPI Support For Gnome, KDE, XFce, Cinnamon And Firefox
GSM Vs. CDMA: What Is The Difference And Which Is Better?
The 8 Biggest Security Breaches In History
GPS III: Where Are We? And Where Are We Going?
Researchers propose new Android security framework that could aid BYOD schemes —...
Temporary directory for a shell script
Making sense of the cloud: SaaS, PaaS and IaaS explained
data
KaOS | A lean KDE Distribution
Linux distro KaOS 2014.08 is here with KDE 4.14.0
Is legacy IT paralyzing your organization?
All About Test Planning (Part 1–Introduction) - Testing The Testing Strategy - S...
25 Words Every Scrabble Player Must Memorize
Different methods to Lock or unlock SAP users « SAP Basis Cafe
SU10 mass lock/unlock
Who Was Frank Sprague? - Business Opportunities Weblog
Frank Sprague
SharePoint 2010 Build Numbers - Todd Klindt"s SharePoint Admin Blog
Internet Touches Half Million Routes: Outages Possible Next Week - Renesys
Internet, that’s called “cold comfort.”
Creating a Company Where Everyone Gives Their Best - J.D. Meier"s Blog - Site Ho...
organic fertilizer: dns resolver behavior
Get done on time... really. | [The Integration Engineer]
More Flashing Fun
Use Free 7 Minute Workout Videos To Get Into Shape [Stuff to Watch]
SharePoint patching demystified - Stefan Goßner - Site Home - TechNet Blogs
SharePoint E-Mail Confirmations and Alerts (under the hood) - IanR - Site Home -...
Usage of EDI specifications | [The Integration Engineer]
EDI Standards and Usage Specification | [The Integration Engineer]
Document Manager Home
What caused today’s Internet hiccup | BGPmon
Complex Topology and Wiring Validation in Data Centers
The 6 Things You Need to Know to be Great in Business | blog maverick
How Employees Lost Empathy for their Work, for the Customer, and for the Final P...
etsy/nagios-herald · GitHub
Restore TFS backups from SQL Enterprise to SQL Express
Installing TFS 2012 on Server 2012 with SQL 2012
Upgrading TFS 2013 to TFS 2013 Update 2 (2013.2) « Software Development and Infr...
Backing up and Restoring your TFS Server - Brian Harry"s blog - Site Home - MSDN...
Train SharePoint Users within SharePoint sites | Asif"s SharePoint Blog
SharePoint 2013 Build Numbers - Todd Klindt"s SharePoint Admin Blog
(get-spfarm).buildversion
Set Permission to List Items using PowerShell | SharePoint Rider
4 Steps to a culture of performance - O"Reilly Radar
zero-project - Official website
Rename TFS database
Get Rid of Orphaned Content Types in SharePoint 2013 | Ingo Karstein"s Blog
VMware KB: Backing up a Windows Server 2008 R2 or Windows Server 2012 virtual ma...
Big List of Free Consumer Reports (2/2): See Your Confidential Housing, Insuranc...
Big List of Free Consumer Reports (1/2): See Your Confidential Credit, Banking, ...
Troubleshooting WMI Series coming - Ask the Performance Team - Site Home - TechN...
How To Automate Changing The Local Administrator Password - Ask Premier Field En...
Script Deletes Orphaned Printer Ports | sepago
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
RSSOwl - Powerful RSS / RDF / Atom News Feed Reader with Google Reader Synchroni...
Post Job to 50 Job Boards with One Submission | ZipRecruiter
TFS Upgrade Guide - Downloads
ocropus - The OCRopus(tm) open source document analysis and OCR system - Google ...
tesseract-ocr - An OCR Engine that was developed at HP Labs between 1985 and 199...
Installing TFS 2013 on Windows Server 2012 R2 with SQL Server 2014 CTP1 | Alexan...
Ping A List Of Computers and Double Check DNS name against NetBios name | chenti...
Check Hard drive for bad sectors or bad blocks in linux
wissel.net :: Time stamped encrypted archives
Developers use Version Control, business users Document management and consultants ZIP files.
Downloads - triage-ir - Triage: Incident Response - Scripted collection of syste...
MSDN and TFS Licensing Gotchas
Understand TFS Licensing - Visual Studio & TFS for US Public Sector - Site Home ...
TFS Upgrade Guide - Home
25 Years Of Glorious Internet
How to set up a USB network printer and scanner server on Debian - Linux FAQ
core
How to remove file metadata on Linux - Linux FAQ
dataglass
SQL Server Merge Statement – Insert/Modify/Delete Records | SharePoint Rider
I Hate Write-Host So Much… - Lessons Learned - Site Home - MSDN Blogs
Compatibility with SQL Server 2014 - Microsoft Dynamics NAV Team Blog - Site Hom...
Episode #44 Data Driven Performance | PerfBytes
organic fertilizer: troubleshooting wmi…
The Gutenberg Clock | ch00ftech Industries
Payment Card Industry PCI Security Best Practices | . . TheSecurityBlogger . . .
That grumpy BSD guy: Password Gropers Take the Spamtrap Bait
Removing a user"s site collection administrator privileges and security group me...
More tokenizing... - The Activity Designer - Site Home - MSDN Blogs
URL Length Limits - IEInternals - Site Home - MSDN Blogs
VSS backup of AlwaysOn Secondaries - CSS SQL Server Engineers - Site Home - MSDN...
11 Shortcuts For Learning Linux In Record Time
Run Through This Checklist Before Calling IT Support
sysMATT - Matthew E Hoskins: Backup, Restore, Customize and Clone your Raspberry...
Exciting New Terminal Emulators - Linux Links - The Linux Portal Site
Best Time to Buy a Car | POPSUGAR Smart Living
The Science of Strengthening Glass
How To Make Free PDF Forms With LibreOffice Draw
How To Control Your Android Using Your Computer’s Mouse And Keyboard
Why Dell’s PowerEdge VRTX is Ideal for Virtualization | Blades Made Simple
6 Android Apps Every Raspberry Pi Owner Should Use
Enabling BizTalk Services to work with Service Bus 2.2 SDK - BizTalk Team Blog -...
A Homemade Bubble Robot for the Kids
Cool Tools – rTracker
Real World Computing: Using your Operating System Login for IBM Notes can "Poiso...
Dual-Stack Monitoring | Jens" BLOG
VRT Network Equipment | VRT Systems
Raspberry Pi add-on board controls entire buildings ·  LinuxGizmos.com
The .Default user is not the default user - The Old New Thing - Site Home - MSDN...
How to Image and Clone Hard Drives with Clonezilla | Linux.com
Yahoo CISO Details Challenge of Security at Scale - eSecurity Planet
Zipping a single file with PowerShell - Jerry Dixon"s Blog - Site Home - MSDN Bl...
Press PowerShell Pause to Continue
milek"s blog: Monitoring Dropped UDP packets
How to set up a Samba file server to use with Windows clients - Linux FAQ
DailyTech - China Kicks Symantec, Kaspersky Off Approved Software List
Windows
New To Android? Part Two: Master Using Your Phone
What is Docker and why is it so darn popular? | ZDNet
The Principles of Modern Management - J.D. Meier"s Blog - Site Home - MSDN Blogs
Stay up-to-date with Internet Explorer - IEBlog - Site Home - MSDN Blogs
Application Compatibility in the .NET Framework
PowerShell Script to Limit SharePoint Site Templates Available
PowerShell Script To Determine If SharePoint List Uses InfoPath Forms
Roll Your Own YouTube/Flickr with MediaGoblin | Linux Journal
Linux/Unix Echo Command with Practical Examples
Paperclip Lock Picking Sets
Reverse Engineering a NAND Flash Device Management Algorithm
A Dot Notation Nation - User Ed - The blog of Ed Price, Customer Program Manager...
18 Unexpected Lifehacking Tips To Improve Your Exam Scores
$149 networking security gizmo runs Snort on OpenWRT ·  LinuxGizmos.com
tpp - the command line presentation tool
Planning Failover Cluster Node Sizing - Clustering and High-Availability - Site ...
Search Reporting and SharePoint 2013: Introduction - Nathan"s Search Blog - Site...
Monitoring Active Directory Import for SharePoint 2013 User Profiles - Better To...
What matters the most in IT strategy? Business Value or Business Impact? - The A...
The Barry Shein Home Page
Converting Times from One Time Zone to Another Time Zone in PowerShell - System ...
eBook deal of the week: Code - Microsoft Press - Site Home - MSDN Blogs
The Physical Internet - Grant Holliday"s Blog - Site Home - MSDN Blogs
Practice and Theory of Security Reviews -- Part 3 - Eugene Bobukh"s WebLog - Sit...
Security Reviews: The Heuristics Zoo, Part 1/2 - Eugene Bobukh"s WebLog - Site H...
Practice and Theory of Security Reviews - Eugene Bobukh"s WebLog - Site Home - M...
RHEL 7 / CentOS 7 : Disable Firewalld and use iptables @ All Linux User"s Blog
InfoSec Handlers Diary Blog - A Honeypot for home: Raspberry Pi
What are better alternatives to basic command line utilities - Linux FAQ
DTVD/rainbowstream · GitHub
Setup Flexible Disk Storage with Logical Volume Management (LVM) in Linux - PART...
Cheat - An Ultimate Command Line "Cheat-Sheet" for Linux Beginners and Administr...
More GDB tips and tricks
The making of the Raspberry Pi Model B | Raspberry Pi Today
Financial Literacy Cartoon for Kids Starring Warren Buffett — My Money Blog
Turn a Raspberry Pi into your own personal cloud
Removing Old Active Directory Users with PowerShell
How to troubleshoot and fix common issues with your iPhone and iPad — Tech News ...
Honeybee Hive Monitoring • Hackaday Projects
Handling ini files in PowerShell
Tonido | Run your own Personal Cloud
Hotel WiFi Speed Test by SpeedSpot - Find Fast Hotel WiFi
Hotel WiFi Speed Test
How to overcome the main challenges faced by IT departments
No BYOD policy? Now is the time to prioritize user-oriented IT
Endpoint management is very much alive
5 Important Lessons You Could Learn From Recent Data Breaches
How To Speak Gen Z
Flowchart: Can You Use That Copyrighted Picture?
Energetic Bear: more like a Crouching Yeti - Securelist
Energetic Bear/Yeti
Performing a SharePoint site collection backup and restore from an unattached da...
Too many single use plans, now what? - Blog do Ezequiel - Site Home - MSDN Blogs
after
Motivational Quotes : Sources of Insight
Getting Ready for Chef PowerShell DSC | Chef Blog
Reduce AppFabric Calls to Active Directory for SharePoint Farms - Build on Share...
DIY NAS: 2014 Edition - Brian"s Blog
Why I Chose Non-ECC RAM for my FreeNAS - Brian"s Blog
same
Increase the number of workstations a user can join to a domain - TechRepublic
ms-DS-MachineAccountQuota
OpenELEC Mediacenter - Home
Minimal Linux Live
Enterprise Support - Symantec Corp. - How to manually uninstall Symantec Endpoin...
How to Eat Well on Just $20 a Week (With Meal Plans!)
Logging in CMTrace format from PowerShell - System Center Blog by Russ Slaten - ...
Reverse Engineering Logitech Unifying USB Protocol | Tequals0
UPower
o
Logitech Unifying devices support in UPower | Julien Danjou
Grocery Shopping 101 - Home - Yoga Eat Run
25 Frugal Items for Your Organic Vegan Grocery List
One Windows Tool To Get Instant Access To All Your Hardware Controls
Windows key + X.
Tapuino, the $20 C64 Tape Emulator • Hackaday Projects
recording
15 CMD Commands Every Windows User Should Know
Why cant PS run loop fast ? - anantd"s blog - Site Home - MSDN Blogs
Catan
Building a better Internet, one Tor relay at a time | Parabing
milek"s blog: Massive msync() speed up on ZFS
BitKey: A secure, Debian-based Live OS for bitcoin transactions | LinuxBSDos.com
Cybersecurity & Cyber Defense | Dump Windows Event Logs To CSV Text Files (VBScr...
SolderSmoke Daily News: Moxon
Open Source Wireless Garden Kits: Cooking Hacks Open Garden- Postscapes
Download Original Iphone iOS Firmwares | Tech ArrivalTech Arrival
Don"t Fly Drones Here
barnowl
I have been fighting spam for 10 years - Terry Zink"s Cyber Security Blog - Site...
How to protect your company data without inspecting SSL
What events and columns are analyzed by SQL Server Upgrade Advisor from a SQL Tr...
SharePoint 2013 Incoming E-Mail Feature Troubles Configuring SMTP Services - Ian...
Sitespeed.io - Analyze your website speed and performance
Best Practices and Troubleshooting for Group Update Providers | Symantec Connect
Securosis Blog | TI IR/M: The New Incident (Response) & Management Process Model
IBM The Repair Calendar feature in Notes 8.5 - United States
Best IBM article I have ever read!
Update a registry key for ALL users on a system | Mick"s Mix
_
ONION PI - REV BR - Area31 Hackerspace
Linux / Unix logtop: Realtime Log Line Rate Analyser
Viktor"s DIY: How to Recover a Laptop After a Failed BIOS Update
Sorting a hashtable by byte value in PowerShell
How to manage DigitalOcean VPS droplets from the command line on Linux - Linux F...
20 things to do after installing Elementary OS 0.2 Luna
EFF releases experimental open wireless router firmware | LinuxBSDos.com
Programming is not math, huh?
Creating a second large partition on a single drive machine | Keith"s Consulting...
Computer Science Unplugged |
Application Request Routing and URL Rewrite – PART 1(Server Farms) - Chiranth"s ...
How to replace the broken screen of your acer Iconia a 200 | quaint
Electronic discovery is a challenge. BYOD is a possible solution — Tech News and...
The History of Programming: Part 1
Configuring SharePoint 2013 ECT & BCS for SQL Connectivity - IanR - Site Home - ...
Downloads | Raspberry Pi
Raspberry Pi 3D full-body scanner interview | Linux User & Developer - the Linux...
How to setup your most used templates in PowerShell_ISE - Ashour"s blog - Site H...
Improve Your Social Skills With Highlights From 5 Great TED Talks
[object Object]
MAP/XSLT Performance Comparison between BizTalk Server 2013(R2) vs. 2010 - BizTa...
Get Actual CPU Clock Speed with PowerShell - Remko Weijnen"s Blog (Remko"s Blog)
Chef and DSC - Wanna Try It? — Steven Murawski
Just Culture resources « Code as Craft
Just Culture | Sidney Dekker
How to Patch a Single SharePoint Farm With Minimal any Downtime - Build on Share...
Tempus Nova and Denny"s Inc. Partner to Take Denny"s to Google Apps - Press Rele...
Adminer - Why is better than phpMyAdmin?
PowerShell DSC Resource Kit Wave 5 Arrives - Windows PowerShell Blog - Site Home...
Friday Fun Reverse PowerShell
Migrating IIS 6.0 Web Application to New Version Guidance - Michael Li - Site Ho...
Pimp your Prompt
Stupid Adobe Reader XI, setting printer dialog Actual size | Michael Ellerbeck
“iprintScaling”=dword:00000001
The 2014 Guide To Windows 7 For Ex Windows XP Users
Why Smartphone Breaks At Work Aren"t Such A Bad Idea : NPR
Seth"s Blog: Project management for work that matters
Active Directory Security, Permission and ACL Analysis | System Admins
Is the Chef Learning Curve Worth It? — Steven Murawski
DNS inventor Paul Mockapetris to startups: "Complexity is your enemy" | VentureB...
Read this if you have transactional replication configured and plan to upgrade f...
Do you want SharePoint 2013 in-flight workflows to complete after a Full Farm Fa...
Four Active Directory PowerShell Scripts and Notes - DeployHappiness
Mallory: Transparent TCP and UDP Proxy – Intrepidus Group - Insight
In Pictures: The spectacle of the "Supermoon"
US government says online storage isn"t protected by the Fourth Amendment
Documenting Your Task Sequences Automagically - The Deployment Guys - Site Home ...
NETvNext Blog
Beginner"s Guide to WordPress Database Management with phpMyAdmin
InfoSec Handlers Diary Blog - Egress Filtering? What - do we have a bird problem...
InfoSec Handlers Diary Blog - Finding the Clowns on the Syslog Carousel
Why Python Makes A Great First Programming Language - ReadWrite
TutorialsTaskForce - GNU Radio - gnuradio.org
Pi MusicBox - A Spotify, SoundCloud, Google Music player for the Raspberry Pi, w...
Super moon ‹ Japan Today: Japan News and Discussion
XBOOT
Net-SNMP installation and configuration
How to use systemd for system administration on Debian - Linux FAQ
Twin rainbows ‹ Japan Today: Japan News and Discussion
Home | Sakai
VMware Snapshot Size Powershell Nagios Script | Nerhood Weblog
Friday Fun: A Random PowerShell Console
ShellSend: Email Files From the Command Line! • Binary Fortress Software
5 Windows 7 Features You Didn"t Know Existed
Microsoft SQL Server 2008 R2 Utility Control Point – Multi Server Management - s...
One-Liner: Symlinks and Windows - Lessons Learned - Site Home - MSDN Blogs
Fix up the databases after restoring Tfs 2008 to the Tfs 2010/2012 Data Tier - V...
Linux Basics: How To Find Size of Directory Commands | Unixmen
Recommendations for Page Files on SharePoint Servers - Share Poignant - Site Hom...
InfoSec Handlers Diary Blog - Who inherits your IP address?
wissel.net :: The folly of root cause analysis
How to set up two-factor authentication for SSH login on Linux - Linux FAQ
Securosis Blog | Open Source Development and Application Security Survey Analysi...
Getting SRV Records with PowerShell - Lessons Learned - Site Home - MSDN Blogs
Understanding the Windows ADK for Windows 8.1 Update and MDT 2013 - Microsoft De...
_
mathse/my-check_mk-checks · GitHub
[ROM][A200] OmniROM KitKat 4.4.2
ADK not being detected by MDT | HomeOps Tech Titbits
IOBlazer – VMware Labs
vBenchmark – VMware Labs
OmniROM
mRemoteNG
Tekzilla
rsnapshot
keep
Sorting and Pagination in ASP.NET 4.5 - Premier Field Engineering Developer Blog...
Configuring TFS with the databases spread across different SQL server instances ...
SQLAlchemy - The Database Toolkit for Python
Manage Linux Containers with Docker on Ubuntu | HowtoForge - Linux Howtos and Tu...
LXC 1.0: Troubleshooting and debugging [10/10] | Stéphane Graber"s website
LXC 1.0: GUI in containers [9/10] | Stéphane Graber"s website
LXC 1.0: Scripting with the API [8/10] | Stéphane Graber"s website
LXC 1.0: Unprivileged containers [7/10] | Stéphane Graber"s website
LXC 1.0: Security features [6/10] | Stéphane Graber"s website
LXC 1.0: Container storage [5/10] | Stéphane Graber"s website
LXC 1.0: Some more advanced container usage [4/10] | Stéphane Graber"s website
LXC 1.0: Advanced container usage [3/10] | Stéphane Graber"s website
LXC 1.0: Your second container [2/10] | Stéphane Graber"s website
LXC 1.0: Your first Ubuntu container [1/10] | Stéphane Graber"s website
So you need to write a PowerShell script
Microsoft SharePoint Foundation Subscription | System Admins
LucD notes - My PowerShell ramblings
Homepage
LXC 1.0: Blog post series [0/10] | Stéphane Graber"s website
napp-it // webbased ZFS NAS/SAN appliance for OmniOS, OpenIndiana, Solaris and L...
ASP.NET Session State using SQL Server In-Memory - Ken Kilty"s Blog - Site Home ...
MSSQL Server Error Logs - Lessons Learned - Site Home - MSDN Blogs
Release Management - Getting Started Links - Michael Pedersen"s Blog - Site Home...
SharePoint 2013 Certificate Error Causes Performance Issues | Richard Skinner
OpenBuilds Open Source Embroidery machine | Dangerous Prototypes
World Domination Summit
Observations with the Active Memory metric in vSphere | vmPete.com
Get OpenVPN up and running, enjoy your privacy | Parabing
OpenBTS open-source project
Norse - IPViking Live
SQL Database Reports with PowerShell
BizTalk Server 2013 R2 - Generally Available Now! - BizTalk Team Blog - Site Hom...
Update for SharePoint Online Solution Pack for branding and provisioning - Vesa ...
SharePoint 2013 - How much memory is recommended by Microsoft? - George Bethanis...
Seeing colors with psake - Heath Stewart"s blog - Site Home - MSDN Blogs
Adding shortcuts on desktop using Group Policy Preferences in Windows 8 and Wind...
OpenDaylight | A Linux Foundation Collaborative Project
group policy - How to set the Internet Explorer Home Page via GPO? - Server Faul...
Nartac Software - IIS Crypto
hypercat - 1248 Wiki
Group Policy Central - Your central place online for IT Administrators with many...
SunSpider 1.0.2 JavaScript Benchmark
Which VS / TFS Power Tools should I use? - SoftwareSimian - Site Home - MSDN Blo...
Collecting TFS Best Practice Analyser Logs - SoftwareSimian - Site Home - MSDN B...
PowerShell Workflows: Restarting the Computer - Hey, Scripting Guy! Blog - Site ...
Wordfence Security Plugin for Wordpress | The Many Faces of Mike McBride
Wordfence
Overview of BizTalk Health Monitor (BHM) - BizTalkHealthMonitor - Site Home - MS...
Download Script Browser & Script Analyzer 1.3 from Official Microsoft Download C...
Nerd Vittles » The Definitive VoIP Quickstart Guide: Incredible PBX for the Rasp...
LVM Snapshot : Backup & restore LVM Partition in linux
NETGEAR goes hardcore -- announces Nighthawk X6 AC3200 Tri-Band WiFi Router
Ceph Turns 10: A Look Back — Red Hat Open Source Community
More PowerShell Laziness
Open Wireless Movement
Sigsense Technologies
Calendar Reporting with Excel and Power Pivot - Analysis Services and PowerPivot...
Nest Learning Thermostat has its security cracked open by GTVHacker
Copy-ItemWithProgress | Keith"s Consulting Blog
PowerShell for the Lazy IT Pro
SharePoint 2013: Unable to Start the User Profile Synchronization Service - ianr...
Why IT departments will soon be the exception, not the rule
The new way to configure Internet Explorer proxy settings with Group Policy | Th...
Creating the Group Policy Central Store - Updated for Windows 8.1/2012R2 - Deplo...
libreCMC · The libre embedded GNU/Linux distro
About ThinkPenguin.com | ThinkPenguin.com
oVirt
Virtual Machine Manager Home
Windows 7 Virtualization with KVM - Funtoo
eduroam
check freeradius/radius auth/acct/status advanced and fully featured - Nagios Ex...
www.theseus.fi/bitstream/handle/10024/47101/Urpi_Joonas.pdf
Deploying RADIUS: Configuring Authentication with Active Directory
Configuring FreeRADIUS for Authentication against ActiveDirectory | eduroam-US
The Big Byte: How to setup FreeRADIUS to integrate with Active Directory Authent...
guide/FreeRADIUS Active Directory Integration HOWTO
guide/FAQ
S5: A Simple Standards-Based Slide Show System
100% Cable Patching in the Closet?
Tapestry Workshops
Ansible is Simple IT Automation
Consumerism Commentary
Visual Multiplication with Lines -- Math Fun Facts
ManageIQ
Script Different settings per task sequence (MDT 2012)
reptyr: Attach a running process to a new terminal - Made of Bugs
Artistic Style - Index
Indent - GNU Project - Free Software Foundation
Irssi - The client of the future
Git - git-bisect Documentation
Using Expect Scripts to Automate Tasks » ADMIN Magazine
bartaz/impress.js · GitHub
Hacker Public Radio ~ The Technology Community Podcast Network
byobu.co
wxWidgets: Cross-Platform GUI Library
Installing SharePoint 2013 SP1 with SQL Server 2014 on Windows Server 2012 R2 - ...
SharePoint Feature Administration and Clean Up Tool - Home
Question of the year: what to do with Lotus Quickr | Lotus, er, IBMRockStar
Elevator pitch
Reduce CPU core count to improve Lucene.NET index building performance - Michael...
@JKevinParker: Types of Sites and Site Collections in SharePoint 2013
The Hidden Treasures of IPtables
Debian TARPIT iptables How To
Redis
mhn
Weekly MySQL News
Zillabyte
The parable of the beer and diapers • The Register
gerrit - Gerrit Code Review - Google Project Hosting
ImperialViolet - BoringSSL
Betty: Turn Generic English Into Linux Terminal Commands
MoviePy — MoviePy 0.2 documentation
Videogrep: Automatic Supercuts with Python – Sam Lavigne
InfoSec Handlers Diary Blog - New tool: kippo-log2db.pl
kippo - SSH Honeypot - Google Project Hosting
Ninite - Install or Update Multiple Apps at Once
Easy Transcript
Giovanni Idili of OpenWorm: Brains, Worms, and Artificial Intelligence
Wireless | GlobalVision
This Is Why You Can"t Postpone Planning for Your Retirement (And How to Start)
How Do I Stop Screen From Wuff Wuffing at me? | The Nubby Admin
MobileWill: Live Raspberry Pi Power Usage!
Two Factor Auth List
Source Code Hosting Service Code Spaces Deleted By Hacker - Darknet - The Darksi...
SharePoint Integrated SSRS Reports Fail To Run After An Upgrade To Claims Authen...
What to do with Timer jobs in SP2013 - anantd"s blog - Site Home - MSDN Blogs
Heartbleed: Really that bad?
PerformanceTesting – OpenVPN Community
systemd
PID EINS!
OSSIM: Open Source SIEM & Open Threat Exchange Projects
Named: Endpoint Threat Detection & Response
Endpoint Threat Detection Response
OpenRC - Wikipedia, the free encyclopedia
Demystifying Systemd | dastergon"s weblog
Keybase
SlackBuilds.org
Master DNS servers: Stealth (a.k.a. Split or DMZ) DNS Server
Super Scratch Programming Adventure! (Covers Version 2) | No Starch Press
DNS Spoof Tutorial @ Calomel.org
https://w2.eff.org/Privacy/Key_escrow/Clipper/mykotronx.notes
Pocket Survival Guide - EMC Celerra
Improve your negotiation skills with BATNA
Best Alternative To a Negotiated Agreement.
Viewing GPO"s on the Commandline
Fastest way to switch mouse to left handed - I know the answer (it"s 42) - Site ...
rundll32.exe user32.dll,SwapMouseButton
In The Next Version - For SAP Customers The Future of Work Is Collaborative
stealth.openwall.net/xSports/shocker.c
Citrix ShareFile: Send Large Files - Secure File Transfer and Sharing
Service Principal Names for SQL Server - SQL Canada (@SQLCAN) - Site Home - MSDN...
Service Principal Names
Natively Compiled Procedures and Bad Execution Plans - Home Of The Scary DBA
Enterprise-caliber cloud BI | Birst
Clarity Media Group
Don’t get too used to 4G, 5G is on the way
Index maintenance script - Mohamed Sharaf"s Blog - Site Home - MSDN Blogs
Sing Out Loud Traditional Songs | American English
Homeowners: Could this save you thousands in just a few hours?
Circle City Con Indy"s First Hackercon
Jeremiah Grossman: Introducing AntiSamy
versions
childrensdyslexiacenters.org/Portals/30/Fundraising/Golf Outing/Golf Outing Plan...
Category:OWASP AntiSamy Project - OWASP
.
CMMS Software, Asset Management, EAM | Maintenance Assistant
How to check if you are editing GPO"s using a local, or central store - monkeydu...
JBroFuzz - OWASP
Burp Suite
Managing drivers in MDT 2012 using Driver Groups | Musings of an IT Pro
Advanced Persistent Threat (APT) Attack & Zero-Day Protection | FireEye Malware ...
Imperva - Data Center Security Solutions
How to Create and Edit Group Policy for Vista/Windows 7 PC"s - monkeydust.net
windows 7 group policy computer maintenance - Spiceworks
Citation management tool for open science | Opensource.com
Zotero
Death of the TIFF Image – Part Two | Xact Data Discovery
Death of the TIFF Image? | Xact Data Discovery
AnandTech | Advatronix Cirrus 1200: a Storage Server Under Your Desk
Advatronix Cirrus 1200
8 Things My Toddler Has Taught Me About Money
How to Backup Samba Domain Controller Configuration in Linux
Windows Server 2003 ‘End of Support’ Infrastructure Videos - Official Microsoft ...
From the MVPs: Updated Column Store Indexes in SQL Server 2014 - Microsoft Press...
jakubroztocil/httpie · GitHub
sanity/quickdt · GitHub
Scraping Sysinternals
Microsoft Deployment Toolkit (MDT) Wizard Studio - Home
MDT custom variable for Lenovo Model – DriverGroup | Siva Mulpuru"s Blog
LenovoModel
Querying the MDT database using a custom model - Michael Niehaus" Windows and Of...
CustomModel=#Left("%Model%", 4)#
The Millennials: A Generation Of Savers?
Coming back online | ServeTheHome and ServeThe.Biz Forums
dig.csail.mit.edu/2014/Papers/PST-PETS/PETS.pdf
Bits from Debian - Introducing the Debian Continuous Integration project
How to Build a Raspberry Pi Radio Transmitter
Guest Rant: Ham Radio — Hackers’ Paradise
into amateur radio
SP 2013 – PowerShell to Modify Help Setting on Site Collection - SharePoint Gen ...
PowerShell your world cup - Virtu-Al.Net
Welcome to SmartJars, Inc - Get Organized
The effect of Updates - Brian Harry"s blog - Site Home - MSDN Blogs
Docker 101: What it is and why it’s important | Network World
Using a Physical Hard Drive with a VirtualBox VM
How Internet Forensics Changed Criminal Investigations | . . TheSecurityBlogger ...
PowerShell Saturday 005 Atlanta: It"s Time To Part With Blankie: Moving from com...
witsendpoetry
VMware Security Hardening Guides | United States
VMware vSphere 5.5 U1 Hardening Guide Available
Seth"s Blog: Are you solving a problem or creating a problem?
Sell used CDs & DVDs & Video Games & Gadgets
Docker - Debian Wiki
Biztalk 2010 WCF adapters Fail after Installation of .Net Framework 4.5 - MSMQ I...
How to Test a SQL Connection from any Windows Machine - Dave Kidder"s Break-it-D...
Remote Event Receivers in SharePoint 2013 - Voyage - Site Home - MSDN Blogs
Sallys Baking Addiction Whole Wheat Oatmeal Pancakes. » Sallys Baking Addiction
SQL Server 2012 Service Pack 2 (SP2) RTM has released. - Microsoft SQL Server Re...
RUNNING .NET APPLICATIONS ON A RASPBERRY PI THAT COMMUNICATES WITH AZURE - Bruno...
Request Management in SP2013 - Voyage - Site Home - MSDN Blogs
Use of SQL 2014 with TFS 2013 - Brian Harry"s blog - Site Home - MSDN Blogs
Scott Hanselman"s 2014 Ultimate Developer and Power Users Tool List for Windows ...
PowerShell is King–Use PowerShell to find out the file information in a file rep...
Reusing Existing Configuration Scripts in PowerShell Desired State Configuration...
Active Directory Phone Numbers and Line URIs: Together at Last! - Lync PowerShel...
Slow Boot Slow Logon (SBSL), A Tool Called XPerf and Links You Need To Read - As...
Demo: Pure CSS speech bubbles – Nicolas Gallagher
How to work LibreOffice into your book creation process
Research - Automatic Maintenance in Windows Server 2012 R2...
psexec \\SERVERNAME -s schtasks /change /tn "\Microsoft\Windows\TaskScheduler\Maintenance Configurator" /DISABLE
SharePoint: Your Fastest, Out-of-the-Box Application Development Environment - C...
Videos from the PowerShell Summit — Steven Murawski
Designing Puppet – Roles and Profiles. - - Craig Dunn"s Blog
mdtguy.files.wordpress.com/2014/04/deploymentmadesimple.pdf
Research - Beyond Zip - How to store 183 GB of VMs in a 16...
archives
Research - Creating the MDT 2012/2013 Deployment share usi...
Research - Mastering screen resolution settings in MDT 201...
BitsPerPel=32 VRefresh=60 XResolution=1 YResolution=1
Rethinking Driver Management in MDT 2013 « J. Gregs Brain Corral
inject different drivers into a pre-built image?
Out in the Open: The Little-Known Open Source OS That Rules the Internet of Thin...
How to manage Out-of-Box Drivers with the use of Model Specific Driver Groups in...
Apply hotfixes during task sequence | The knack
script
Research - MDT 2013 Lite Touch Driver Management
wissel.net :: Let"s ditch IBM Notes and Domino
LawNerds.com: The Law Student"s Guide to Law School
rc.local, Cron Style | Linux Journal
dinedal/textql · GitHub
the templating website for all: Scripts
CleverWorkarounds » Rewriting the knowledge management rulebook… The story of “G...
maps
PowerShell: predict the future via TechEd - Windows PowerShell Blog - Site Home ...
Using Metasploit To Bypass Anti-Virus Software - Generating and Obfuscating Payl...
How To Blur Faces In Videos »
HOW TO BLUR FACES IN VIDEOS
How to change MAC address in Linux? | blackMORE Ops
How to monitor Nginx web server from the command line in real time - Linux FAQ
GetSID of the user,object: Registry, WMIC, PowerShell - Gaurav"s Blog - Site Hom...
Why Agile? - J.D. Meier"s Blog - Site Home - MSDN Blogs
Easy way to install Telnet on Windows Server 2012 - Michael Pedersen"s Blog - Si...
PowerShell Snippets Pt. 2 - Michael Pedersen"s Blog - Site Home - MSDN Blogs
Sleuthing a BSOD - Jim Blizzard"s Blog - Site Home - MSDN Blogs
How to Remotely PXE Boot a Computer - DeployHappiness
Introducing nagios-herald « Code as Craft
organic fertilizer: excel: my first use of power query (and i love it)
just
Data compare between tables in SQL Server - MS-Tech learning with Prasant - Site...
Using PowerShell to Get a List of Groups from Active Directory - The Blog of Tod...
Using PowerShell to Set Properties on a List of Groups - The Blog of Todd
Automatic: An Auto Accessory to Make You a Smarter Driver
Edyn: Welcome to the connected garden. by Edyn — Kickstarter
How LEDs are Made - Learn.SFE
DNS Records that are required for proper functionality of Active Directory - ser...
Friday Fun with Formatting through PowerShell
Update on the Service Pack plans for SQL Server 2008 and SQL Server 2008 R2. - M...
The database principal owns a schema in the database, and cannot be dropped | Ba...
Crib Notes on the 6 Best Personal Finance TED Talks
Erik A. Dewey
Meet Google Keep – Save your thoughts, wherever you are – Keep – Google
Blosc
PowerShell Reminder Jobs
Configuring Internet explorer using Group policy preferences | System Admins
How To Turn Your Raspberry Pi Into An Always-On Downloading Megalith
HOW TO CONFIGURE A PROXY SERVER URL AND PORT USING GPP REGISTRY ? - We know IE! ...
Aligning Skills with Real World Business Benefits - Microsoft MVP Mentor Blog - ...
Thanks, Emily! My $0.02 US (unadjusted) on security. - Reed Me - Site Home - MSD...
Waterfall to Agile - J.D. Meier"s Blog - Site Home - MSDN Blogs
SSD Over-provisioning using hdparm - Thomas Krenn Wiki
Breaking Down TempDB Contention - SQLServerCentral
» Linuxaria – Everything about GNU/Linux and Open source How to verify DDOS atta...
Using Netsh Commands for Wi-Fi Management in Windows 8
InfoSec Handlers Diary Blog - De-Clouding your Life: Things that should not go i...
Oak Home Page
How to make spreadsheets in a Linux terminal - Linux FAQ
Articles
Getting started with node.js — mattwhite.me
How to record and replay a terminal session on Linux - Linux FAQ
Webfwlog Firewall Log Analyzer
Satsky.spb.ru: codimension - home page
How to approve the use of open source on the job | Opensource.com
SciPY for Scientists | Linux Journal
Optimize website unit testing with phpUnit
Docker Re-Imagines Server Virtualization
Monitoring pfsense with Logstash / Elasticsearch / Kibana » Raging Computer
Bash Getopts - Scripts with Command Line Options : Tux Tweaks
Docker: Lightweight Linux Containers for Consistent Development and Deployment |...
RegExr: Learn, Build, & Test RegEx
Siege Your Servers! | Linux Journal
Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux | blackMORE ...
Logstash / Elasticsearch / Kibana for Windows Event Logs » Raging Computer
» Linuxaria – Everything about GNU/Linux and Open source Linux Terminal: Dstat m...
How to manage ip addresses and subnets with phpIPAM - Linux FAQ
PiCore 5.3 Linux is a 25MB operating system for the Raspberry Pi - Liliputing
Raspberry Pi
SubnettingPractice.com
Subnetting Reference Sheet
phpIPAM IP address management | Open-source IP address management
Kendal Van Dyke: Discover, Diagnose, and Document ALL Your SQL Servers On Your C...
Kendal Van Dyke: T-SQL Tuesday #39 - Use PowerShell To Copy A Database To Anothe...
Seiko Epson announces the smallest label printer for Android devices | Android C...
gQuigs" View: Bad Memory HowTo
SQL Power Doc - Home
4 Key Elements of a Killer LinkedIn Summary | The Muse
Creating a DSC Configuration Template
DSC Resource Snippets
Microwave Mason Jar Pancakes
Crustless Mini Quiches Recipe | Epicurious.com
my favorite snacks : packable fruit and yogurt parfait « Food « back to her root...
Ghost "Rows" Buster in SQL Server - TechNet Articles - United States (English) -...
Cool free tool to parse and analyze SQLIO results - Paul S. Randal
Using diskpart and wmic to check disk partition alignment - Paul S. Randal
Recommended Reading List for Young Investors — My Money Blog
Updated – Automating & Charting SQLIO Using PowerShell | Sunit Joshi"s Blog
Kendal Van Dyke: Disk Performance Hands On: Series Introduction
Analog Synthesis: The life and legacy of Bob Moog
Inventor Legends: Edmund McIlhenny - Business Opportunities Weblog
Edmund McIlhenny
200 Best Entrepreneurship Quotes Ever - Business Opportunities Weblog
What you need to know about net neutrality
Get Current Activity in SQL Server instance - Mohamed Sharaf"s Blog - Site Home ...
Setting up an Internal PowerShellGet Repository - Windows PowerShell Blog - Site...
Free Tools for the SharePoint Mechanic Toolbox - Share Poignant - Site Home - MS...
Is SQL 2014 Buffer Pool Extension an Enterprise Edition only feature? - La bodeg...
Service Principal Name (SPN) checklist for Kerberos authentication with IIS 7.0/...
From the MVPs: SQL Server 2014 Performance Enhancements - Microsoft Press - Site...
www2.fireeye.com/rs/fireye/images/fireeye-real-world-assessment.pdf
organic fertilizer: managing local admin passwords
SQL Server 2014 Performance Enhancements - The Microsoft MVP Award Program Blog ...
Test Plan and Test Suite Customization with TFS2013 Update3 - Microsoft Applicat...
Intelligence - Site H...
15 Cheap Staple Dishes From Around the World
Home Repairs That Pay You Back When You Sell
In a connected world, the smartphone remains king — Tech News and Analysis
Internet of Things: Temperature Sensor - Secret Microsoft Communications - Site ...
ShareX - Take screenshots or screencasts, annotate, upload and share URL in clip...
Why tablets are failing miserably in higher education
SharePoint 2013 on SQL Server AlwaysOn, 2014 Edition - Build on SharePoint - Sit...
Practical guidance for TFVC and TFS on Azure IaaS - Microsoft Application Lifecy...
PowerShell: Clean Mailbox Delegates (update) - EMEA Developer Support for Messag...
Building True Multi-Subnet Windows Server Failover Clusters - Build on SharePoin...
10 Articles Every Programmer Must Read
Server Huggers And Henry T Ford"s Faster Horse
Dave Nielsen, creator of CloudCamp and posits that to be considered cloud, a service must be OSSM, standing for: On-demand,Self-service, Scalable and Measurable Weinman posits that cloud should be: Cloud - Common, Location independant, Online, Utility and onDemand.
RingCentral Cloud Phone System, Virtual PBX, Toll Free 800 Number
Migrating Team Foundation Server Databases - Microsoft Team Foundation Server se...
10 Incredible-but-True Facts About Eating Fruits and Vegetables
5 Amazing Online Cooking Shows That Teach You All the Skills You Need
Get — and Keep — Amazing Posture by Doing These 10 Stretches Today
Seth"s Blog: How to make money online
online
How To Marry The Right Girl: A Mathematical Solution : Krulwich Wonders... : NPR
how to collect data for troubleshooting SQL Servers via sqldiag - isilefe - Site...
Deploying Windows 7 VL with MAK (Multiple Access Keys) using MDT 2010 - The Depl...
How to Turn Your Black Thumb Green
Cleaning and Deleting Old Files with PowerShell - DeployHappiness
Cool Tool : FOCA – Network Intelligence Reconnaissance | . . TheSecurityBlogger ...
Deploying Windows 7 - Part 26: Managing Drivers – By Make and Model :: Windows 7...
I Broke I.T.!: Taming All Users Desktop and Start Menu Environment Variables in ...
List of Windows Snap-ins (.msc) and Applets (.cpl) | devdashnull.com
Deploying Windows 7/8 with Microsoft Deployment Toolkit (MDT) 2012 Update 1 and ...
Perspectives - Air Traffic Control System Failure & Complex System Testing
PowerShell - Configure Web Application use IIS in a NuGet Package - Michael Pede...
Update XML File using PowerShell - Sonam Rastogi Blogs - Site Home - MSDN Blogs
TFS and SharePoint - Jim Blizzard"s Blog - Site Home - MSDN Blogs
Bulk Backup and Restore at the tip of your finger - Developer hearted / Relation...
Career Rocket Fuel: Whether You"re A Millennial Or Eyeing Retirement, Here"s Wha...
Whirlpool File Checker finds new and changed files on NTFS drives
Citrus Lane - care packages for parents - baby and child products, parent tips, ...
CRM Reporting and SQL 2012 AlwaysOn Availability Groups – Better Together - The ...
PowerShell: Add/Remove multiple security groups on multiple windows servers - De...
SoftConstructors
MDT CustomSettings.ini Tips & Tricks | MDTGuy.WordPress.com
The pitfalls of Test-Driven Development « Otaku, Cedric"s blog
Load Balancing and ASP.NET - Scott Hanselman
ASP.NET and Load balancing. - CodeProject
NTFS Misreports Free Space (Part 3) - Ntdebugging Blog - Site Home - MSDN Blogs
Ntfs Misreporting Free Space (Part 2) - Ntdebugging Blog - Site Home - MSDN Blog...
NTFS Misreports Free Space? - Ntdebugging Blog - Site Home - MSDN Blogs
Are your disk partition offsets, RAID stripe sizes, and NTFS allocation units se...
Five SQL Server Settings to Change | Brent Ozar UnlimitedBrent Ozar Unlimited
10 Must-Do SQL Server 2012 Security Tasks | GreenSQL
How to add Active Directory user group as login in SQL Server - Stack Overflow
Accidental Collection Database Delete - How to Remove Collection?
SSW - Do you know how to delete a Team Project Collection? - Sydney"s Leading Cu...
Today in Entrepreneurial History: May 11 - Business Opportunities Weblog
User Profile Cleanup with Group Policy - DeployHappiness
AJATT | All Japanese All The Time | You don"t know a language, you live it. You ...
Do It Yourself NAS
Change the service accounts used by TFS, SQL, Reporting Services and SharePoint ...
How To Create An Image Of Your USB Drive
www.everything-microsoft.com
Employee Recognition & Engagement Software | Sparcet
Akemi"s Anime World: Anime Reviews and More
Three Tricks to Make Windows 8 Much Easier and Quicker to Use
Is it time to "Reset the Net"?
Tools for OSForensics - ImageUSB - Write an image to multiple USB Flash Drives
Automated Dump Collection Using Procdump - SGriffin"s MAPI Internals - Site Home...
An "internet middleman" calls out six ISPs for letting connections slow down
Keeping organizations secure in a post-Heartbleed world [Q&A]
2014 Verizon Data Breach Investigations Report (DBIR) | Verizon Enterprise Solut...
QuickVB - Home
SQL Server 2014 New Features - Zen and the Art of SQL Server Maintenance - Site ...
8 Ways to Get Noticed During a Job Search
Defcon 21: secret life of SIM cards | Dangerous Prototypes
SQL Server 2014 Updatable Columnstore Index - SQL Shep - Site Home - MSDN Blogs
Best Practices for CRL Checking on SharePoint Servers - Share Poignant - Site Ho...
New PowerShell Scripting Tools Released - The Deployment Guys - Site Home - Tech...
Build Your Own Weather Dashboard In This Google Spreadsheet Master Class
What Is a Linux SWAP Partition, And What Does It Do?
5 PaaS anti-patterns - Programming - O"Reilly Media
Heartbleed"s lessons - O"Reilly Radar
Benchmark graphics card (GPU) performance on Linux with glmark
Scrot: A Command Line Tool to Take Desktop/Server Screenshots Automatically in L...
The above Cron entry will run every ‘1‘ minute and take screen shots and store them under ‘/media/tecmint‘ directory with filename as date and time. After running script for 1 minute, this is what I found in my ‘tecmint’ directory. Automatic Screen shots Reference Links http://linuxbrit.co.uk/software/ Bio Latest Posts Shambhu Singh I am an Linux sever and Desktop Administrator with over than 4 years of Linux experience. I love Linux and I am actually really interested in the many Linux distributors like Ubuntu, Mint, Fedora, BOSS etc. Linux Services & Free WordPress Setup Our post is simply ‘DIY’ aka ‘Do It Yourself, still you may find difficulties and want us to help you out. We offer wide range of Linux and Web Hosting Solutions at fair minimum rates. Please submit your orders by Clicking Here. 5 inShare Leave a Comment « PREVIOUS POST EasyTAG: A Simple Tag Creator and Editor for Audio and Video Files NEXT POST » Related Post(s): Which Career to Choose: Programmer Vs Adminis
SharePoint 2013: Creating a Development Environment - TechNet Articles - United ...
SQL Server 2014 Managed Lock Priority for Partition Switch and Online Reindex - ...
Seth"s Blog: Get rich (quick)
ZTISetTargetDiskFromHint.wsf – Example script to find Disk Target. | Keith"s Con...
The Secrets of History"s Most Successful Savers
First hands on using SQL Server 2014 - MS-Tech learning with Prasant - Site Home...
SQL 2014 Standard Edition Improvements - SQL Shep - Site Home - MSDN Blogs
Google"s Larry Page: The co-founder"s untold story.
Page eventually wrote down his rules for management: Don"t delegate: Do everything you can yourself to make things go faster. Don"t get in the way if you"re not adding value. Let the people actually doing the work talk to each other while you go do something else. Don"t be a bureaucrat. Ideas are more important than age. Just because someone is junior doesn"t mean they don"t deserve respect and cooperation. The worst thing you can do is stop someone from doing something by saying, "No. Period." If you say no, you have to help them find a better way to get it done.
Cling | ROOT
check_mk magic dust for ignoring stuff ;) | deranfangvomen.de
cisco - ARP broadcast flooding network and high cpu usage - Server Fault
Migrate a content database from SharePoint 2007 to 2010 « Aryan Nava
Securosis Blog | Understanding Role Based Access Control: Advanced Concepts
Interview with David Wheeler on open source in government | opensource.com
David A. Wheeler"s Personal Home Page
@JKevinParker: Calculate the Number of Connections Between Objects
How to tell which Service Pack 1 you have installed on SharePoint 2013 - Todd Kl...
Remove Windows SP1 Backups To Free Up Disk Space - By Ulrich Krause - eknori.de
dism /online /cleanup-image /spsuperseded
It’s Time to Encrypt the Entire Internet | Enterprise | WIRED
Capture screenshot or record screen video (with voice) and upload it with single...
Truncate SharePoint Log Files for All the database in SQL Server « Aryan Nava
Where in I install graylog2 as a linux newb | Michael Ellerbeck
Test Subnet with PowerShell
.NET Native Performance - .NET Blog - Site Home - MSDN Blogs
After Heartbleed -- what has the vulnerability taught us?
Teaching, Playing, and Programming: Ten Years of Purely Functional Data Structur...
Types and Programming Languages
Types and Programming Languages
How to Change a User"s Active Directory Password with PowerShell - Hey, Scriptin...
Reset a user password with PowerShell - 4sysops
LazyWinAdmin: [UPDATE] PowerShell - Monitor and Report Active Directory Group Me...
Command-Line Cloud: gcalcli | Linux Journal
How I Came to Write D | Dr Dobb"s
Microsoft Script Explorer: Next Steps - Windows PowerShell Blog - Site Home - MS...
Birth of Virgin Atlantic | Ravi-TheSun
Remove All but Most Recent PowerShell job
Importance of Primary Host Controller in SharePoint Search 2013 - SharePoint Esc...
17 Techy Travel Tips for Globetrotting Freelancers
Compare Best: Credit Cards | Car Insurance | CD Rates | Savings | Brokerages | M...
wyupdate - Free, open-source updater for Windows programs. wyUpdate applies patc...
font-infography.jpg (1200×722)
OpenStego - Home
5 things to do if you’re going to keep using Windows XP after April 8, 2014 | Sa...
Samsung data center fire causes outage, errors on smart TVs and phones (update: ...
Microsoft to Build New $1.1 Billion Data Center in Iowa | Data Center Knowledge
State of SharePoint Statistics | SharePoint Dragons
BBC News - The spooky world of the "numbers stations"
"It is an old-fashioned means of communication but you have to think of security."
Regular expressions guide | Linux User
Download: .Net Universe 2013 Poster - Le Café Central de DeVa - Site Home - MSDN...
Using SSIS to Backup and Restore Extremely Large OLAP Databases - JohnDesch - Si...
Comparing Hash of downloaded Files with PowerShell - Shawn Cicoria - Site Home -...
Save Encrypted Passwords to Disk with PowerShell - Todd Klindt"s SharePoint Admi...
Migrate data from CSV to SharePoint List – PowerShell | SharePoint Rider
Untitled Document
How to download and install the Windows 8.1 ISO -- using a Windows 8 or 8.1 key
New White-Paper on SQL Server 2014 and Azure Blob storage integration - Rumors a...
Why you should consider cloud as your Datacenter - Wriju"s BLOG - Site Home - MS...
Love the package software visualization
Freeplane | Free software downloads at SourceForge.net
Hddb File Search
even
Garage Floor Coatings Upstate South Carolina
Secure Ideas: Professionally Evil!: Professionally Evil Toolkit - Recon-ng
The Penetration Testing Execution Standard
OllyDbg v1.10
PyInstaller
aptly - Debian repository management tool
licensed
InstalledDriversList - Shows the installed drivers list on Windows operating sys...
FrontPage - py2exe.org
Null-modem emulator | Free System Administration software downloads at SourceFor...
Programme - linux.conf.au 2014 Systems Administration Miniconf
RatticDB
SyScan 2014
Monitor SharePoint Content Database Size « Aryan Nava
Think You Know How To Cook Eggs? Chances Are You"re Doing It Wrong : The Salt : ...
DNSSEC Part II: the Implementation | Linux Journal
Commodore Pi
Cooking for Beginners: 10 Recipes for Kitchen Newbies
10 Easy Exotic Meals You Should Be Making
SQL Server 2014: TEMPDB Hidden Performance Gem - CSS SQL Server Engineers - Site...
Walkthrough – Upgrading TFS 2013 RTM to TFS 2013 Update 2 (RTM) - Microsoft Team...
Hello, Chromebook!
Qualys SSL Labs - Projects / SSL Server Test
Heroes of Hardware Revolution: Bob Widlar
Heartbleed Bug
Building an Enterprise Cloud Strategy - Architecture @ Microsoft - Site Home - M...
How to Upload Files to SharePoint 2013 with PowerShell - Todd Klindt"s SharePoin...
SharePoint warmup script « Aryan Nava
The Field Guide to Data Science « Aryan Nava
Raspberry Pi Compute Module: new product! | Raspberry Pi
SharePoint doesn’t accept the Universal security Groups for granting permissions...
Chocolatey Gallery
Matt Wrock"s Blog | Released Boxstarter v2.4: Test Runner for Chocolatey Package...
PowerPoint and Excel: Perfect Partners for Dynamic Tables and Dashboards - The M...
Security baselines for Windows 8.1, Windows Server 2012 R2 and Internet Explorer...
Crunchyroll - Watch Naruto Shippuden, Bleach, Anime Videos and Episodes Free Onl...
Setting Up Wireless Networking on Your Raspberry Pi
Lurch | The word processor that can check your math
Installing Vagrant on Windows 7 and 8 « Aryan Nava
InfoSec Handlers Diary Blog - "Power Worm" PowerShell based Malware
3 topologies driving IoT networking standards - Programming - O"Reilly Media
Opening Minds to the Spheres Among Us | Linux Journal
CIO Engage: Drag-and-Drop Cloud Orchestration w... | CSC Engage Public Community
18 commands to monitor network bandwidth on Linux server
TechNet Data Collector Set for SharePoint back-end: SQL Server
Big Data – From Descriptive to Prescriptive « Aryan Nava
NoSQL Databases Family « Aryan Nava
Customizing SharePoint 2013 global navigation « Aryan Nava
35 Grocery Items You Should Make at Home (and 5 to Buy)
4 Keys to User-Friendly Cyber Security - Business Opportunities Weblog
Windows Server 2012 R2 is Generally Available for NetWeaver Applications April 2...
Some misconceptions about uninstalling SQL Server 2008 (and SQL Server 2008 R2) ...
General best practices for performance (Windows)
SharePoint 2013 - User identity pass-through delegation does not work with BCS a...
TFS 2013.2 (Update 2) Released - Brian Harry"s blog - Site Home - MSDN Blogs
SharePoint Topology add-in for Visio - Chris Hopkins" Blog - #makinitdostuff - S...
v6 only Puppet master (on Debian Wheezy) | Jens" BLOG
Creating KPI dashboards by connecting Visio to a SharePoint List
Lingua.ly
Making a Business Case for SharePoint 2013 - SharePoint from the Trenches - Site...
Scripts to dump installed drivers and applications | Keith"s Consulting Blog
SharePoint Web Apps versus Site Collections - SharePoint from the Trenches - Sit...
SQL Server 2014’s new cardinality estimator (Part 1) - CSS SQL Server Engineers ...
Securing Windows XP After April 2014 - Build on SharePoint - Site Home - MSDN Bl...
Red Ventures - Customer Acquisition Marketing, Charlotte, NC
Summary — Possum 0.5.0
Big Data Architect, Requirements and Responsibilities « Aryan Nava
How to find SQL Server configuration files « Aryan Nava
PowerShell Script to Query UserAccountControl Flags - Obscurum per Obscurius - S...
MongoDB Cheat Sheet – Quick Reference Guide « Aryan Nava
The Log File Navigator
WebApplicationProxy and SharePoint 2013: "Internet Explorer cannot display the w...
Command line options available to uninstall Internet Explorer - We know IE! - Si...
Create Event Log Sources using PowerShell - Ken O" Bonn - Site Home - MSDN Blogs
Mobile Computer Repair Greenville SC | Total CTRL IT
SelfADSI : The ADSI Scripting Tutorial / The LDAP Scripting Tutorial
Phishing Security Test | KnowBe4
Friday Fun: Create All PowerShell Profile Scripts
terran computational calendar
More Fun with String Properties
LVM, Demystified | Linux Journal
Get Rid of Orphaned Content Types in SharePoint 2013 « Aryan Nava
mortar-public-site-content.s3-website-us-east-1.amazonaws.com/Mortar-Pig-Cheat-S...
Free eBooks on Hadoop! « Aryan Nava
DailyTech - New Encryption System "Mylar" Encrypts Data in Browser Before Reachi...
Life Lessons That Kids Teach Us
The 5 Commandments for Saving Time and Reducing Stress - by Dumb Little Man
Best practices for installing TFS updates - Microsoft Team Foundation Server set...
PowerShell –EncodedCommand and Round-Trips - Lessons Learned - Site Home - MSDN ...
7 steps to bringing your organisation into the cloud - Microsoft UK Government B...
Changes in Ribbon UI for SharePoint 2013 - SharePoint Escalation Services Team B...
Learned something new on IIS Compression - Darren Liu"s Dynamics Blog - Site Hom...
PowerShell for N00bs: Libraries, Paths, and You - Lessons Learned - Site Home - ...
Git for Team Foundation Developers–Branches - Kirk Evans Blog - Site Home - MSDN...
MSDN Blogs
Expect Automation Examples
Dumb Grammar Mistakes You Shouldn"t Make, But Probably Do
PC to Portable workstation/toolbox
Cool Tools – Quick Door Hanger Brackets
Convert a String to a PowerShell Property Name
Managing Internet Explorer Trusted Sites with Group Policy - DeployHappiness
Stefan Goßner - Site Home - TechNet Blogs
Swagger: A simple, open standard for describing REST APIs with JSON | Reverb for...
An important fix for SharePoint Foundation 2013 SP1 has just been released - Ste...
The Data Science Laboratory Series is Complete - Carpe Datum - Site Home - MSDN ...
Description of the SharePoint Foundation 2013 update 2760625: March 20, 2014
SQL Server 2014 and SharePoint supportability - Ron Grzywacz"s Blog - Site Home ...
SQL Server 2014 Columnstore Indexes: The Big Deck - Jimmy May, Aspiring Geek: SQ...
7 Days of Agile Results: A Time Management Boot Camp for Productivity on Fire - ...
Links to deployment guides for all versions of the .NET Framework - Aaron Stebne...
SharePoint 2013 noderunner.exe process information - Kristopher Loranger - Site ...
Scripting Best Practices, or Write-Host Considered Harmful - Lessons Learned - S...
SQL Server Data Tools for SQL Server 2014 is available - SQL Server Data Tools T...
Keybase Wants To Bring Encryption To The Masses. Here"s How.
iCalendar Validation
A non-commercial service in support of responsible home heating with wood - wood...
hostsController: Download | VanceLanceDance
Trace Spy - Download: TraceSpy.exe V2.0.0.0
Deep Dive into SharePoint Topologies and Server Architecture for Sh...
karlseguin/the-little-mongodb-book
openmymind.net/mongodb.pdf
SharePoint, Office365 & Yammer Nuggets of weeks 11 & 12 - Ragnar Heil: SharePoin...
DIY CNC Dust Collection Really Sucks!
A Brief History of BASIC - Small Basic - Site Home - MSDN Blogs
How DNS works - Linux FAQ
Hadoop Interview Questions for Newcomers « Aryan Nava
What’s New in SQL Server 2014 « Aryan Nava
Using VSAN With Storage Arrays - Chuck"s Blog
Troubleshooting Claims to Windows NT Token Service (c2WTS) in SharePoint 2010 ma...
Verifying whether the broken piece is c2WTS or Active Directory - Rodney Viana"s...
Wizard Wall Home
SharePoint Conference 2014 Videos & Slides « Aryan Nava
Understanding Information Architecture by Peter Morville on Prezi
Transform a SharePoint Web Part Zone into jQuery Tabs « Aryan Nava
VSAN - The Unspoken Truth | Technodrone
Distributed Cache Service In SharePoint 2013 | Richard Skinner
Document Libraries FAQ - Visual Studio LightSwitch Team Blog - Site Home - MSDN ...
Paradigm Check Point: Prefacing Debriefings | Kitchen Soap
Too many files causing RAM pressure? (a.k.a. DynCache to the rescue!) - Esoteric...
RAM
SharePoint 2013 Distributed Cache (AppFabric) Troubleshooting - Build on SharePo...
SQL Server 2014 Will Release April 1, 2014!! | Jason Volpe"s Blog
SharePoint 2013 SP1 FAQ (updated) - Stefan Goßner - Site Home - TechNet Blogs
How to store the SQLBPA recommendations in a SQL database to make more use out o...
Upgrading an Existing SharePoint 2013 Farm to Windows Server 2012 R2 - Build on ...
OpenFL - Creative expression for desktop, mobile, web and console platforms
Using RANCID/clogin to run commands on multiple devices
Statistical Proof of Lifestyle Inflation! — My Money Blog
Home | Ytria - Essential tools for IBM Notes and Domino administration and devel...
Index of /presentations
SQL Swiss Army Knife #13 – Exploring the plan cache – Part 2 - Blog do Ezequiel ...
Verify a success of database backups | Basit"s SQL Server Tips
Windows 8 | 7 Tips, Tricks, Help, Support, Downloads, Features
Response: Clear Sans - Free and Open Font For Your Diagrams - EtherealMind
Clear Sans | 01.org
Upgrading local Lotus Notes templates
I Love Lotus Notes
Lotus Guru :: Best Notes Templates for Newbies
Living Wage Calculator - Introduction to the Living Wage Calculator
28 facts about pi that you probably didn"t know - Network World
The death of agile? - Reed Me - Site Home - MSDN Blogs
Disk Partition Alignment for Windows Server 2012, SQL Server 2012, and SQL Serve...
Friday Fun: Find File Locking Process with PowerShell
Simple 6x USB charger with current monitor | Dangerous Prototypes
UPX: the Ultimate Packer for eXecutables - Homepage
Samuel Murray"s page of AutoIt scripts
Bandwidth: a memory bandwidth benchmark for x86 / x86_64 based Linux/Windows/Mac...
5 reasons foreigners find it hard to become friends with Japanese people ‹ Japan...
Useful IE Keyboard Shortcuts for Tabs - mschray - Site Home - MSDN Blogs
pfSense Remote syslogging over Linux | A Developer"s Life
Pocket Survival Guide - EMC Celerra
Replicant project
HowTo: Setup SSH Keys on a Linux / Unix System
Multi Site Clusters for SAP on SQL Systems: Recommendations & FAQ - Running SAP ...
Martin Melchior"s homepage: Give your old phone chargers a second life
This Interview Technique Will Get You Hired
Installing SharePoint 2013 SP1 on Windows Server 2012 R2 | Richard Skinner
March release of EWSEditor 1.9.0.22503 - Updated for Exchange 2013 SP1. - Dan"s ...
The 10 Things Everyone Should Be Saving For
10 No-Sweat Workouts Perfect for the Workplace
PowerShell.org | Resources and Q&A for PowerShell People
RST Fiber Optic Network
Restore Database from a UNC path – Why SSMS doesn’t show network drives/paths in...
Protected Networks in Windows Server 2012 R2 - Ben Armstrong - Site Home - MSDN ...
sp_updatestats Is Not Smart | Home Of The Scary DBA
Download Windows 8.1 User Readiness Toolkit from Official Microsoft Download Cen...
CredLocker – Storing PSCredentials to File - Lessons Learned - Site Home - MSDN ...
SQL Server backup history and restore history - Brad Chen"s SQL Server Blog - Si...
www.cs.bham.ac.uk/~udr/papers/EssenceOfReynolds.pdf
TrustedSec - Information Security Made SimpleTrustedSec
I2P Anonymous Network
Searching GPOs for that Specific Setting - DeployHappiness
Error code 0x800F0906 | System Admins
jimdigriz/catnip
TreeLine - News
Gitblit
Securosis Blog | Advanced Endpoint and Server Protection: Detection/Investigatio...
Interesting facts about Raspberry Pi - Linux FAQ
Electronic-Lab in a Box
Brian Z"s Awesome Blog: Mobile Electronics Workbench
Install uGet Download Manager 1.10.4 in Debian, Ubuntu, Linux Mint and Fedora
Copying SQL Server Backups to Windows Azure Storage using AzCopy - David Browne"...
Windows Azure – 101 Stuff and a mention of our TFS on Azure IaaS POC - Willy"s R...
Aegisub Advanced Subtitle Editor
MAXMALI.COM | ripper – the different CNC
The mystery of the Zombie RAM | josh.com
March 2014 Update - Visual Studio Online "Monaco" - Site Home - MSDN Blogs
A concrete approach to learning how to program - Programming - O"Reilly Media
Using Django and MongoDB to Build a Blog | Linux Journal
Manage SharePoint incremental crawl index deletion | SharePoint Rider
Discovering SharePoint: From Novice to IT Pro
Choosing the right SQL Server 2012 Edition for BizTalk Server 2013 - feseca - Si...
Cool Tools – Wiring Complete
Low-Protein Diet May Extend Lifespan | Science/AAAS | News
PowerShell Automation from .Net - EMEA Developer Support for Messaging Team Blog...
PowerShell Script to Limit SharePoint Site Templates Available
In The Next Version - Microsoft Announces Office Graph - Connecting People And C...
AD FS Configuration – SSL certificate must be from a public certificate authorit...
SharePoint AD Failover Review - Build on SharePoint - Site Home - MSDN Blogs
9 (relatively) cheap superfoods
Calculate Heat by solving for Thermal Resistance and Power Dissipation
Setting the Default Logon Background with Bing Images and Group Policy - DeployH...
What version of SQL am I currently running? - VSALM - Site Home - MSDN Blogs
sp_reset_connection – Rate Usage (Don’t fight over the grapes) - CSS SQL Server ...
Internet Explorer Maintenance go away when IE 10 is installed | System Admins
Visualizing Wal-mart - The ShiSh List - Site Home - MSDN Blogs
www.econ.umn.edu/~holmes/papers/ecta7699.pdf
D"Bug"s Life: Desktop Air Conditioning
checking the status of SQL services and databases on multiserver environment - i...
how to find long-running queries and send as an email - isilefe - Site Home - MS...
Managing SQL Servers in multi-server environment via Central Management Server, ...
Managing SQL Servers in multi-server environment via Central Management Server, ...
Managing SQL Servers in multi-server environment via Central Management Server, ...
Managing SQL Servers in multi-server environment via Central Management Server, ...
PowerShell Script Switches Printer Configurations Between Sites | sepago
Elasticsearch.org Kibana | Overview | Elasticsearch
Graylog2 - Open source log management and data analytics
OSSEC, the free and open source IDS | Doug Vitale Tech Blog
How to use KVM from the command line on Debian or Ubuntu - Linux FAQ
Video Contact Sheet *NIX
PowerShell Snippet: Store Login Information Secure in PowerShell using Windows S...
Find and Replace Text with PowerShell
SharePoint 2013 – Your Apps Stuck Loading | Richard Skinner
Setting Up an Awesome SharePoint 2013 Dev Box on Windows Server 2012 R2 - Build ...
How to change SharePoint 2013 application pool account. - Denotation - Site Home...
The Sweethome
iOS 7 has dangerous keylogging vulnerability
AD Replication Status Tool is Live - Ask the Directory Services Team - Site Home...
SharePoint 2013 Mysite creation error: User cannot be found. - Ron Grzywacz"s Bl...
The first Tor Trojan for Android - Securelist
Securosis Blog | Research Revisited: The Data Breach Triangle
DNSSEC Part I: the Concepts | Linux Journal
25 Easy Ways to Make Cheap Cuts of Meat Taste Expensive
Tracking TEMPDB internal object space usage in SQL 2012 - Esoteric - Site Home -...
Giles Bowkett: Towelie Keeps Your Code DRY
ViPR Software Download
The six types of Twitter conversations « Aryan Nava
EDI - Electronic Data Interchange | [The Integration Engineer]
The Evolution of Data Storage
Rebuild all indexes on all tables in the SQL Server database | Basit"s SQL Serve...
How to (semi-)automate JavaScript refactoring - Programming - O"Reilly Media
Recruit Better Data Analysts « Aryan Nava
SysAdmins Should Program — Steven Murawski
axCut: An Open Source Laser Cutter
Gimphelp homepage
Convenience Always Trumps Security | The Many Faces of Mike McBride
Add Logon As Service Right with PowerShell
SQL Agent skipping Scheduled job runs!!– But the Job History does not reveal any...
Automating SQL Service Account/Password Changes - Tim"s blog - Site Home - MSDN ...
Friday Fun: The Measure of a Folder
Hekasoft - Hekasoft Backup & Restore
Philip Flint » Blog Archive » Listing group membership and extracting into a CSV...
Mead Recipes
6.5 gallon GLA
Reducing Domain Sharding « Code as Craft
How do I disable SSL 2.0 in Windows Server? | The Nubby Admin
PeeringDB
25 Simple Recipes for 25 Delicious Veggies
Cogi Voice Recorder: Save All of The Highlights, None of The Noise
Community Tools | CrowdStrike
[Howto] First Steps With Ansible | /home/liquidat – Open Source, Linux and Busin...
Automatically Name Datastores in vSphere? | vNinja.net
OpenKnit | open source knitting
Jerry Nixon @ Work: 15 Easy Ways to Screw Up Your Next User Group Talk. And, a l...
Crossware Mail Signature | Email Signature Software for Exchange & Domino
GaijinPot
How to Setup OMD in 1 Hour | IT on Demand
uberAgent for Splunk • Windows Monitoring • Logon Times and Much More
OCW Bookshelf | Open Matters
15 Reasons You Should Eat More Chocolate
virtuallyGhetto: vdq - A useful little VSAN utility
New functionality in SQL Server 2014 – Part 5 – Backup/Restore Enhancements - Ru...
3 Great Tips for Real-World MSI Packaging - DeployHappiness
Pinning Programs to the Taskbar with Group Policy - DeployHappiness
Friday Fun: The Measure of a File
Finding Disk Hogs (i.e. Large Folders) - Lessons Learned - Site Home - MSDN Blog...
Removing Duplicate Computers From Your MDT Database - DeployHappiness
Today in Entrepreneurial History: February 12 - Business Opportunities Weblog
Automated Material Handling Order Fulfillment System — Kiva Systems
Cheap, Resourceful DIY Mini CNC Router/Mill Contraption
Installing and Building Docker With Ansible | The Ansible Blog
WebPagetest - Website Performance and Optimization Test
Roger Tomlinson | UCGIS
TFS Client Tools - VSALM - Site Home - MSDN Blogs
Should I Remove It?
IBM Notes and Domino 9.0 Social Edition Forum - Notes 9 Basic: Nomad installatio...
I solved the problem for the time being in the following ways: 1. Setup / a / v "NOMAD=1 TARGETDIR=H:\ /qb+" 2. Create a directory --> H:\program files\IBM\Lotus 3. copy including subdirectories --> From "H:\program files\IBM\Notes" To "H:\program files\IBM\Lotus" 4. Execution of the program --> H:\autorun.exe Please try!
What if the annoyances of conference calls happened in real-life meetings. Painf...
5 Infographics to Teach You How to Easily Create Infographics in PowerPoint [ TE...
www.av-comparatives.org/wp-content/uploads/2013/11/avc_rem_201311_en.pdf
How can you get an incomplete ARP?
Free & Public DNS Server List (Updated February 2014)
Understanding and mitigating NTP-based DDoS attacks | CloudFlare Blog
Packets are not being forwarded due to incomplete entries in the ARP table - Cis...
https://s3.amazonaws.com/cah/HouseOfCardsPack.pdf
SharePoint 2013 Adding Server to the Farm: Fast Growing Log Files - Koen Vosters...
Step by Step Teachers Guide to Using Miracast in the Classroom - FE blog - Site ...
Windows Server 2012 R2 Products and Editions Comparison - The blog of Rob Margel...
The TTY demystified
How can I restore all my Tfs Databases from script - VSALM - Site Home - MSDN Bl...
The Alphabet, For Geeks
APIdoc | Point.io
New functionality in SQL Server 2014 – Part5 - In-Memory OLTP - Running SAP Appl...
pgBadger :: PostgreSQL log analyzer
PHP-Calendar
Zorka Monitoring Agent - Zorka Monitoring Agent
BlueWho - Choose language / Scegli la lingua
gExtractWinIcons - Choose language / Scegli la lingua
pshep/ANUBIS
Installing FreeNAS to USB stick (new and simpler way) - CodeProject
When Will My ext Filesystem be Checked Next? | The Nubby Admin
Freenas 9.2.0 with Transmission and Couchpotato/Sickbeard as a DLNA-Server
virtuallyGhetto: Quick Tip: How to quickly find the release & build number on VC...
virtuallyGhetto: How to automate NTP configurations on the VCSA using the CLI
Adding BIOS Updates to Your Imaging Process - DeployHappiness
ArduSat - Your Arduino Experiment in Space by ppl4world — Kickstarter
Fluke 196B Handheld ScopeMeter repair | Dangerous Prototypes
DevOps Distills To... — Steven Murawski
SQL Server 2012 SP1 PowerPivot For SharePoint 2013 Setup Error | Richard Skinner
Optimizing Performance with automatic Proxyconfiguration scripts (PAC) - We know...
Need more DSC Resources? Announcing DSC Resource Kit Wave 2 - Windows PowerShell...
How to analyse IIS logs using LogParser / LogParser Studio - Blog de l"équipe su...
Main Page
The FreeBSD Forums • View topic - FreeBSD vs. Linux: 10 points of superiority (i...
FreeNAS 9.1 - LZ4 Compression
SQL Server Performance Tuning Tips
Identify SQL Servers with inefficient power plans using Policy Based Management
SQL Server 2005/2008/2012 Setup ChecklistBrent Ozar Unlimited
sp_Blitz™: Free SQL Server Health Check Script by Brent OzarBrent Ozar Unlimited
sp_BlitzIndex™ - SQL Server"s Index Sanity TestBrent Ozar Unlimited
Finding pi: Enterprises must dump their legacy ideas and search for radical inno...
Collin’s Lab: Multimeters « adafruit industries blog
Things About ZFS That Nobody Told You | Nex7.com
napp-it.org
bandwidthd.sourceforge.net
@JKevinParker: Discovering SharePoint Content Types and Columns with PowerShell
SisIYA Homepage
Dexterity
Dexterity: Continuous Integration Presentation - Part 2
Dexterity: Continuous Integration Presentation - Part 1
Dexterity: Raspberry Pi CD-ROM Case
What is in the ISA? | [The Integration Engineer]
fulldecent/cameralife
Rapid PHP Deployment for IIS using a Batch File - Robert McMurray"s Blog [MSFT] ...
Home Fileserver: Backups from ZFS snapshots
What happens next? SQL with Windows login / multiple groups… - Esoteric - Site H...
joesdatacenter.com
OpenIoT project | Open Source Solution for the Internet of Things into the Cloud
Iris - mail server integration package
12 Useful Terminal Emulators for Linux
VPN Capability OpenVPN - PFSenseDocs
FrontPage
Statistical computing and graphics begin with R
CityState » Blog Archive » Using acs.R to create choropleth maps
The choroplethr package for R | tech design blog
TeamLab Server Community Version - TeamLab Office
Raspberry Pi: Extending the life of the SD card | ZDNet
Which is best Workflows OR Event Receivers? | SharePoint Rider
ZFS on a USB Disk (removable Media) - blog"o thnet
25 Essential Tricks for Quick and Easy Cleaning
How to winterize your home
virtuallyGhetto: How to restart the ESXi management network via command-line?
esxcfg-vmknic -D "Management Network";esxcfg-vmknic -e "Management Network"
ReInstall Applications Deployed Through Group Policy Software Installation - Dep...
Wordpress Security Esentials Videos | The Many Faces of Mike McBride
Day 7 of 7 Days of Agile Results–Saturday (Have Fun) - J.D. Meier"s Blog - Site ...
Day 6 of 7 Days of Agile Results – Friday (Friday Reflection) - J.D. Meier"s Blo...
SNMP Sweeping - Metasploit Unleashed
ESXi 5.0/GhettoVCB with NFS on FreeNAS 8.2
Ubiquiti UniFi 3.0 Enterprise Wi-Fi Platform Reviewed - SmallNetBuilder
[object Object]
netwerxs/zfs-geek-backup
ZFS saves the day(-ta)! (/var/crash/elowe)
around
Easy, Safe Backups with rsync and ZFS | compilingsheep
UniFi - VLAN switch configuration - Ubiquiti Networks Community
KXStudio
JScreenFix - Pixel Repair
ExifTool by Phil Harvey
SIDUS—the Solution for Extreme Deduplication of an Operating System | Linux Jour...
Google Map Gps Cell Phone Tracker - Browse Files at SourceForge.net
Lotus Notes to SharePoint Migration - Anything Microsoft... - Site Home - MSDN B...
Using PowerShell to edit MP3 tags - Todd Klindt"s SharePoint Admin Blog
Creating a manual VSAN Cluster with PowerCLI - Virtu-Al.Net
Day 5 of 7 Days of Agile Results – Thursday (Daily Outcomes) - J.D. Meier"s Blog...
GifCam | BahraniApps Blog
Imagenator - Home
Create, convert, rotate, secure, crop and generally tweak your PDFs with PDFFill...
Day 4 of 7 Days of Agile Results - Wednesday (Daily Outcomes) - J.D. Meier"s Blo...
How to Stop a MSI from Rebooting - DeployHappiness
PiHUB - Pimoroni
Paperless office? Screw it!
The 24-Hour SharePoint Conference - Home
GitHub"s Public Speaking Culture
Rule One of Management: First, Do No Harm - Chad Fowler
Douglas Adams" last post on his online forum was about excitement over Mac OS X ...
"I"ve come up with a set of rules that describe our reactions to technologies: 1. Anything that is in the world when you"re born is normal and ordinary and is just a natural part of the way the world works. 2. Anything that"s invented between when you"re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. 3. Anything invented after you"re thirty-five is against the natural order of things."
15 Packing Secrets From a Professional Traveler
Day 3 of 7 Days of Agile Results – Tuesday (Daily Outcomes) - J.D. Meier"s Blog ...
DIY FreeNAS based system | dablomatique
VS 2013.1 (Update 1) is available - Brian Harry"s blog - Site Home - MSDN Blogs
spark/thermostat
Best List of Remote SysAdmin / Devops Job Sites | The Nubby Admin
Open Broadcaster Software - Index
Avidemux - Main Page
AVFS - Avisynth Virtual File System
BeHappy - Home
Avisynth wiki
IBM Problem with deleting calendar entry without parent - United States
Notes Migration Projects | Notes SharePoint Blog
7 Days of Agile Results: Day 2 - Monday (Monday Vision) - J.D. Meier"s Blog - Si...
Go-Repairs Blog: DIY Freezing Kit
The Hulabye Diaper Changing Helper...Diaper changes with less wiggle and more gi...
SharePoint 2013 Existing Features GUID | System Admins
viziblr - News - Generating Auto-Incremented Version numbers with PowerShell
Team Foundation Server Usage at Microsoft - The Ultimate Visual Studio Tips and ...
bovine/datapipe
7 Days of Agile Results: Day 1 - Sunday (Getting Started) - J.D. Meier"s Blog - ...
Episode Listing of The Amp Hour Electronics Podcast! | The Amp Hour Electronics ...
Securosis Blog | Cloud Forensics 101
OCS Inventory NG | Home
Magic Smoke: $1 Lithium Coin Cell Charger
recommended
Restart Monitor Automatic Remote In - DeployHappiness
Deploy Windows - MyWiki
Research - MDT 2010 – Inside the Install Roles and Feature...
New functionality in SQL Server 2014 – Part 3 – Low Priority Wait - Running SAP ...
Subgraph Vega | Free and Open Source Web Application Vulnerability Scanner
Working with NIC Teaming in Windows Server 2012
New functionality in SQL Server 2014 – Part 2 – New Cardinality Estimation - Run...
That Target data breach and what it means for consumers
C drive space is using up on terminal server after upgrading to IE10 or IE11 - A...
Joget Workflow – Open Source Workflow Software and Business Process Management S...
How to use ADFS with SharePoint hosted apps in Sharepoint 2013 - SharePoint Esca...
Performing Management tasks using Cimcmdlets [3] – Operating System - Windows Ma...
MDT Scripting: Using VBScript Expressions in customsettings.ini file | Scriptimu...
A Look At ZTIGather Flow and The CustomSettings.INI File
MACAddress001
Computerphile: Learn The History, Hacks & Tech Behind Everyday Computing [Stuff ...
Preserving your privacy and anonymity with Tails | . . TheSecurityBlogger . . .
Perform These 7 Awesome Photoshop Tricks in GIMP
SQL Server 2014: Inside Hekaton Natively Compiled Stored Procedures - Rumors abo...
How to install SharePoint 2013 on Windows Server 2012 R2 | iouchkov
Nikujaga (meat and potato stew) Recipe
Randy Rempel"s Blog : Installing and Configuring SharePoint 2013: Part 4 of 4
Randy Rempel"s Blog : Installing and Configuring SQL Server 2012: Part 3 of 4
Randy Rempel"s Blog : Installing and Configuring the Windows Domain Controller: ...
Randy Rempel"s Blog : Installing and Configuring a Three-Server SharePoint 2013 ...
Top Support Solutions for Microsoft SQL Server - Top Solutions from Microsoft Su...
Doug Hemminger"s SharePoint Musings: Instruction Guide for Installing SQL Server...
Updates | SharePoint 2013 | cumulative updates, patches | TechNet
POV-Ray - The Persistence of Vision Raytracer
Oh!Soft(ohsoft.net) - Best Software Developer
Create a TS Variable in MDT 2012 to set Computer Name to macaddress
Research - Generate computer names in MDT 2012/2013 based ...
Segmentation Fault At Address 0xABAD1DEA
[CONF-32190] Bug in loremipsum macro, typo in sixth word - Atlassian JIRA
aiim.typepad.com/erin020 %282%29.pdf
What books should I read to learn better debugging skills? - Gunnar Kudrjavets -...
What data to collect from a SQL Server failover instance after a problem occurs ...
Research - Windows 8 Deployment - The specified path, file...
PowerShell Script to Enumerate SharePoint 2010 or 2013 Permissions and Active Di...
Weekend Scripter: Using PowerShell to Replace STSADM - Hey, Scripting Guy! Blog ...
Install and Configure MDT 2013 (Part 1) | Philip Flint
Install and Configure MDT 2013 (Part 5) | Philip Flint
Install and Configure MDT 2013 (Part 4) | Philip Flint
Install and Configure MDT 2013 (Part 3) | Philip Flint
Install and Configure MDT 2013 (Part 2) | Philip Flint
Documenting Group Policy Objects | Philip Flint
FAN « Fully Automated Nagios
Security Compliance Manager (SCM)
Installing and Configuring Microsoft Deployment Toolkit (MDT) 2013 on Windows Se...
Research - Adding Internet Explorer 11 to your Windows 7 S...
Deploy Windows 8.1 and Office 2013 with MDT 2013 and the ADK 8.1 | MDTGuy.WordPr...
The Netflix Tech Blog: S3mper: Consistency in the Cloud
How to check Internet speed from the command line on Linux - Linux FAQ
“Battling the growing wave of pred...
Custom. All Custom.
Network Diagrams: Choosing Better and Free Fonts — EtherealMind
TeamWin Projects - TWRP 2.6 - | TeamWin
HOW TO DO EVERYTHING
USDA Food Plans: Cost of Food Cost of Food at Home
Live from the Engadget CES Stage: the EFF"s Julie Samuels
Julie Samuels
Mooshim Engineering
Better Unit Testing with Microsoft Fakes – eBook update v1.2 posted - Willy"s Re...
Windows ODX test (Offloaded Data Transfers) - Shared technical tips from Emmanue...
Mayhem
Lziprecover - Data recovery tool and decompressor for lzipped files
LightProfiler
NETSHe Lab
Network Inventory Lookup Assistant – Freecode
.:: PCAPFiX ::. | REPAiR CORRUPTED PCAP FiLES
Using a RamDisk with Notes Client - By Ulrich Krause - eknori.de
Tools and utilities for Windows
k5n.us: WebCalendar Home Page
A Fast and Secure Web Proxy for Corporate Users | Wazi
StalkR"s Blog: SSH/HTTP(S) multiplexing with sshttp
Here come the Ultrabooks | Linux Journal
Hack and / - Forensics with Ext4 | Linux Journal
Computer Laboratory: Capsicum: practical capabilities for UNIX
Phatch - Photo Batch Processor
dsniff
Ten Things I Wish I Knew When Becoming A Linux Admin | Pinehead.tv
Avoiding Common WordPress Setup Mistakes | Wazi
In The Next Version - The Future Of Work Is Now
ISME - Welcome
GTV Hacker » Blog Archive » Root for Sony Google TV with Unsigned Kernels!
GTVhacker • View topic - NSX-GT1 and NSZ-GT1 exploit to run unsigned kernels!
SSH, the Secure Shell « Doug Vitale Tech Blog
Inspection News, home inspection Information, inspector, radon environmental
CommitMonitor
The Ultimate Steve Jobs Collection | Chill
Offer Your Online Graphical Job Resume To The World With ReVu
RepRap - RepRapWiki
Visiting the Ivory Tower « ipSpace.net by @ioshints
Being Good at IT Stuff
Why Becoming A CCIE Doesn’t Fix Being Inexperienced
How To Land Your First Job Herding Packets
Dare To Be Stupid
Fsck It, We’ll Do It All With SSDs! « The Data Center Overlords
Cloud Computing Infrastructure
Top 10 Security Assessment Tools - LINUX For You
LDAP/LazySysadmin - UCC Wiki
VDI Implementations – Reasons for Poor Projects and Steps to Success « The Virtu...
Tips and Tidbits About LDAP « UNIX Administratosphere
http://www.usbwifi.orconhosting.net.nz/
Teensy USB Development Board
memtester version 4
SSH session logging / recording » WPKG Blog » Blog Archive
Configuring Nagios Client on Debian | Platonic
Using Wii remote with Android Device- Taking Gaming to the Next Level | GooGeZ
Nmap « Doug Vitale Tech Blog
VPN Connection Issue via Verizon wireless broadband air card and Cisco VPN - Cis...
enterpriseios-ios-controller - Open Source iOS MDM solution - Google Project Hos...
GestioIP IPAM - IP address management | Free System Administration software down...
What"s My Heart Rate - Apps on Android Market
Home | Zen Load Balancer - Open source load balancer
G4L | Free Security & Utilities software downloads at SourceForge.net
DocFetcher - Fast Document Search
Roll Out New Clients with FOG’s Advanced Disk Imaging | Wazi
#602271 - netdisco-common: netdisco fails with call to SNMP::Info::_global_layer...
Van Gogh"s Starry Night modded into beautiful interactive light and sound show (...
DS Scheduler | Solar1.net
Disk Drill – Freecode
CrystalDiskMark - Software - Crystal Dew World
ThinkWiki
Windows Scripts and Downloads
HydraIRC [Main Site Index]
Nettalk - www.ntalk.de - IRC-Chatclient
Build and generate php forms with ease - FormBakery
FreeFileSync | Free Security & Utilities software downloads at SourceForge.net
Download MakeUseOf Guides
Apache Directory Studio - The Eclipse based LDAP browser and directory client
Weekend Project: Get Started with Tahoe-LAFS Storage Grids | Linux.com
Lotusphere 2012 session recap: Spark Ideas, Featured by the Nerd Girls
Using Browsers with OpenLDAP cn=config Tree « UNIX Administratosphere
Palmetto Open Source Software Conference | POSSCON 2012
freeseer - open source video studio in a backpack | FOSSLC
Welcome - IP-Link
How To Tie a Tie | All Necktie Knots, Step by Step Video Instructions from 2Tiea...
How can I get a list of MAC to IP addresses on the network?
(uN)Tech blogs
Vat of Knowledge » Vat of Knowledge
DNE Support - Deterministic Networks
Citrix DNE does not work with the native Windows 7 Mobile Broadband driver
12 Reasons Why Every Linux System Administrator Should be Lazy
Lotusphere 2012 Recap
Meet Bill Gates, the Man Who Changed Open Source Software | Wired Enterprise | W...
Yawf – Freecode
Suji"s blog: How to configure proxy for common linux apps
HotFix – RDP 7.0 installed on XP SP3 Machine causes issues with RDP connections ...
OpenMediaVault - Home
Script Warranty Dell
CloudShark brings your CAPTURE FILES to the cloud
Mapped Network Drives with UAC on Windows Vista - The App Compat Guy - Site Home...
Juniper Netscreen Commands | Netscreen
How to Clear the ARP Cache
Simplify Administration with Directory Services | Wazi
FreedomBox Foundation
Nagios Exchange - Icon Set Generator
oraToolKit - The Swiss Army Knife for Oracle
Plop - Documentation / Manual / Examples - Free Boot Manager, builtin usb driver...
Using PowerShell with Internet Explorer - Virtu-Al.NetVirtu-Al.Net
How To Determine a More Accurate SEO Ranking For Your Site
Congelli501 - Download LCD Nurse (v1.0.1)
Producing Open Source Software
mozdev.org - books: chapters/index
We the Media by Dan Gillmor
Folder
Ed Brill - New book-IBM Lotus Notes and Domino 8.5.3: Upgrader’s Guide
MR, FP, FR, IFR, Hotfix, IF - what do they all mean? | IdoNotes (and sleep)
Converting A VMware Image To A Physical Machine | HowtoForge - Linux Howtos and ...
CLICK ONCE ERROR: “An error occurred while signing: Failed to sign bin\Debug\app...
Managing User Profile Service Application permissions using PowerShell - SharePo...
Calomel.org :: Open Source Research and Reference
3 New and free Windows 7 Themes to download, Fractals, Fun Fruit and Japan Dusk ...
AspRangers | Win2003 Server is hanging intermittently due to high NPP (non paged...
Keeping Your Documents Safe - The Microsoft MVP Award Program Blog - Site Home -...
How I Manage Bandwidth Using Trickle On Ubuntu - Ubuntu Portal
Bash One-Liners :: bashoneliners.com
High-Performance Whiteboard Paint | IdeaPaint Product Descriptions
Directory Service Comparison Tool 2.0 B3
ADModify.NET
Ask the Builder - The Home Improvement Resource
OpenManage Essentials - Systems Management - Wiki - Systems Management - Dell Co...
Dell Client System Update - Systems Management - Wiki - Systems Management - Del...
Projectors, Projector Reviews, LCD Projectors, Home Theater DLP Projectors at Pr...
candera/hobocopy @ GitHub
http://www.isc.cnrs.fr/informatique/public_notice/netdisco/netdisco-install-engl...
Linux / Open Source For Kids: A Feast of Riches | Worldlabel Blog
Lotus Notes » Code Nomad
Echoes with John Diliberto
10 PowerShell commands every Windows admin should know | TechRepublic
Downloads - Jazz.net Community Site
Simple PowerShell Script to Bulk Update or Modify Active Directory User Attribut...
Add User Account Information to Active Directory Users and Computers
Friday Fun: A PowerShell Alarm Clock | The Lonely Administrator
PowerShell script for getting Active Directory information | TechRepublic
ADO Search Tips
AD Attributes
Chapter 11. Using external backends
OtterHub.org - OTRS Community • View topic - adding active directory integration
Re: [otrs] ORTS, LDAP and AD groups
Configuring OTRS to make Agents authenticate via LDAP (MS Windows Active Directo...
Presentation Links: Free Active Directory Tools and Tips « Web Active Directory ...
Apple Stores construction suppliers | TUAW - The Unofficial Apple Weblog
OTRS LDAP Authentication for Agents and Customers | marius
#500558 - libapr1: can"t bind to 127.0.0.1 without IPv4 address - Debian Bug rep...
Securing Your ISPConfig 3 Installation With A Free Class1 SSL Certificate From S...
NewerTech® Power2U™ AC/USB Wall Outlet
How To Monitor Remote Linux Host using Nagios 3.0
LeoCAD
WinFF - Free Video Converter
How to install nconf web interface for nagios on debian and ubuntu? - MyLiteratu...
SANS: 20 Critical Security Controls - Version 3.1
Barcode Nerds
Searching Active Directory with ldapsearch | Eldapo | directory management and s...
PC"s Telecom Blog: 100G is unstoppable!
Scalability Experts Tools Downloads | Scalability Experts
racker/dreadnot - GitHub
autokey - Desktop automation utility for Linux and X11 - Google Project Hosting
10+ Useful Commands for Linux Users
User Sovereignty for our Data | Mitchell"s Blog
Weekend Project: Learning Ins and Outs of Arduino | Linux.com
Free Diagnostic Tools | Wormly
swaks - Swiss Army Knife SMTP
Nagios on FreeBSD® 7.2 - BMO
Phoenix: Forgot the SA password in Sql Server 2005
[oucs] 4. Tools and Utilities - Active Directory
SQL Server 2012 Licensing and Hardware Considerations | Glenn Berry"s SQL Server...
Maximum PC | Build Your Own Multitouch Surface Computer
Free Tools | McAfee Downloads
Axantum Software AB | AxCrypt | File Encryption Software
What is GPRESULT and how it helps you | ivan"s blog
MultiRBL.valli.org - Blacklist, Whitelist and FCrDNS check tool
Nagios commands via web-interface on Debian | Lars Schenk
Puppet + Gephi: Visualizing Infrastructure as Code | Atomic Spin
Features | Gephi, open source graph visualization software
Autonomously Organized and Funded IT Groups (EDUCAUSE Quarterly) | EDUCAUSE
Install Open-VM-tools on Debian 6 squeeze | SurlyJake
SourceForge.net: pcapsipdump - Project Web Hosting - Open Source Software
iWitness | Seven Days
Pantone 453
The science fiction effect | Bulletin of the Atomic Scientists
New York Jedi
NirLauncher - Collection of more than 100 portable utilities from NirSoft
KLS SOFT - WSCC - Windows System Control Center
Project OpenGrok
CORNING® GORILLA® GLASS
Red Hat developer explains open source color calibration hardware
GriF: The Grid Framework
Kwatee Agile Deployment
Simple Linux Auditing | HowtoForge - Linux Howtos and Tutorials
HTTPS Everywhere | Electronic Frontier Foundation
Steve Jobs kept letter from Bill Gates on his nightstand | TUAW - The Unofficial...
The Power Base OpenWRT Build Guide: Start To Finish
OEMs are still breaking Windows: can Microsoft fix this with Windows 8? « Tim An...
bad oem, bad!
SharePoint 2010 | Clear SharePoint Cache - Trailblazer"s Sharepoint Blog - Site ...
busdog - USB traffic sniffer - Google Project Hosting
ISO Toolkit 4.0: Freeware to Create, Convert, Copy, Extract and Mount ISO Image ...
groths.org «
Google Books Downloader for Windows and Mac OS X
Advertising Agency Software, Collaboration | Project Management, Time Tracking, ...
HP Communities - SWFScan - FREE Flash decompiler - Enterprise Business Community
ProEject | SoftwareSpot Apps
Unplug USB flash drives safely with RemoveDrive from Softwarecrew | Software Rev...
Using Underscores, Hyphens or CamelCase in Naming Standards — My EtherealMind
Open Hardware Monitor | CPU Temperature, Fan Speed, Voltages, Clocks and More
VMware vSwitch – the baseline of simplicity « ipSpace.net by @ioshints
g4u - Harddisk Image Cloning for PCs
OSFClone - Open source utility to create and clone forensic disk images
Home Climate Control
chriscontrol - All in One RDP & VNC Remote Control - Google Project Hosting
Feasty Geeks: Pan Galactic Gargle Blaster Recipe
Home | BackBox Linux
Home
Basic Chemistry on the GNOME Desktop | Linux Journal
The 9 Best Low-Cost RADIUS Servers
GLPI - Gestionnaire libre de parc informatique
openDias - project portal
MALODOS
Frescobaldi: Edit LilyPond sheet music with ease!
Userful MultiSeat Linux 2011 Complete Virtual Desktop School Computer Education ...
AIX monitoring CPU
The BIRD Internet Routing Daemon Project
ISO Master
The Moth | True Stories Told Live
URANOS
TidBITS Problem Solving: iSesamo: Building a Better Spudger
Tom Bihn Cadet laptop / iPad bag organizes your belongings in style | TUAW - The...
ossbuild - Open Source Software Build Environment - Google Project Hosting
Resolve Performance Problems Associated with Authentication Scaling
Solved: Laptop Monitor Green lines - PC Help Forum
HP dv7-3173nr Laptop Screen Replacement Procedure - YouTube
dv7-3173nr
Microsoft Adds Data Deduplication to NTFS in Windows 8 – @SFoskett – Stephen Fos...
[CMC] Cyanogenmod Compiler [Alpha] [Dec 29 2011] - xda-developers
Update on Bootloaders | Facebook
16" - e1649Fwu - Monitors - AOC - North America: U.S.
Nagios Exchange - SQLServer
Viber | Free calls, free voip, free phone calls from iPhone and Android
Raspberry Pi | An ARM GNU/Linux box for $25. Take a byte!
Scripting News: The Un-Internet
Editorial: How FAA-certified gadgets could improve air travel and eliminate the ...
Steve Jobs and Japan | Nippon.com
Issey Miyake
Pieceable
How to Use Wi-Fi Sync for iPhone, iPad, & iPod touch with iOS 5
Verify firewall settings and that TCP ports 123 and 3689 in addition to UDP ports 123 and 5353 are open and accessible (these are ports iTunes uses)
Now Hovering Above Us All: "The Cloud" : NPR
Timeline: A History Of Touch-Screen Technology : NPR
Daily DNS Changes & Web Hosting Activity - DailyChanges.com
Development of Computer science and technologies in Ukraine. Brief History
baresip - Open Source SIP User Agent
Official Google Blog: Remembering a remarkable Soviet computing pioneer
PowerShell script for generating a Visual Studio profile - All you need is code ...
Enable Multiple Desktop sessions for windows 2008 or Windows 7 - Rajakedar Ganta...
partkeepr.org Âť
NASA - Hubble Serves Up a Holiday Snow Angel
My Computing Handbook: Using Ketarin to fetch the latest freeware updates from s...
How do I get the full path for the target of a shortcut file? - The Old New Thin...
News - UFO:AI
OpenRA - Home
Badcaps.net - Badcaps Home
Computer Capacitors
LCDalternatives
James Kibbie - Bach Organ Works - Download
New nanotube battery technology leads to blisteringly fast recharges, improved s...
Leprechaun Cider
Beer of the Month Club - Microbrewed Beer Clubs International and Domestic
» 7 Facts Your Doctor Won’t Tell You
15 Ways to Exercise in Under 5 Minutes | Wise Bread
Raw Food Diet – Day 1
ally I doně°˝€™t like eating plain raw celery, unless itě°˝€™s slathered in almond butter and topped with raisins, or maybe with some
Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWAS...
Mutillidae
LinuxLive USB Creator
How To Make A USB Installation Disk For Windows 7 Without Extra Software
10 Cool Uses Of Wolfram Alpha If You Read And Write In The English Language
virtuallyGhetto: Ghetto webAccess for ESXi
Bodge ÂŤ The Angry Technician
VM Start-up script
PowerCLI: Shutdown your Virtual Infrastructure
virtuallyGhetto: Retrieving Information from a Distributed vSwitch
Auto Installation and Configuring of vSphere ESXi 5 | vNinja.net
Secure Server Unit | RackSolutions
MIT"s got a way of using encrypted data without decrypting it, next stop, travel...
Liquid War 6 - GNU Project - Free Software Fundation (FSF)
WebHome < Home < Foswiki
Improving the Multi-Monitor Experience in Ubuntu ÂŤ Canonical Design
PacketFence: Open Source NAC (Network Access Control)
grml.org - Debian Live system / CD for sysadmins and texttool-users
SquidGuard Manager
How to Disassemble and Upgrade the ASUS G53SX/SW
Linux: 20 Iptables Examples For New SysAdmins
Radio on the Computer
You Have Downloaded - We show what you downloaded
[ubuntu] How to Mount Clonezilla Images - Ubuntu Forums
wissel.net :: DOTS and the eMail life cycle
Xerox"s Palo Alto Research Center founder Jacob Goldman passes away at age 90 --...
Bootstrap, from Twitter
SANS: 20 Critical Security Controls
Green Mountain
HTTP Archive - Trends
How do I clone a hard drive with Clonezilla? | TechRepublic
Installing RANCID on Debian GNU/Linux « smz"s blog
TACACS+ stuff
Linux Systems Capacity Planning | Linux Journal
ownCloud web services under your control
How To Encrypt Mails With SSL Certificates (S/MIME) | HowtoForge - Linux Howtos ...
Nmap Network Probing Cheatsheet | Wazi
***READ BEFORE POSTING*** Common Problems & Useful Threads ***READ BEFORE POSTIN...
ClouDNS.net: Free DNS hosting
open-ig - Open source reimplementation of Imperium Galactica - Google Project Ho...
Dave"s Daily Deals
[1112.1645] How to Gamble If You"re In a Hurry
WikiCFO:Best Business Practice Idea for CFOs
to
The Power Base – LightScribe in Linux: Make Gorgeous Discs in Ubuntu - The Power...
FreedomBox - Debian Wiki
Threaded-Samba-Scanner – Freecode
SemanticScuttle | Free software downloads at SourceForge.net
delicious replacement?
Linux Forums - Backup all databases nightly w/ mysqldump
AirDroid-Enjoy your Android Experience over the air
Bufferbloat
CMAND: Transport Traffic Analysis: SpamFlow
Gallery | Your photos on your website
large
Fork Yeah! The Rise and Development of illumos
MicroDNS: Give an IP to any query
Default
iPXE - open source boot firmware [start]
IT Service Management Software - Free Open Source Help Desk - Problem Management...
Introducing DNSCrypt (Preview Release)
Roundup Issue Tracker - Roundup 1.4 documentation
Configuration Management for Agile System Administrators - CFEngine
Tiki Wiki CMS Groupware | Tiki Wiki CMS Groupware - Software made the wiki way.
MacBook Screen Protector, LCD Display Cleaner, Keyboard Cover for MacBook, MacBo...
The Bro Network Security Monitor
Apache Traffic Server
Dingleberry jailbreak
SSH Analysis
DNS Best Practices, Network Protections, and Attack Identification - Cisco Syste...
juuso/BozoCrack - GitHub
Pwnf4.jpg (JPEG Image, 1400 × 2424 pixels)
The case of the 500-mile email
The Washington Post and a Higher Military Standard
noplay/situation-room - GitHub
OpenMeetings | Open Source Web-Conferencing
HP Smart Array - When is Magic Just an Illusion?
RegScanner: Alternative to RegEdit find/search/scan of Windows
The Produce Worker"s Guide to Storing 25 Common Fruits and Veggies | Wise Bread
Impress the Future Boss: 9 Interview Mistakes to Avoid | Wise Bread
libvirt Virtualization - Open Source Network Monitoring and Systems Management
ByteSphere"s MIB Download Area
Oidview Free MIB Browser Download
sysadvent: Day 5 - Tracking Requests with Request Tracker
Open Blocks Download Page | MIT STEP
ArduBlock
Introduction to Stepper Motors | Sleep is overrated…
» Kids & Money: Teaching Gratitude
» 5 Tips for Your First Job Interview
Sumo Dojo – Talking about outsourcing and how we do it | Neville"s Financial Blo...
Toastmasters Speech Series: Your Guide to the First 10 Speeches
Rapid history extraction through non-destructive cache timing (v8)
CalMail Updates | UC Berkeley IST
VMware Paper – vSphere High Availability Deployment Best Practices « The Virtual...
xed
INFOGRAPHIC : The History Of The Modem
The Official YAML Web Site
keynote-nf - KeyNote NF (New Features) - Google Project Hosting
Leave Some RAM For Filesystem Cache - The Lone Sysadmin
Align Your Partitions - The Lone Sysadmin
TechnoLawyer Blog: BigLaw: Upgrading Your Large Law Firm to Office 2010 and Gett...
outSSIDer WiFi scanner
SNMP Informant - software that allows you to use SNMP to monitor your Windows in...
Zittrain in Technology Review: The personal computer is dead
Security: Linux, OS X, Unix and Malware (Viruses) « The ERACC Web Log
About NewsBlur
Fwink — Free Webcam Software
Guide to rsnapshot and incremental backups on Linux
YaCy Search Portal using a Load Balancer over Distributed Peers
Netflix Benchmarks Cassandra on AWS - ReadWriteCloud
Open Security Research: Setting up a Password Cracking Server
A Bushel of Free, Open Source Tools for Working with Digital Photos
Cooliris
Weekend Project: Run Your Own Q&A; Site with Coordino | Linux.com
Coordino - Home - A FREE PHP StackOverflow Clone
The rules of the game - a conversation with Dave Neary - The H Open Source: News...
» Linuxaria – Everything about GNU/Linux and Open source opensource Asset Managm...
NeonView 0.6.0 Released With New Features
Mexican Army Dismantles Gang"s Antennas, Radios : NPR
BSTJ version of C.ACM Unix paper
The Strange Birth and Long Life of Unix - IEEE Spectrum
PATRIOT Act clouds picture for tech - POLITICO.com Print View
Newfies, the Open Source Voice Broadcast software for Freeswitch
Candela Technologies - Stateful IP Traffic Generators and Network Emulators.
LibrePlan: Open Web Planning
Everything Sysadmin: The Limoncelli Test: 32 Questions for Your Sysadmin Team
Love this!
Crowdin.net - Collaborative translation tool
Back-up of Documents and CD Burning Process - Kettering University
The Columbia University Intrusion Detection Systems Lab
New Study Reinforces Case for DC Power Savings » Data Center Knowledge
Version Control Demystified, Part 1: Version Control in Apps you already use
Version Control Demystified, Part 2: A Subversion Primer
etckeeper
5 Creative Uses For A Virtual Box That You Probably Never Considered
Try Out Windows 8 In VirtualBox Right Now For Free
NETRESEC NetworkMiner - The Network Forensics Analysis Tool
Jamison Scheeres – Social Engineering is a Fraud Derbycon 2011 (Hacking Illustra...
GNU Gatekeeper - a free VOIP Gatekeeper for H.323
mintty - Terminal window for Cygwin and MSYS - Google Project Hosting
Gow – The lightweight alternative to Cygwin - GitHub
gow - Unix command line utilities installer for Windows.
darning
SandBox - Projects by Darkrose - csvDB
quicksynergy - Synergy in a single click - Google Project Hosting
Amazon.com: TRENDnet USB to Serial Converter TU-S9 (Blue): Electronics
The Sketchbook of Susan Kare, the Artist Who Gave Computing a Human Face | Neuro...
Official SkyDogCon 2011 Page
How Private Is Your Email? It Depends : NPR
Drive Tools for Windows
I...
More Slick OpenSSL Tricks | Wazi
TripleA - TripleA
Delegation of Mailbox Access Rights to another user using PowerShell Commands: -...
sinfo-Advanced Network Monitoring | Linux Journal
sinfo
Tip: Understanding the availability reports in Nagios Core | Oleksiy Gayda"s Tec...
SAPO Codebits 2011
From lolcat to textspeak: How technology is shaping our language | Software | si...
Bugwise | foocodechu
Online Webinar Software, Web Conferencing Software, Live Webcasting Software,Mob...
wissel.net :: Workflow and Organisational Directory
NetFPGA
Applidium — Cracking Siri
plamoni/SiriProxy - GitHub
the history of computing project
Live Sketching | surf the edge
Matthew Wronka - Projects - Murder
Corosync [welcome]
Grokking the GIMP - Learning Advanced Image Editing Techniques
Free Tools for Getting Started with the Mighty GIMP Graphics Editor
User-friendly SVN
Salon 21st | The Richard Stallman saga, redux
4MLinux.com
Psensor | wpitchoune
Common Errors in English Usage
Maqetta
The Helpful Hacker - A Simple OpenBSD Router For Your Virtual Machines
Stanford University online courses for free
What got you interested in technology? IT"s rich and famous share their memories...
Linux Forums - Test To Give When Hiring or Interviewing a Junior Linux System Ad...
oVirt
Steve Jobs and the Mac team, photographed by Norman Seeff | TUAW - The Unofficia...
[pic] Funny Bill Gates pics from 1983 - Neowin Forums
Hiding messages in VoIP packets
BIND 9 Resolver crashes after logging an error in query.c | Internet Systems Con...
How to Monitor and Log Network Traffic on Linux Using vnStat
NicTool - Enterprise DNS Management
Speeding up Android development with Android-x86 and VirtualBox | Bruno Talks Te...
How To Rip DVDs with VLC - How-To Geek
Download Details - Microsoft Download Center - Group Policy Management Console w...
Hughski - ColorHug
Demystifying SQL server memory concepts video - Microsoft SQL Server Tips & Tric...
rsync backup for Android - Android Market
Packet Sniffing Basics | Linux Journal
A faster Web server: ripping out Apache for Nginx
Intel Museum – The Intel 4004
myvirtualcloud.net » VMware View 4.6 PCoIP Software Gateway (PSG)
Linux Logical Volume Manager Walkthrough – Stephen Foskett, Pack Rat
Random Stuff: Import virtual appliance without vSphere client
quickly deploy a sample virtual appliance to my ESXi server with the following command: ovftool /path/to/test.ova vi://root@esxi.lan
Straighten up with a new UBER tool : Presenting UBERAlign | Nickapedia
The Machine SID Duplication Myth (and Why Sysprep Matters) - Mark"s Blog - Site ...
Lotus Notes and Domino wiki
Using Horenso to Achieve 360-degree Communication | Karn G. Bulsuk: Full Speed A...
Visualizing Horenso to Ensure Effective Communication with Downloadable Visual W...
HO-REN-SO: The Communication Edge of Japanese Companies | Sun.Star
Home - GitHub
ISC Diary | Stuff I Learned Scripting - Evaluating a Remote SSL Certificate
Great Ways to Improve Your Resume Today | Wise Bread
Seth"s Blog: What good interview questions are actually trying to discover
How Many Sorting Algorithms Do Beginners Need To Learn - Computer Science Teache...
Create DNS Entries From a File - Kirk Evans Blog - Site Home - MSDN Blogs
Performance issue when printing Word Templates - Dynamics GP Support and Service...
Consumerisation of IT in education: Be prepared… - FE blog - Site Home - MSDN Bl...
Want Your Presentation to Rock? Hook Your Audience Early! - Canadian Developer C...
Tech Career Coaches: 4 Rules for a 4 Hour Work Day
The dirty secret of email is that the more you respond – the more you get.
Automatic backups, one per day, and with different backup file names - Microsoft...
Large Network Packet Size and Memory Pressure in SQL Server - Sakthi"s SQL Serve...
3 Keys to Agile Results - J.D. Meier"s Blog - Site Home - MSDN Blogs
PowerShell script to remove all users from a SharePoint Group - SharePoint Escal...
PowerShell script to list all User Profiles in an SSP - SharePoint Escalation Te...
Issues with PHS300 and Cisco VPN : EVDOforums.com
setup port 500 for special application firewall unblock.
Budget Tip: Survival Mode Produce List
Why Does My Linux VM’s Virtual NIC Show Up As eth1? - The Lone Sysadmin
ODIN - Open Disk Imager for Windows
VMware ThinApp Bootcamp Note – ThinApp Implementation Best Practices « The Virtu...
GNU Screen For Fun and Profit - The Lone Sysadmin
SSH Escape Sequences (aka Kill Dead SSH Sessions) - The Lone Sysadmin
Cronopete
Tools to monitor DNS - Windows Server - Technology
1. Dnslint /ql autocreate
Lightning :: Add-ons for Thunderbird
http://stallman.org/extra/personal.html
Migrating printers from W2K3 32-bit to W2K3 64-bit « Salt * Wet * Bytes
Migrate print servers
To migrate print servers by using a command prompt
wormtrack - Detection of scanning worms, and machine scans - Google Project Host...
Syndicate Press – a wordpress plugin for RSS feeds | henryranch.net
TCP/IP Reset -- Microsoft Certified Professional Magazine Online
netsh interface ip reset logfile_name
5 Cool PowerShell Cmdlets for Speeding Up Active Directory Tasks -- Microsoft Ce...
Get-ADGroupMember New-ADComputer Remove-ADUser Set-ADAccountPassword Unlock-ADAccount
How To Use etckeeper
Router/Bridge Firewall Linux
SSHGuard - Defend from brute force attacks
We"ll be back shortly
FREE Wireless WiFi Site Survey Software for MAC OS X
Linux News: Community: What Open Source Can Learn From Steve Jobs, Part 2
Linux News: Community: What Open Source Can Learn From Steve Jobs, Part 1
Four Hidden Tools in Scribus | Linux Journal
man make: a Primer on the Make Utility | Linux Journal
Dennis Ritchie"s legacy of elegantly useful tools - O"Reilly Radar
A Cartography of the Anthropocene
Technical Details for Our IPv6 Deployment : Comcast Voices | The Official Comcas...
CommandLineFu: Amazing Collection Of Command Line Gems [Linux & Mac]
Supercharge WordPress, Part 1 | Wazi
Take Any College Class for Free: 236 Open Courseware Collections, Podcasts, and ...
DailyTech - "Devil Robber" Trojan Infects Macs, Leeches Their GPUs for Bitcoin P...
How can I add a printer from the command line?
server
Installing and Managing Group Policy Preferences on a Windows Server 2003 Domain...
RMacD.com :: Pd-extended and random-data streams
Powershell login script to map network drives, printers and applicaton settings ...
$result = get-groupMembership $strName “Head Office” if ($result -eq ’1′) { $(New-Object -ComObject WScript.Network).RemoveNetworkDrive(“G:”); $(New-Object -ComObject WScript.Network).MapNetworkDrive(“G:”, “\\SERVER\general”); }
Last In - First Out: Cargo Cult System Administration
Intro to Automating System Administration with Cfengine 3 | Linux Magazine
Automating Security with GNU cfengine | Linux Journal
ORATECH_blog
ARE - Wiki - Honeynet Project Redmine
Steve Jobs And His Last Words : The Two-Way : NPR
Visual Studio Roadmap - Microsoft Visual Studio
» 5 Negotiating Tips You Can Use Almost Anywhere
Lancope NetFlow, sFlow-based Security, Network, Application Performance Monitori...
Bundlr - Bundle and share web content easily
3 Ways To Open Applications & Windows Maximized With VB Script [Windows]
How To Control WordPress Versions Using Subversion [Linux]
What is SIP Trunking
ISC Diary | Internet Storm Center Diary 2011-10-28
You might find out that users come with three levels of security clue:
Seth"s Blog: How to get a job with a small company
Preparing a Hard Drive for Sale on eBay | Mon 31 Oct 2011 | Blog | CodeStore
SANS: Security Awareness Training
Welcome to OpenMAMA | OpenMAMA
GoAccess - Visual apache/Nginx log analyzer | Ubuntu Geek
virt-resize - Resize a virtual machine disk
virt-alignment-scan - Check alignment of virtual machine partitions
How To Configure A pfSense 2.0 Cluster Using CARP | HowtoForge - Linux Howtos an...
Halloween Tech: Spooky and Odd Terms From Webopedia.com
BYOD: The inevitable reality | ZDNet
The answer to the BYOD question is Virtualization. | ZDNet
OutlookAttachView - View/Extract/Save Outlook Attachment
Conflux Groupware - Enterprise collaboration management
SpeakGoodChinese
Pioneers
LGames - Linux Games
lxdvdrip / Wiki / Home
Cheix USB
Home
My Top 14 Wordpress Plugins For Niche Sites
Automatic CentOS 6.0 Installation With Kickstart | Wazi
Notepad++ Home
A Sister’s Eulogy for Steve Jobs - NYTimes.com
Syncstarter | time synchronous digital playback
MuLaViTo / Wiki / Home
moneyGuru
Netrek Nexus
Software Testing Tools | Automation Testing | Regression Testing | Load Testing ...
Deskolo project
The story behind Steve Jobs’ Mercedez Benz and its missing license plate | Edibl...
Apple Lossless Audio Codec
How Far Does Social Advertising Reach? [Infographic] by Flowtown | Search Engine...
http://www.thc.org/thc-ssl-dos/
RealWorld Graphics - software for icon, cursor, image, and photo editing
VMware: VMware Support Insider: New File SR Page Now Fully Live
Organizing For Success - Chuck"s Blog
Six Essential Drupal Modules for Business | Wazi
The secret payload of the iPhone 4S: Bluetooth 4.0 — Apple News, Tips and Review...
Apple Posts Steve Jobs Memorial Video [News]
Dead People Server - Dead Celebrities, Dead People and Other Interesting Passing...
In defense of netbooks
Remember Netbooks? No One Else Does, Either
wissel.net :: Moving a NSF from one server to another
John McCarthy
BBC News - Artificial intelligence community mourns John McCarthy
Decoupling by Example
The Founding of Virgin Atlantic - Business Opportunities Weblog
Don"t Be The Boss--Be The Leader | Wise Bread
Creator Of Lisp, John McCarthy, Dead At 84 | TechCrunch
LinuxLive USB Creator
Public Knowledge | Fighting for your digital rights in Washington.
Jon Moon, "Clarity and impact" :: My book
How to Get Rich on Bitcoin, By a System Administrator Who"s Secretly Growing The...
Xrandr: Solve Screen Resolution Issues via command line in Ubuntu / Debian | Lin...
Have you met  ? Say hello to my BOM
Homemade DTV Antenna
Windows 8: Windows 8 BluePoison official download page: Windows 8 downloader / s...
The Basics Of Computer Programming 101 – Variables And DataTypes
ProxSMTP
CSS: Cameron Simpson"s Scripts
CIOs must "re-imagine IT"
Martin Mares: Linux Projects
Help your organization avoid the pitfalls of BYOD — Mobile Technology News
How to: Script for clearing the run history: - Solve your Identity crisis withou...
Dennis Ritchie, creator of C programming language, passes away - Building games ...
20 Essential PC Shortcuts - The blog of Rob Margel - Windows Help - Site Home - ...
Your SQL Server Setup may hang forever when it’s almost at the 99 %! - Microsoft...
PowerShell one-liner to determine the incoming e-mail drop folder in SharePoint ...
Dennis Ritchie: The Shoulders Steve Jobs Stood On | Wired Enterprise | Wired.com
Cargo Cult System Administration - The Lone Sysadmin
Basics of EDI | The Integration Engineer
The Wirecutter | A List of the Best Gadgets
I, Cringely » Blog Archive » The Steve Jobs Interview - Cringely on technology
I, Cringely » Blog Archive » Remembering Dennis Ritchie - Cringely on technology
Open Source Routing
Quagga Software Routing Suite
Steve Jobs was initially opposed to apps, new biography reveals -- Engadget
How to Change the IP Range for the Internet Connection Sharing DHCP service
Unboxing the Pantech UML290 4G USB Modem ~ Verizon Wireless
www.pagey.info: Using Pantech UML290 on Ubuntu Linux 11.04 (Natty Narwhal)
Without Dennis Ritchie, there would be no Jobs | ZDNet
News | Shinken
Steve reportedly worked on Apple"s next product until his last day | TUAW - The ...
a6omcl2la0ivlxsn3o8m.jpg (JPEG Image, 3800x2300 pixels) - Scaled (29%)
Flowchart for Scifi books, what isnt to like.
VPN Case Study Site
Setting up dd-Wrt, Public Sub-Net Over Dynamic WAN
Guy Kawasaki on what he learned from Steve Jobs | TUAW - The Unofficial Apple We...
On photographing Steve Jobs | TUAW - The Unofficial Apple Weblog
NXLOG Community Edition | NXLOG Community Edition
Wmatrix corpus analysis and comparison tool
About: OpenNode
check_hpasm – ConSol* Labs
Some useful commands in PowerShell - Kunal Mukherjee - Site Home - MSDN Blogs
sinkhole
Whitehats.ca Home
Sneaky salarymen scheme, skim and hide cash from their wives ‹ Japan Today: Japa...
Conference or Course? Where Should I Spend my Training Budget? - Canadian Develo...
Môsieur Ritchie - Devosaure - Site Home - MSDN Blogs
How to Polish a Pair of Men"s Dress Shoes
How To Automate Telnet Commands Using VB Script
ISC Diary | Dennis M. Ritchie (1941 - 2011)
Dennis Ritchie, Father of C and Co-Developer of Unix, Dies | Wired Enterprise | ...
Using PowerShell to clean up SharePoint document library files with no versions ...
Use MySQL Replication Like an Expert to Improve Performance and Enhance Availabi...
RIP Dennis Ritchie | Linux Journal
Handling setuid and setgid Programs
SAP Community Network Forums: Urgent!! Printing Barcode using ...
Bar Code Primer - Introduction to Barcoding - Worth Data USA
Understanding-Barcodes.pdf
Rats Causes Virgin Broadband Outage In Scotland | eWEEK Europe UK
liftoff/GateOne - GitHub
Linking in ebooks: How much is too much? - O"Reilly Radar
Data in the HR department - O"Reilly Radar
Remembering Dennis Ritchie, Creator of the C Programming Language and UNIX Co-Cr...
"Open Source Powering Pretty Much Everything"
virtuallyGhetto: Automating ESXi 5.x Kickstart Tips & Tricks
Download Details - Microsoft Download Center - System Update Readiness Tool for ...
Internet Explorer Command-Line Options
How to make a bootable VMware vSphere 5 USB installation media | satheesh.net
Authenticating Wi-Fi Users with FreeRADIUS | Wazi
Seth"s Blog: The atomic method of creating a Powerpoint presentation
How To Set Up & Use Windows 7 Backup & Restore Feature
SFTP Access To Amazon EC2 Using FileZilla | Wed 12 Oct 2011 | Blog | CodeStore
Adweek calls Jobs the "greatest marketer of the age" | TUAW - The Unofficial App...
VMware KB article – Large Environments 200+ hosts, 2000+ VMs « The Virtual Headl...
SSH scripts: prompt for passphrase if needed
How can I get a list of installed SQL Server instances? - Jay"s notes on SQL - S...
Is The Performance Of All Cloud Servers The Same? | The Storage Architect
TidBITS Opinion: Steve Jobs: Among the Crazy Ones
TidBITS Opinion: Steve Jobs: Sharing the Joy
TidBITS Opinion: Mourning Steve Jobs
TidBITS Opinion: Steve Jobs: Bringing Technology to the Masses
Apple holding private event on October 19 celebrating the life of Steve Jobs | T...
Official cause of death for Steve Jobs released | TUAW - The Unofficial Apple We...
"Mythbusters" Savage & Hyneman to host Steve Jobs retrospective on Discovery...
WiiCan in Launchpad
wiimotepresenter - jasonlpsmith
LooseBolts
Disable Caps Lock :: Useful Stuff :: JohnHaller.com
Fix: VMware vSphere Client – Error 1406. Could not write value | TechHead.co.uk
Startup Repair - Windows 7 features - Microsoft Windows
The Man Who Inspired Jobs - Business Opportunities Weblog
Tip: Want to be more productive? Don’t file your email | Productivity
practice
Steve Jobs and the Little Blue Box: How Ron Rosenbaum’s 1971 article about phone...
The article that inspired Steve Jobs: “Secrets of the Little Blue Box” - Slate M...
Cronopete
BasicTutorial - sigil - A Basic Sigil Tutorial - A WYSIWYG ebook editor. - Googl...
marcelo-soares/ConvertePST - GitHub
Uncrustify - Source Code Beautifier for C-like languages
Steve Jobs banner in the Windy City a nice tribute | TUAW - The Unofficial Apple...
wissel.net :: Omnisopie - mankind according to Dueck
Omnisophie
Poster: The Eight Levels of Vendor Acceptance — My Etherealmind
Top 10 Tactics for Diagnosing and Fixing Your Sick Technology
How to Ask for a Raise in a Bad Job Market
Computers In Class Another Legacy Of Steve Jobs : NPR
Reader Story: How to Buy a Car at Auction
The Staggering Achievement of Steve Jobs (AAPL, DELL, MSFT, T)
en:start [FusionDirectory Website]
mysqldiff -- a utility for comparing MySQL database structures
Static Free Software Home Page
Codemetre
AFFLIB » tcpflow — A TCP Flow Recorder
Steve Jobs, Whose Imagination Invited Us To Play : NPR
Hacker News
How much did Steve Jobs Mean To the Tech Industry? - Steve Rowe"s Blog - Site Ho...
Insanely great - Fabulous Adventures In Coding - Site Home - MSDN Blogs
Recordings from the First PowerShell Deep Dive - Windows PowerShell Blog - Site ...
Getting Remote Event Logs - Lessons Learned - Site Home - MSDN Blogs
The Secrets of PowerShell - MSDN UK Team blog - Site Home - MSDN Blogs
Steve Jobs - Buggin" My Life Away - Site Home - MSDN Blogs
Steve Jobs on business, life and health - HealthBlog - Site Home - MSDN Blogs
Smolt
CAElinux
Network booting with Linux - PXE
PureDarwin
Troubleshooting for Services issue on Windows 2008 R2
Hands On with Storage Spaces in Windows Server 8 « Tim Anderson’s ITWriting
I, Cringely » Blog Archive » Unanswered Steve Jobs questions - Cringely on techn...
Jon Stewart and Stephen Colbert pay tribute to Steve Jobs | TUAW - The Unofficia...
deauthentication [Aircrack-ng]
Apple CEO Tim Cook"s email to employees about Steve Jobs" death
The Tao of Steve — Tech News and Analysis
Video: Everything you wanted to know about DC motors - Hack a Day
I, Cringely » Blog Archive » Steve Jobs - Cringely on technology
Enterprise Cloud Computing | CloudSwitch
How To Set Up Your FreeNAS Server To Access Your Files From Anywhere
If an apple falls off a tree in a forest… | The Integration Engineer
Rotate a Banner Image with perl and PHP | The Integration Engineer
Use Profiling to Improve Snort Performance | Wazi
Increased Performance In Linux With zRam (Virtual Swap Compressed in RAM) ~ Web ...
Steve Jobs: A genius departs | The Economist
Doc Searls Weblog · The journey was the reward
Here"s to the crazy ones: a farewell to Steve Jobs | TUAW - The Unofficial Apple...
F. Dyson"s suggested approach to proving the Riemann Hypothesis (using quasi-cry...
Japanese Lessons with Maggie
Expressing Apologies
山伏修行体験塾
Japanland Homepage
Index of /programs/tsdecrypt
kernel.org status: hints on how to check your machine for intrusion [LWN.net]
IT inferno: The nine circles of IT hell
At NYC"s Chelsea Hotel, The End Of An Artistic Era? : NPR
Culture at Work: Table of Contents
Life Quotes - Sources of Insight
Good one by G.B. Shaw
Requisition vs. Planning worksheet: why having two planning tools? - Microsoft D...
svn2git in Svn2Git - Gitorious
Plan Your Career Like You Would a Four-Phase Project
How to Put Your Home Maintenance on Auto-Pilot and Keep Your Pad from Turning in...
PC"s Telecom Blog
Telecom and IT Blog for Admins and Users
Enabling Consumerization of IT - Viewpoints - Site Home - MSDN Blogs
Preparing for Consumerization of IT - Viewpoints - Site Home - MSDN Blogs
GoldenPod
Gabedit : A graphical user interface to computational chemistry packages
SourceForge.net: vbuilder
Heliostat Projects - CerebralMeltdown.com
leaflabs.com
Digital Detective - Dcode v4.02a Freeware
Dcode v4.02a Freeware
virtuallyGhetto: How to Automate the disabling of the VAAI UNMAP primitve in ESX...
VMware KB Article – Increasing the maximum number of ports designated for an ESX...
Virtu-Al | Virtually everything is poshable
Managing Digital Information Overload – Is Technology The Cause & The Cure? [Opi...
Fire hydrant graphic
Downloads - Adiscon LogAnalyzer
OpenCards
Elastix :: Open Source Unified Communications Server
Movie creator from photos and video clips
IT ratchets up social-media involvement - Computerworld
The eDiscovery Paradigm Shift: Evolving from eDiscovery to Information Governanc...
Cisco security GM: Consumerization drives everything — Tech News and Analysis
Learn Python The Hard Way | A Beginner Programming Book
arXiv.org e-Print archive
VMware KB: Installing async drivers on ESXi 5.0
Wifi Routers Eat Babies! | Flickr - Photo Sharing!
Jack of all Clouds :: Guy Rosen on Cloud Computing
Ultimate VMWare ESX Whitebox
Access Junkie
Windows Metro Style Apps Developer Downloads
Genii Software | BlogNew
wissel.net :: The 3 P of Performance: Passion, Professionalism and Persistence
The 3 P of Performance: Passion, Professionalism and Persistence
ArcAttack! - Musical Tesla Coil / Singing Tesla Coil Home
Visualization of the Week: The classroom seating chart - O"Reilly Radar
The four strangest bugs and bungles in the history of Android | ExtremeTech
PHP-FPM/Nginx Security In Shared Hosting Environments (Debian/Ubuntu) | HowtoFor...
Database Buying Guide: Open Source Databases — DatabaseJournal.com
Easily Turn Off LCDs With a Shortcut Key in Ubuntu - Softpedia
Red Hat engineer renews attack on Windows 8-certified secure boot • The Register
Five Quick digiKam Tricks « Scribbles and Snaps
Linus Torvalds’s Lessons on Software Development M... - Input Output
Silverlight Issues
20 Myths of Wi-Fi Interference  [RF Solutions] - Cisco Systems
Myth #9: "I"ll hire a consultant to solve any interference problems I run into."
IT Drivers for the Cloud - J.D. Meier"s Blog - Site Home - MSDN Blogs
Early Windows 8 Resources to sift through - UK ISV Developer Evangelism Team - S...
A Few Million Monkeys Randomly Recreate Shakespeare | Jesse Anderson
SQL Server’s utterly pointless event logging « The Angry Technician
Using Power Shell to script out Replication - REPLTalk covers Using and Tuning S...
VMware ESXi 4 vs ESXi 5 Log File Locations | vNinja.net
Virtu-Al | Virtually everything is poshable
VMware KB: Installing ESXi 5.0 best practices
Certification Resources
New Malware Hides from Antivirus in Your BIOS [News] | MakeUseOf
Is System Administration a people-oriented career? « UNIX Administratosphere
ThinkUp: Social Media Insights Platform
PowerShell for SQL - Getting Started - Cindy Gross - Troubleshooting, tips, and ...
PowerShell for SQL Server - Basics - Cindy Gross - Troubleshooting, tips, and ge...
SQL PowerShell Demo - Intro - Cindy Gross - Troubleshooting, tips, and general a...
25 Frugal Items for Your Organic Vegan Grocery List | Wise Bread
Beehive scale build details. finally « Fighting with technology
/dev/ttyS0 » Blog Archive » Modifying The DD-WRT GUI
Beginner Concepts: A quartet of videos on Inductors - Hack a Day
check_updates – nagios_plugins
betterFORM limeGreen: XForms Dojo Framework - index.xhtml
gscan2pdf-1.0.0
bareFTP project home
dxirc
BlackHole - opensource data deduplication software with mirroring and snapshots
Become an ImageMagick Ninja: Doing Things in Batches | Wazi
Blessed be the Org, the Com, and the Net - Stallmanism
Federal Register
Unity Books Lens in Launchpad
http://www.mattcaron.net/linux/scripts/sync_podcasts
Hurricane Tracker - weather.com
Free as in sake: The story of Koji | opensource.com
The Simple Dollar » Review: What Got You Here Won’t Get You There
Nimbus
ebtables – Linux Ethernet bridge firewalling
CIO PeerGroup Minutes
9 Awesome SSH Tricks
NetbootCD
Building a NAS Server - Super User Blog
OpenIndiana
Mac 101: Format choices for USB flash drives | TUAW - The Unofficial Apple Weblo...
Recover Hostage Media From Your iPod with iPodDisk
ipoddisk - iPodDisk is a tool designed to make it easy and intuitive to copy mus...
Why are the building numbers on Microsoft main campus so erratic? - The Old New ...
New spam sources in the making - Securelist
iEMU Project- Run iOS on Android synonymous hardware platform | GooGeZ
WakeMeOnLan - Turn on computers on your network with Wake-on-LAN packet
Pax Britannica
App Hub - soundlab
Appx Powershell Cmdlets - Looking For The Spike... - Site Home - MSDN Blogs
Windows Azure PowerShell Cmdlets 2.0 have been released! - Michael Washam - Tech...
Useful SQL PowerShell scripts - SharePoint Infrastructure....From the field - Si...
PowerShell–THE best way to manage Live@edu - UK Live@edu Blog - Site Home - MSDN...
Download Free Password Recovery Software Tools
FTP and LDAP - Part 2: How to Set Up an Active Directory Lightweight Directory S...
FTP and LDAP - Part 1: How to Use Managed Code (C#) to Create an FTP Authenticat...
Improving Visual Studio Performance - bharry"s WebLog - Site Home - MSDN Blogs
PowerShell script to create a new User Profile Property - SharePoint Gen - Site ...
Extensions@Frieger.com
OpenTeacher - The easiest way to learn a new language
ViewGit - a git repository browser
Tsung - Open-source multi-protocol distributed load testing tool | Ubuntu Geek
Tsung
0 A.D. :: Wildfire Games
The New Domino Admin » Blog Archive » Lotus Domino: Blue Screen of Death (STOP 0...
Unlogic.se - OpenIcons
sali
Conquests
Web Server for CDROM and USB- cross-platform webserver for running PHP, Perl, Py...
National Radio Quiet Zone
Nerdy Day Trips
Telecomix Crypto Munitions Bureau
Run Linux on your Dockstar, GoFlex, or Pogoplug NAS
Building a Svartkast with a pretty pink Pogoplug: Cheap hardware to leave on som...
http://www.ne.jp/asahi/nhc/itfj/03-level-engl20090514.htm
OpenProj - Project Management | Download OpenProj - Project Management software ...
FARK.com status page
FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Techn...
Apache2: How To Redirect Users To Mobile Or Normal Web Site Based On Device Usin...
FinanceProfessor.com: The World"s Greatest Money Maker: Warren Buffett - BBC Doc...
MATRIX: The Center for Humane, Arts, Letters and Social Sciences Online
eScholarship: Archaeology 2.0: New Approaches to Communication and Collaboration
Sync Mail Dir
eDiscovery Daily Blog: eDiscovery Trends: Your Chance to Comment on Code of Cond...
Using PowerShell to collect information for Storage Troubleshooting (Part 2: Per...
Bulk Backup and Restore at the tip of your finger - Developer hearted / Relation...
LiCo - The New Linux Counter Project
Ci Eye - GitHub
Employees Can"t Be Fired for Facebook Complaints, Judge Says - Forbes
NeapTide » fdupe
Michael Hart (1947 - 2011): Prophet of Abundance - Open Enterprise
nsftools.com - The September 2011 Blog
Phenoelit
THC-AMAP - fast and reliable application fingerprint mapper
Testing Your HP Fax Machine with the HP Fax Test Service HP Officejet Pro L7580 ...
How many ways can you slice a URL and name the pieces? - Tantek
. : a n a k r e o n . g a m e . d e v e l o p e r s : .
Michael S. Hart - Gutenberg
DPG for X (dpg4x) | Download DPG for X (dpg4x) software for free at SourceForge....
The New Domino Admin » Blog Archive » BlackBerry Enterprise Server 5.0.3: No Mor...
New World Record: 1,000,000 IOps from vSphere 5 - Virtual Geek
Main Page - iEmu
Symkat - SSH: Tips And Tricks You Need
Math Primer Series: Matrices I: Introduction and Basics Operations - Reza Nourai...
HP TouchPad Setup Guide Part 1: Speed Up Your Tablet With Preware, Homebrew & Pa...
A Fistful of Dongles: Employee Infosec Academy
Showing impossible to understand Javascript: Obfuscated Quine « OiMae Blog
Internet Security: Top Ten Most Influential Programming Books of All Time
Weak typing - the lost art of the keyboard
ISC Diary | Logs - The Foundation of Good Security Monitoring
Renaming the sa Account
Opa: Advancing web development to the next generation
Brazilian Trojans beyond borders - Securelist
SQL Server Page Compression became default for SAP - Running SAP Applications on...
Protecting yourself from spear phishing - Terry Zink"s Cyber Security Blog - Sit...
Improving our file management basics: copy, move, rename, and delete - Building ...
Free Chemistry Add-In For MS Word - Sam Stokes on Research in your life and stud...
August Update from Microsoft Research & Faculty Connection - Microsoft UK Facult...
Create an IIS configuration backup - benjamin perkins - Site Home - MSDN Blogs
Action Guidelines - J.D. Meier"s Blog - Site Home - MSDN Blogs
The Way of Success - J.D. Meier"s Blog - Site Home - MSDN Blogs
The Consumerisation of IT in the Enterprise: A View From the Field - Microsoft A...
Project Server 2010: Timesheets - Where do Personal Tasks come from? - Brian Smi...
Stop and checked your Virtual Log Files (VLFs) - REPLTalk covers Using and Tunin...
A Useful Tool to generate dump file for a particular service - AsiaTech: Microso...
25 Strategies for Getting Results - J.D. Meier"s Blog - Site Home - MSDN Blogs
Making the Most of Consumer IT - Viewpoints - Site Home - MSDN Blogs
Check file versions for IIS in Windows Server 2003 - Notes from a dark corner - ...
Back from a few days off, and a batch file would not work - OneNote Testing - Si...
Data can be saved from your water-soaked computer
Next to cyberattacks, well-meaning insiders pose greatest security risk
MiTeC Homepage
The evolution of the web
repocafe - self-service for svn hosting
Pro Git - Table of Contents
Sonar
IBM Troubleshooting Internet HTML e-mails with images appearing as red Xs - Unit...
The dreaded red x"s
MaximumHoyt: Fixing a Buggy ACPI BIOS
Meld : Home Page
GOSCON
Free60
vnedvac.pdf (application/pdf Object)
Oral history interview with J. Presper Eckert OH 13
Battle of the SATA 3.0 Controllers: Introduction - Techgage
Stick with AMD and Intel
Simple Rules For Partnering With Another Business (Andrew"s Blog 09/01/2011)
Makagiga / Download - To-do manager, notepad, RSS reader...
queXF | An Open Source, web based paper form verification and data entry system
myBill Project Site | Main / HomePage
I, Librarian - PDF manager for scientific articles
Open Source Articles, Tutorials and Licensing Information Wazi
Generating Web Charts with Gnuplot and Web Scripting | Wazi
How to use Conky for automatic system notification and administration | TechRepu...
Jeff Tranberry"s Digital Imaging Crawlspace
A Scoop of DNG With Your PIE | Lightroom Secrets
Feed Validator for Atom and RSS
Blogging is futile
ebook2cw - convert ebooks to Morse MP3s / OGGs
CloudStack | Open Source Cloud Computing
How to Setup and Use Github in Ubuntu | Ubuntu Manual
Downloads - slowhttptest - Slow HTTP DoS vulnerability test tool - Google Projec...
In Search Of The Missing IT Gene - Chuck"s Blog
BASIC programming on an Arduino - Hack a Day
Cisco IOS Hints and Tricks: BGP next hop processing
Deduplication Defense Dodges Sanctions « e-Discovery Team
Anki - friendly, intelligent flashcards
Why Amazon Can"t Make A Kindle In the USA - Forbes
With IT leadership, the "how" is as important as the "what" - O"Reilly Radar
» Linuxaria – Everything about GNU/Linux and Open source Enable automatic securi...
The Web Proxy Autodiscovery Protocol | Linux Journal
How-To: Release Stuck NFS Mounts without a Reboot | Linux Journal
cms-explorer - CMS Explorer - Discover the CMS components behind the site - Goog...
Convirture Products: Open Source
Tech Comics: "Mini Geeks" - Datamation
Deltasql wiki
check_mysql_health – ConSol* Labs
eSepak module for Asterisk PBX
Flite module for Asterisk PBX
SLEEPWORKER - no time to sleep
dupeGuru - Duplicate file scanner
Circuit Diagram - A Circuit Diagram Maker
NetHogs: What program is using that bandwidth?
HP-UX Logical Volume Manager (LVM)
HP/UX system administration
Useful SAN Commands | SAN Storage Commands | SanDuel.com
CH2M HILL - Home
Borges: Garden of Forking Paths - Author Homepage
Touch Droid
iConnect
The MIT Radio Society » The Flea at MIT
GE’s World War II Era “Copper Man” Gets His Due | GE Reports
A Fistful of Dongles: Advanced Persistent Threat
The eDiscovery Paradigm Shift: The Post Autonomy World
Addressing the Regulatory and eDiscovery Challenges of Social Media | e-discover...
Dirty Rotten Thieves Stealing Your Wifi? Find Out What They’re Looking At With T...
Micro-communities: Consume Better Content Faster! at #sxsw (voting time) | IdoNo...
Renovation - Home
eFanzines.com - The Drink Tank
Basic Home Networking, Part 3, File and Printer Sharing
Powershell Script Template & Out Line Logging Function to help get you started -...
Pan Historia Community for Collaborative Writing, Interactive Fiction & Role Pla...
DailyTech - .NET Framework "1935 Error" Cripples Some Users" Office, IE9 Install...
14-16 hours on this "project", including a wasted weekend day, between digging around online and implementing the suggestions.
Blackbuntu Linux | Penetration Testing Distribution
Main Page - WebOS Internals
Preware
WSUS Helper
Who"s Your "Ideal Average" Client
TZWorks LLC Prototype Downloads for Forensic tools
The Secret of the Fibonacci Sequence in Trees
Creating a Centralized Syslog Server | Linux Journal
14 Year Old Social Media Guru - Business Opportunities Weblog
The mind-mapping.org Blog » This blog is about software for mindmapping and orga...
TreeSheets
Freeplane - free mind mapping and knowledge management software
LinuxCon North America 2011 | Overview | Linux Foundation Events
Metalogic: Finance Explorer
Concert Photography Tips
ISC Diary | Putting all of Your Eggs in One Basket - or How NOT to do Layoffs
Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?
Diagnose and fix program installing and uninstalling problems automatically - Th...
Making A Case For Cloud: Perspectives From An IT Practitioner - Chuck"s Blog
For me, the whole cloud and IT transformation discussion has evolved to 10% technology, and 90% organizational mindset change.
Free Online Course Materials | MIT OpenCourseWare
OpenLearn - The Open University
TuDu, a tool to control your "to do" lists
#LinuxCon : Sessions You Don"t Want to Miss - InternetNews.
PLUG - Home
DerbyCon : Louisville, Kentucky – September 30th to October 2nd, 2011
Missie Krissie: Free Letter JPGs!
taidye.original: {printables}
*The Graphics Fairy*
Feed Your Soul: the free art project
EDD Update: Maryland Decision Raises New Cell Phone Issues
New eDiscovery Rules on the Horizon? | e-discovery 2.0
EDD Blog Online: The case for compliance as a cloud service
The History of ILTA | E-Discovery Resources & Information - DiscoveryResources.o...
The eDiscovery Paradigm Shift: Global 2000 Poll Results on Information Governanc...
Building Vagrant boxes with veewee | MDLog:/sysadmin
Telex: Anticensorship in the Network Infrastructure
Doug"s Oracle Blog
virtuallyGhetto: Automating the Search for Lopsided Bootbanks in ESXi 4.x
Windows Anti-Virus Exclusion List - TechNet Articles - Home - TechNet Wiki
Basic Home Networking - Part 2, wireless setup
Basic Home Networking - routers and switches
virtuallyGhetto: How to Automate the Upgrade of Classic ESX 4.x to ESXi 5
WoodITWork.com » SRM for free with PowerCLI & DataONTAP– Part 1: NFS
A history of Motorola: From a warehouse in Chicago to Google"s arms
"E-Discovery Evolution": Costs of electronic discovery are growing
Jumper One » electronic projects, tutorials, hardware hacking...
For Key Employees" Bad Faith, Intentional Spoliation, Court Imposes Adverse Infe...
IT Department Takes on Critical Ediscovery Role - EnterpriseStorageForum.com
How to Eat Healthy on a Budget
Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud : How Secure Is Your...
email2trac
Tinyproxy - A light-weight HTTP/HTTPS proxy
Love-Crumbs
Racket
Gargoyle Router Management Utility
How To Check .Net Framework Version Installed
Blocking Unwanted Parasites with a Hosts File
How-To: Replace Your Brake Pads - Cobalt SS Network
Fetchmail - Request Tracker Wiki
Engadget"s back to school guide 2011: tablets -- Engadget
Free Software and homeschooling: reports from the trenches | Stop
BYOD to work but be prepared for remote wipes and legal holds, says Unisys - Com...
Real World Computing: Converting DVDs to Good Quality AVI Files - Part 2 (The Pr...
wissel.net :: Neurotic Leadership Programming
A non-technical guide to understanding and fixing TCP/IP problems on a network
Real World Computing: Converting DVDs to Good Quality AVI Files - Part 1 (The Wa...
FireCAT: Firefox Catalog of Auditing exTensions | The News
PDF Bates-Stamping Solutions
MANDIANT: Intelligent Information Security | MANDIANT Redline
MoonSols DumpIt goes mainstream ! | MoonSols
Cepheid Variable | Geeks and nerds since 1969
Consumerisation of IT in Education: Twitter Exchange - The UK Higher Education B...
Tim O’Reilly: The Future of Business Intelligence is Now - Viewpoints - Site Hom...
Managing Global IT Change at the Speed of Thought - Viewpoints - Site Home - MSD...
Using Nagios from an Android Phone « UNIX Administratosphere
standalone [Zotero Documentation]
3 Things You Should Know About Your Windows 7 Firewall
Faregeek - special discounted and cheap tickets to worldwide, asia, africa, midd...
Why silently dropping mail is a bad idea - Terry Zink"s Cyber Security Blog - Si...
ABData, Andy Brunner - POP3 Collect
8 Best CAD Apps for Linux | Tech Drive-in
Business Plan Templates
Data Center Power Failure? | Michael McNamara
Cisco IOS Hints and Tricks: Building a Greenfield Data Center
The Signal Path » Frequency Generation: Crystals and Ring Oscillators
Inventgeek.com - Ultrasonic Aeroponic Seedling System - Overview
PetaPixel
After Riots, U.K. Prime Minister Floats Social Media Crackdown - Peter Kafka - N...
UK riots: text of David Cameron"s address to Commons - Telegraph
Hack Windows passwords using the Linux application chntpw RollingProgrammer();
Doc Searls Weblog · Bruce Elving, professor of FM radio
Snorby - All About Simplicity
Increasing the JVM Heap Size | The Informix Zone
Kevin Kelly on how technology evolves | Video on TED.com
The Undeletable SafeBoot Key « Didier Stevens
Is Glark a Better Grep? | Linux.com
Supercharge Nagios with Plugins | Wazi
Use the Focal Length Analyzer Script with digiKam « Scribbles and Snaps
Postini Message Analyzer - Postini Help
Compliance Management Solution | Q-Pulse
Lightning strike zaps EC2 Ireland | ZDNet
The TSA Blog: Weird Science: Traveling With Homemade Gadgets
naked capitalism
ISC Diary | Ping is Bad (Sometimes)
virtuallyGhetto: How to Persist Configuration Changes in ESXi 4.x/5.x Part 1
Training a Next Generation Geek | dominoGuru.com
Great scooby doo graphic
Tails - Privacy for anyone anywhere
Configuring regional settings automatically - UK Live@edu Blog - Site Home - MSD...
Consumerisation of IT in Education - The UK Higher Education Blog - Site Home - ...
This Other Eden
Keynote Speakers | 25th European Conference on Object-Oriented Programming
Summer School Talks | 25th European Conference on Object-Oriented Programming
DIY cable to build better iOS exploits - Hackers - SC Magazine Australia - Secur...
15 Things Kurt Vonnegut Said Better Than Anyone Else Ever Has Or Will | Music | ...
Free Worldwide Travel Guides - Wikitravel
SCOTTEVEST Travel Clothing Designed to Carry the iPad - Best iPad Accessory - Ca...
HackerTarget.com : Online Security Scan | Internet Security Vulnerability Assess...
Forensic Methods | Computer Forensic Investigations
Consortium of Digital Forensic Specialists
Wifi Network Backup Manager Utility - Shai Raiten
Less known Solaris features: About crashes and cores - Appendix B: ::status - c0...
Installing SP1 and June CU for SharePoint 2010 and Office Web Apps - Anything IW...
Profile Migrator - Windows user profile migration software
Migrating iTunes Media Library and User Preferences to a New Computer | sepago
Osaka - Japan"s amazing water city ‹ Japan Today: Japan News and Discussion
US map shows which states trend toward iOS versus Android | TUAW - The Unofficia...
Internals of Database Snapshot - Blogs from Suhas - Site Home - MSDN Blogs
Consumerization of IT: Where"s the Win-Win? - Viewpoints - Site Home - MSDN Blog...
Inspirational Quotes - Sources of Insight
IT Reels as Consumer Tech Rocks the Enterprise - Viewpoints - Site Home - MSDN B...
Web Books Listed by Title - A
The World Wide Web project
A Victa-ry for mathematics - The Age Education Resource Centre
Milking It: 5 Easy Homemade Cheeses | Wise Bread
A Fistful of Dongles: Detective Cindy Murphy’s Cell Phone Evidence Extraction Pr...
Understanding the Immune Response to HIV - Microsoft Research Connections Blog -...
The CIO vs. the Marketing Technologist - Viewpoints - Site Home - MSDN Blogs
How To Create an Ebook with OpenOffice.org | Wazi
ACEDS - Association of Certified E-Discovery Specialists | ACEDS.org
eDiscovery 101
No Debt MBA
Boot Camp Software Update 3.1 for Windows 64 bit
Boot Camp Drivers Update 2.2 for Windows
World’s Top Selling Cars by Country - Business Opportunities Weblog
Free Customized Business Plans for Small Business and Entrepreneurs at Enloop.co...
FinanceProfessor.com: How to use the Fama French Model | Empirical Finance Blog
Resistor Necktie — DIY How-to from Make: Projects
Networking: Duplicating Drops in structured wiring « Your Warranty Is Void.com
OpenDNS Datacenter Monitoring Station « NerdKraft
‪How to gain electronic parts using a soldering pot‬‏ - YouTube
gerbv - A Free/Open Source Gerber Viewer
Repairing T40"s battery
How to take a travelling electronics lab on the road with you - Hack a Day
Legal Guide for Bloggers | Electronic Frontier Foundation
Becoming E-Discovery Ready – An Introduction to Litigation Software for E-Discov...
10 Tips For Taming OS X Lion
What Is Thermal Design Power? [Technology Explained]
Tips for VMworld US 2011 & Las Vegas — The Lone Sysadmin
FinanceProfessor.com: ‪Geoffrey West: The surprising math of cities and corporat...
virtuallyGhetto: vSphere 5 Summary on virtuallyGhetto
virtuallyGhetto: New vSphere Health Check 5.0 & ghettoVCB Script
Fly or Drive Calculator™
Hipmunk: Better Flight and Hotel Search
Silverlight Version - detect the version of your silverlight
E-Discovery Made Simple – Electronic Discovery 101
Bit by Bit: Building a Better eDiscovery Collection Solution | e-discovery 2.0
Google Plus defines an era of disruption at a moment"s notice - O"Reilly Radar
How Good is Your Email Deliverability? :: AWeber Knowledge Base
Line Addressing with sed
Tech Comics: "Graph Theory for Geeks" - Datamation
WASP: The Linux-powered flying spy drone that cracks Wi-Fi & GSM networks | Geek...
Mutabor — Mutabor
Multi Colored Rack Components
ClamXav
Script to Collect Hardware Inventory Data : Brian Desmond"s Blog
Haskell - HaskellWiki
Build Blazing Fast PHP Websites with Memcached Distributed Caching
metro e technical overview - Google Search
003 - Cited by 55 - Related articles Metro Ethernet S
Software Carpentry
Thruk Monitoring Webinterface
How To Install, Secure, And Automate AWStats (CentOS/RHEL) | HowtoForge - Linux ...
Get pretty much anything done by awesome people | TaskRabbit
virtuallyGhetto: New vSphere 5 CLI Utilities/Tricks Marketing Did Not Tell You A...
virtuallyGhetto: How to Automate Host Cache Configuration in ESXi 5
How to configure system failure and recovery options in Windows
Giovanni Vigna
Java Tester - Other Testers
Troubleshooting wireless mouse and keyboard issues
How to troubleshoot Bluetooth detection and connectivity problems in Windows XP ...
20 craziest job interview questions on Shine
CSV file editor, for Windows
Citrix Survey – Organizations Are Realizing Significant Benefits by Adopting “Br...
Vagrant - Welcome
http://connie.slackware.com/~vbatts/minimal/
Make A Fillable Form In Word 2010 & Collect Data The Easy Way
Cerowrt - Overview - Bufferbloat
BlackBerry Bold 9780 User Guide Manual Apps Tips Help Troubleshooting & Demo
Decoding Intel’s Laptop Processor List [Technology Explained]
VMware Scale Up vs. Scale Out: The Big Picture — The Lone Sysadmin
Estate Planning Essentials: Preparing for the Unpleasantly Possible
SELinux Module Building — Fedora Unity Project
SELinux Policy IDE (SLIDE) - Trac
Handmade Copper Jewelry, Copper Necklace, Copper Earrings, Unique Copper Jewelry
virtuallyGhetto: Host Profiles Free in ESXi 5?
SourceForge.net: Integrating iTop with Nagios - itop
virtuallyGhetto: New vSphere 5 CLI Utilities/Tricks Marketing Did Not Tell You A...
The Blog of Helios: Can You Teach Computer 101?
VMware Communities: VMware View™ Bootcamp
Software Protection Initiative - Lightweight Portable Security
LDAP ToolBox (LTB) - Self Service Password
Easy LDAP management | LDAP Account Manager
Inside the Asterisk » Blog Archive » The Evolution of Asterisk (or: How We Arriv...
~mbuffer/ - the home of the measuring buffer
Organizing From Silos To Services - Chuck"s Blog
Hack-A-Vision: Sniffing Passwords Over a Wifi Connection [BETA/Linux]
How To Run Your Own DNS Servers (Primary And Secondary) With ISPConfig 3 (Debian...
How to build your own 135TB RAID6 storage pod for $7,384 | ExtremeTech
JPC-2
Silent or unattended installation - Microsoft Dynamics NAV Team Blog - Site Home...
Kagen Schaefer
Pipe Organ desk
My Open Wallet: How (Not) to Get a Job: A Personal Finance Blog About Money and ...
The Unix revolution—thank you, Uncle Sam?
JSTOR
VPN Troubleshooting
Westell
Small Basic 1.0 is here! - Computer Science Teacher - Thoughts and Information f...
Opening minidumps in Visual Studio—what to do when you get a “You cannot debug a...
Debug Diagnostic Tool 1.2 released - Tips and tricks: ASP.NET, IIS and .NET deve...
UMA Technology : Overview
TimeIT time tracker in Launchpad
Google Effects on Memory: Cognitive Consequences of Having Information at Our Fi...
Data Center Class WAN Optimization | Silver Peak Systems, Inc.
Peter"s blog: It"s official: developers get better with age. And scarcer.
AnonPlus - The Anonymous Social Networking Site.
Tim Bunce / Devel-NYTProf - search.cpan.org
Modern Backup 2 — Customer-obsessed next generation backup, archiving, and disas...
Speed matters: how Ethernet went from 3Mbps to 100Gbps... and beyond
Greg"s Cable Map
Scheme Maker - Summary
HotelDruid: Hotel Management Software
Appliance Parts at RepairClinic. 125 Brands. 365 Day Returns.
Sales Tax Holidays
HMC5883L Compass Tutorial with Arduino Library - Tutorials - Love Electronics
Gs & LTEs: Understanding Mobile Broadband [Technology Explained]
AVG - AVG Rescue CD Guide
WoodITWork.com » Thinking, Building and Scripting Globally – a London VMUG prese...
Index of /rescue_cd
Kaspersky Rescue Disk 10 Download
The Systems Engineer » Blog Archive » Quick vSphere Powershell to see total vCen...
Rescuing a corrupt NTFS partition (and giving Linux an n-th chance) - Saving the...
How to slipstream SQL Server 2008 R2 and a SQL Server 2008 R2 Service Pack 1 (SP...
Network Dashboard
Inverse Path - Research
How to Make a Vase out of a Plastic Bottle: 8 steps (with video) - wikiHow
Diffuse
IT jobs: Winners and losers in the cloud era
How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History ...
Process Photos with digiKam’s Batch Queue Manager and a Bash Script « Scribbles ...
^txt2regex$
Damn Small Linux: Still Damn Fun
Welcome to the Useless Information Home Page!
popHealth - An Open Source Quality Measure Reference Implementation
Edward Tufte’s “Slopegraphs”
LMMS - Linux MultiMedia Studio
Troubleshooting Slow Disk I/O in SQL Server - Jay"s notes on SQL - Site Home - M...
/dev/ttyS0 » Blog Archive » Reverse Engineering VxWorks Firmware: WRT54Gv8
A rough guide to JVM languages - O"Reilly Radar
RFC 6244 - An Architecture for Network Management Using NETCONF and YANG
SecureCentos.com
TiVo Superstore | Upgraded TiVo DVRs, Remotes, Parts, Repairs
Daemon & its sequel, FreedomTM - by Daniel Suarez
Setting Up Automated ESXi Deployments | vNinja.net
SSL Certificates DigiCert Digital SSL Certificate Authority
Steve Gibson
YUMI - Multiboot USB Creator (Windows) | USB Pen Drive Linux
Laptop and a Rifle
Electronics tutorial two-fer: soldering skills and wires - Hack a Day
Cybercriminals switch from MBR to NTFS - Securelist
The Backup Blog: Inside Avamar: Global Client Deduplication
Archiving CDs to ISO from the commandline | Linux Journal
Stories of Linux: Interview with Ian Murdock on Debian"s Early Days | Linux.com
htmLawed, script / software to secure / sanitize / purify / filter HTML / XHTML ...
Android Community - Tracking the Android Platform
Linux on 4KB-sector disks: Practical advice
Advanced Format Drives with SmartAlign – The Digital Den
Uzebox - The ATMega Game Console
Astronomy Picture of the Day
DOLPHIN - SLED Schematic Link EDitor
CYPHERTITE
HP ProLiant MicroServer series -  Download drivers and software - HP Business Su...
Timeslot: Plan Your Day
A Geek Raised by Wolves
Jamal B"s Blog - Infosec Mindstorm
How to remove duplicate files without wasting time | TechRepublic
Cheap Domain Names Registration, Domain Transfer, SSL Certificates, Free DNS, Pr...
Free Music Archive
Main Page - DP
Monitor & Enforce Security Policies - Data Otaku - Site Home - MSDN Blogs
Stupid PSH Trick: Diffing Lists - Lessons Learned - Site Home - MSDN Blogs
Thinking about Regular Expressions and Console.Writeline - Secret Microsoft Comm...
NTFS And 4K Disks - Ntdebugging Blog - Site Home - MSDN Blogs
WorldWide Telescope
Building a boot USB, DVD or CD based on Windows 7 with Winbuilder and Win7PE SE ...
HP ProLiant MicroServer Owners Club! - Overclockers Australia Forums
Weekend Project: Create Virtual Hosts with Apache | Linux.com
Windows7 installation Error 0xc0000225 VirtualBox on Ubuntu Linux | NW Linux
How to Quit Your Job | Wise Bread
Command-line Photographic Workflow on Linux « Scribbles and Snaps
yEd - Graph Editor
http://axel.alioth.debian.org/
NCSU News :: NC State News and Information » Model Finds Optimal Fiber Optic Net...
Advice From An Old Programmer — Learn Python The Hard Way, 2nd Edition
Learn Python The Hard Way, 2nd Edition — Learn Python The Hard Way, 2nd Edition
PdfMasher
Growler Collar: Dries clear & amber growlers for craft beer from breweries, brew...
AJ-Services
AJ-Services » Blog Archive » Internet Storm Center Infocon Status in Nagios
Teravolt.org
Network Heresy
pronto - Robust Networking Architecture
Battery Reconditioner
Firmenporträt seat-1 Software GmbH - Hersteller des Open Source ERP IntarS
Gigalomania
PowerShell Script Switches Printer Configurations Between Sites | sepago
Backing up a Mirrored database using SQL Agent - SQL Server Agent Team Blog - Si...
Tips for reducing help desk calls when upgrading to Office 2010 - Education - Si...
Two different approaches to testing a server - OneNote Testing - Site Home - MSD...
PowerShell Diversion #4: Discussion - richmac - Site Home - MSDN Blogs
SQL Tip of the Day - Objects, Services, and the rants of a lunatic operating out...
SharePoint Health and Monitoring - A Primer (practical techniques from the field...
Why DTCTester always fails on windows Server 2008 Cluster even DTCPing test succ...
Smarter Government – The Hybrid Organisation in Practice (FREE Whitepaper) - Mic...
DC fails logons or experiences LDAP timeouts - Spat"s WebLog (Steve Patrick) - S...
ISC Diary | How Good is your Employee Termination Policy?
Main Page - DAE Tools
Websecurify | Web Application Security Scanner and Manual Penetration Testing To...
Installing Nginx With PHP5 (And PHP-FPM) And MySQL Support On Ubuntu 11.04 | How...
COOPY: cooperative data
GNU Parallel - GNU Project - Free Software Foundation
ezblueprint.com
How Fast Can You Type? Develop a Tiny Utility in Bash to Find Out | Linux Journa...
Tornado Web Server
ZenMagick: Smart e-commerce
wissel.net :: How eMail encryption works and why it is an utter public failure
eHour - Timesheet Management
OpenProj Open Source Project Management Software — Serena Software
PDFedit - pdf manipulating library, GUI, tools
RedNotebook
Collabtive - Open Source collaboration
Yammer : The Enterprise Social Network
Uninstallers (removal tools) for common antivirus software - ESET Knowledgebase
IBM Lotus Domino and Notes Information Center
The great Lotus Notes installation guide
NetShelter CX - Product Information
Learn about EDI with EDI Basics
SecretSocial — conversations, uncut.
Analog engineering legend Bob Pease killed in car crash - 2011-06-20 17:25:32 | ...
Make: Online | Bob Pease
Analog by Design Show - Reality TV for Design Engineers
Wieldy » Homepage
SQL Server Benchmark tools and stress testing tools - Sriram"s 2 Cents - Site Ho...
Hibernation does not work after install of Windows 7 or Windows Server 2008 R2 S...
Run .Net Script activity fails for simple PowerShell script, why? - Yao"s Whiteb...
Equipment Needed to Get “Started” in Electronics - Hack a Day
DjVuLibre: Open Source DjVu library and viewer
Windows XP File Assocation Fixes
Tiff plugin
winisoutils - Windows ISO Disc Image Utilities
The Next Steps On The Road To Becoming A CSS Jedi Master
5 Baby Steps To Learning CSS & Becoming A Kick-Ass CSS Sorcerer
PreLoved Computers | Cheap Refurbished Computers & New Computers Parts
Wireless CCIE, here I come!: What"s in *my* backpack?
My Toolbag | Router Jockey
» What’s in my toolbag FryGuy"s Blog
My favourite tool in my toolbag! « Network Janitor
Code Browser - A Folding Text Editor
Mimo Monitors - Welcome
Why businesses move to the cloud: They hate IT | ITworld
TFS Integration Pack and Scripting using PowerShell - Yao"s Whiteboard - Site Ho...
Which VMs set your Slot Size ? « « Virtu-AlVirtu-Al
Moving my site to a XEN VPS at Linode.com
Diagramly - Draw Diagrams Online
OpenStudy – Make the World Your Study Group
courteous.ly: publish your email load
Microsoft IT Deploys Internet Explorer 9 - Nick MacKechnie - Site Home - MSDN Bl...
Simple grep in .net - Random thoughts of a dev - Site Home - MSDN Blogs
The Tactics of Making a Strategy - The Colorful and Gray World of Engineering Ma...
Why do IT Projects Fail? - Canadian Solution Developers" Blog - Site Home - MSDN...
Whats the backup compression in SQL server 2008 and how it can help to optimize ...
Quick & Dirty Usability Techniques for Developers - Susan"s Developer User Exper...
e-Discovery Team Training | In-depth legal education
organic fertilizer: viewing internet headers of emails in outlook 2010
Gartner Publishes First Magic Quadrant for E-Discovery Software | e-discovery 2....
KeepNote: Note taking and organization
Backup and Restore in SQL Azure - UK ISV Developer Evangelism Team - Site Home -...
What is Agile Results? - J.D. Meier"s Blog - Site Home - MSDN Blogs
IT is part of the business, but not for the reasons you think - Inside Architect...
WGet 2 for PowerShell - Huddled Masses
What"s in Your Tool Bag? - Packet Life
Foreign Language e-Discovery – An Introduction | E-Discovery Resources & Informa...
» Linuxaria – Everything about GNU/Linux and Open source Using a Rewrite in Ngin...
The Electronic Discovery Reference Model
E-Discovery Solution Offering - MIKE2.0, the open source methodology for Informa...
FreeEed
Open Source Could Change the Future of E-Discovery
Lenny Zeltser on Information Security
Mibble :: MIB Parser
Postini Message Analyzer - Postini Help
Cable Modems and Wiring Issues | DSLReports.com, ISP Information
wissel.net :: Ban the Urgentors!
On the changing role of PowerTOP « Arjan van de Ven"s blog
Index of /pub/linux/status/powertop
LessWatts.org - Saving Power on Intel systems with Linux
Free Geek Vancouver Volunteer Blog: Another hack: Wiretap picture frame
Get the Most Value Out of Your Luggage Deal
this 8-bit life - this 8-bit life
Dallas Makerspace
NetRexxSite
Welcome to Jenkins CI! | Jenkins CI
Monit | Monitor processes, files, devices and remote systems
Buildbot
Google voice - update, incoming and outgoing both from ATA - Free - sipsorcery n...
GWAVA: Trial Downloads of GWAVA products
E-Discovery Life Cycle - @Legal Discovery
Association of Information Technology Professionals -- AITP
aitprich
Liblicense: Licensing Digital Information
Main Page - Linux Mint
BlueCows
Linux in the Ham Shack
Shrubbery Networks - TACACS+ daemon
Lulz Security® (LulzSec) releases
JOSSO - Java Open Single Sign-On Project Home - Atricore
javascriptRRD - Client-side access to RRD files
Tiki Wiki CMS Groupware | Tiki Wiki CMS Groupware - Software made the wiki way.
Seccubus - Easy automated vulnerabilty scanning with Nessus and OpenVAS
Rob Hirschfeld"s Blog
TaciX in Launchpad
neatx - An Open Source NX server - Google Project Hosting
Open Source Two-factor authentication: The WiKID Community Edition — WIKID Stron...
Rundeck.org - Open Source Automation
Func
Cloud Installer (system wide, bare metal, system prereqs, components, networks) ...
cobbler - Trac
VMware Communities: Open Virtualization Format Tool
Deltacloud | Many Clouds. One API. No Problem.
Apache Libcloud Python library - Apache Libcloud is a standard Python library th...
jclouds
Sheepdog Project — Sheepdog Project
Welcome to xen.org, home of the Xen® hypervisor, the powerful open source indust...
BitNami: Open Source. Simplified
OpenTBS | freshmeat.net
scit - Simple Continuous Integration Tools - Google Project Hosting
Linode.com Xen Virtual Server Review « HostingFu
Linode - Xen VPS Hosting
GenPlay - Revision 354: /
Web Start - GenPlay, Einstein Genome Analyzer
Oxford Journals | Life Sciences | Bioinformatics
Getting started with Sage | Packt Publishing Technical & IT Book and eBook Store
iTUNES STORE - TERMS AND CONDITIONS
DailyTech - Digital Black Friday: First Bitcoin "Depression" Hits
Medsphere.org: Home
Grace Hopper Celebration 2011
POSSCON 2011 » Palmetto Open Source Software Conference
EtherPad: Open-Sourced!
EWB-USA
Home | Random Hacks of Kindness
The Humanitarian FOSS Project - Home
OpenMRS » Open source health IT for the planet
Humanitarian FOSS
Sahana Software Foundation
Humanitarian FOSS
open-zwave - An open-source interface to Z-Wave networks. - Google Project Hosti...
Androidclone.com » Laika
Adding and Removing SPClaimProvider via PowerShell - Shawn Cicoria - Site Home -...
SQL Server Black Box - Shoham"s Tech Blog - Site Home - MSDN Blogs
I, Cringely » Blog Archive » When Engineers Lie - Cringely on technology
Number of Physical & Virtual CPU’s per host & Cluster « « Virtu-AlVirtu-Al
Seth"s Blog: Email checklist (maybe this time it"ll work!)
Bleeding Edge - Install Major Apps Not Available in Ubuntu Software Center Easil...
The Fruits of DEX Begin to Emerge
Rowscope
AnandTech - ZFS - Building, Testing, and Benchmarking
Micro Center - Computers, Electronics, Computer Parts, Networking, Gaming, Softw...
The meanings and origins of sayings and phrases
Performance & Security for Any Website | CloudFlare | Home
Open thread: Super mario bros accapella by Jimmy Wong | Geek Feminism Blog
Linux Basement | Linux Lurking Beneath
tuxgraphics.org: A Digital DC Power Supply (programmable bench power supply unit...
SQL Server Virtualization, Consolidation and Private Cloud Resources - SQLOS Tea...
Tooling News: Web Application Configuration Analyzer Released - The Security Dev...
Chrome Experiments - Shaun The Sheep
Linux Canada
KwateeSDCM
marcelog PAMI: PHP Asterisk Manager Interface OOP Event driven client
App::Slackeria v0.1
phpMyFAQ homepage - open source FAQ software | welcome
Those non-IOS Files on the Flash. Are they useful ?
TestLink 1.9.2 RELEASED (2011-03-19)
www.chamilo.org | open source e-learning and collaboration software
Cisco IOS Hints and Tricks: What exactly is a Nexus 1000V?
Free Image TOOL: Image Composite Editor, this is the latest version as of May 26...
Microspeak: The planned unplanned outage, and other operations jargon - The Old ...
OSI model - Wikipedia, the free encyclopedia
Carl Malamud, in his book "Stacks," defines layers 8, 9, and 10 as "Money", "Politics", and "Religion". The "Religion layer" is used to describe non-rational behavior and/or decision-making that cannot be accounted for within the lower nine levels. (For example, a manager who insists on migrating all systems to a Microsoft platform "because everyone else is doing it" is said to be operating in Layer 10.)
A Human Factors Extension to the Seven-Layer OSI Reference Model
TouchStudio - Microsoft Research
Ingredient Pairings
Troubleshooting with the Microsoft Exchange RPC Extractor (or, the case of the m...
TKP Tips: Teaching the SmallBasic HOUSES recipe - Contagious Curiosity - Site Ho...
Where are all the IT jobs? Here: Fastest-growing skills in the fastest-growing c...
The year in IT/computer/telecom awards: 2011 timeline
TKP Tips: Making a SmallBasic runnable flash drive - Contagious Curiosity - Site...
Hints for better cleaning of homemade printed circuit boards.
YouTube - LCD Monitor Teardown
YouTube - Hard drive teardown
Introducing QueueMetrics Espresso || Loway
WindDbg – setting up symbols - UK Premier Support for Developers - Site Home - M...
Programming is for Girls - Computer Science Teacher - Thoughts and Information f...
Free Fast Public DNS Servers List
Data Cables | Adapters | Amplifiers | Antennas | Wireless Adapter Products from ...
Power Cords, Power Strips and Power Adapters
Synscan - Programs - arping
Analysis Services Operations Guide
Create Your Own Mac Fixit Toolkit
Microsoft Standalone System Sweeper Beta | Microsoft Connect
New IT Compliance Solution Accelerator – Now in Beta Release! - Nick MacKechnie ...
Kelverion Configuration Utility for OpConsole - Kelverion
Get your developers ready - Office 365 is coming - Education - Site Home - MSDN ...
PowerShell Diversion #3: Discussion - richmac - Site Home - MSDN Blogs
Gathering list of databases names from multiple SQL Servers - Simplifying Life o...
tuxgraphics.org: A Digital DC Power Supply (programmable bench power supply unit...
NYC Resistor » Electronics, Hacking, Classes, and Workspace.
OWASP Zed Attack Proxy Project - OWASP
schema.org - Home
How to succeed in IT without really trying | Data Center - InfoWorld
It so feels like 1999. :)
Move the VirtualCenter SQL database or migrate the VirtualCenter SQL database to...
Why do Group Policy settings require me to have a degree in philosophy? - The Ol...
Organizing MP3s based on metadata with TagLib# and IronPython - Saveen Reddy"s b...
Free Training kit for Sharepoint and Office365 - Secret Microsoft Communications...
Disk usage analysis and cleanup tools | Linux.com
QueueMetrics - Call center monitoring solution for the Asterisk PBX || Loway
Undelete Files on an ext3 or ext4 File System | everyday linux how2s
SHA1/MD5/MD4 bruteforcer for ATI and nVidia GPUs
Crypto-Gram Newsletter
Cisco IOS: What is VLAN 1002 - 1005 used for ?
naev - 2d action/rpg space game - Google Project Hosting
Does Free Software Restore Dignity? | PCWorld Business Center
Memory Inspector
2600 NEWS: HELP US COMPILE THE HACKER CALENDAR
mınutes.io — take it easy!
terminal.se - code
Switched Ports - DD-WRT Wiki
Encumbrance-free Telepresence System with Real-time 3D Capture and Display using...
OpenSchedule for Android - Android Market
Karmasphere Studio Community Edition
Pit : PIT Mutation Testing
Unzix - A WinZix archive extractor
Resource page for morse 2.4
How to create your own offline repository for Web Platform Installer with Powers...
Open office dilemma: OpenOffice.org vs. LibreOffice | Applications - InfoWorld
Index of /prog/masqmail
naufraghi / plow / source – Bitbucket
CityCamp Raleigh
File upload
Why “Bring Your Own Device” Is Seriously Flawed — The Lone Sysadmin
Learn XML in 4 Minutes | The Integration Engineer
SCPrompt 1.11.4.47 (Roll-Your-Own) Alpha Release - VNC2Me
Guide to setting up your own remote helpdesk with Single Click VNC - Lucas719.in...
How to name a SPN (part 2) - Authentication and Authorization - Site Home - MSDN...
I am root! – IP camera shell access - Hack a Day
sigil - A WYSIWYG ebook editor. - Google Project Hosting
Simple VGA interface for tiny FPGA boards - Hack a Day
The Store Sales Cycle: Your Monthly Guide to Clearance Prices | Wise Bread
markkerzner/FreeEed - GitHub
EDD Update: FreeEed Open Source eDiscovery Tool Debuts
Unofficial ReadyNAS Guides — Manuals for the NetGear ReadyNAS
antivirusmulti - a software which allows using multiple antivirus engine with mu...
SourceForge.net: viking
Get the Most Out of phpMyAdmin’s Visual Query Designer | Wazi
skype-open-source: Skype protocol reverse engineered, source available for downl...
Protected Mode Troubleshooting | Adobe Reader
Some Symantec Endpoint Protection configurations. Users should update to Symantec Endpoint Protection 11.0 RU6 MP2 or higher.
contagio
Experimental Error: Fetus Don"t Fail Me Now - Science Careers - Biotech, Pharmac...
CamStudio - Free Screen Recording Software
Big data meets big storage: an in-depth look at Isilon"s scale-out storage solut...
As a baby nerd, sitting in the back room of my parents" house and dialing into BBSs in the late "80s and early "90s, I dreamed of "big iron." Like Kevin Flynn, I tried to imagine what happened to my data on the other end of the phone line—where were the modem"s bleeps and hisses and scratches headed? What did that place look like? I imagined huge, frigid halls of raised floors under an actinic glare, populated by endless rows of towering, Cyclopean racks of complex equipment, studded with countless blinkenlights that sparkled off into the distance. More than any other experience, it was this desire to know what"s behind the curtain, to see and learn about the systems that provide service to other systems, that pushed me toward a career in IT.
VeroBoardUino Part Three – Crystal and Final Connections at Marengo
VeroBoardUino – Part 2.5 – Circuit Diagram and Parts List at Marengo
VeroBoardUino – Part Two – Serial Connector and Reset Button at Marengo
VeroBoardUino – How to Build an Arduino-Compatible Board for Very Little Money a...
Donate to the Ada Initiative: Seed 100 funding round opens – The Ada Initiative
About: OpenNode
Inventing Unix - IEEE Spectrum
STANTOR-DOMODULOR
m23 the OpenSource Linux software distribution and management system / m23 das O...
Drawing bearing and distance property line using C#/SVG/IE9/Visio (V2) - Feng Yu...
Managing Hardware Snapshots on Failover Clusters - Clustering and High-Availabil...
Buying a Home? Pay Attention to Property Inspection
Seth"s Blog: How to be interviewed
Apple"s North Carolina data center now visible on Google Earth
Quick tip : Diagnose DirectX problems - The blog of Rob Margel - Windows Help - ...
Netduino :: home
Installing across network may slow Visual Studio 2010 and Service Pack 1 setup -...
EasyTransfer Arduino Library « The Mind of Bill Porter
Analyzing Event Log Entries in PowerPivot - Analysis Services and PowerPivot Tea...
Physical Keygen: Duplicating House Keys on a 3D Printer | eclecticc
SNEAKEY ::: Key Bumping is for Hacks
The Project Road Map for 2010 has been released - Microsoft Project 2010 - Site ...
Cascading Style Sheet (CSS) Color Negatizing Script - Robert McMurray"s Blog [MS...
LCD: Replacing CCFL with LEDs - Hack a Day
Fun With the MAPI Spooler - SGriffin"s MAPI Internals - Site Home - MSDN Blogs
Kawamura Ganjavian - OSTRICH
Growing TFS databases - bharry"s WebLog - Site Home - MSDN Blogs
Performance Engineering Notes/Domino Applications
Client_Clock=1 Debug_Console=1 Debug_Outfile=
wansim - WANsim allows you to emulate a WAN connection - Google Project Hosting
Cisco IOS Hints and Tricks: EVB (802.1Qbg) – the S component
Map Values to Altiris Asset Management and Helpdesk Solutions | Symantec Connect...
SQL Server 2005 SP4, KBA 2463332, Installation Issues - Chaitanya"s Blogs -- SQL...
KisMAC - Welcome
Kismet
inSSIDer | MetaGeek
What"s killing your Wi-Fi? | Analysis | Features | PC Pro
MyOpenRouter : The Premier Online Community for NETGEAR"s WNR3500L & WGR614L Ope...
Froxlor - Server Management Panel - Home
Hardware for Linux - Home
Microsoft Safety Scanner - Remove Spyware, Malware, Viruses Free
whatsitworth-complete.pdf (application/pdf Object)
Flux - Enterprise Job Scheduler. Managed File Transfer. Data and Business Proces...
Le site officiel de Platypux
Nagstamon :: Home
Roundup Issue Tracker — Roundup v1.4 documentation
Paul Tarjan
One-Key Keyboard Hack
RECOLL: a personal text search system for Unix/Linux
MP: Lua CJSON
Automatic Footers: Toothless Legal Verbiage Causes Search Headaches | Catalyst E...
virtuallyGhetto: How to query for MACs on internal vSwitch on ESXi
Using the View PowerCLI cmdlets from another machine « « Virtu-AlVirtu-Al
Getting and Verifying SSH Fingerprints « UNIX Administratosphere
SandBox - Projects by Darkrose - Turious
Ensuring that a script runs as root only
Return Infinity - BareMetal OS
/etc/shadow format « UNIX Administratosphere
BaGoMa
SLR Camera Simulator | Simulates a digital SLR camera
Cracking a Skype call using phonemes
I, Cringely » Blog Archive » Geeks like me: What’s Engadget really worth? - Crin...
How To Recover Lost Files In Dropbox
Monitoring Social Media for Security References to Your Organization
SPAuto - Home
Microsoft IT SharePoint 2010 Deployment Using Automated Processes
Arabic a Complex Script - Developing Arabic applications should be easy! - Site ...
Internet Explorer 8 keyboard shortcuts
Internet Explorer 9 keyboard shortcuts
Translating Ada Lovelace - mathematical science is an instrument - Matthew van E...
Meet the Top 20 Mobile Networks in the World Mobile Technology News
How to Avoid Moving Scams | Wise Bread
GoldenEggs x86-64 Servers
securactive/junkie · GitHub
Clzip - A C language version of the lzip lossless data compressor
LepoLand - A Blog by Alan Lepofsky - Why Twitter Annoys Me As A Discussion Tool
Virtual Floppy for Windows
AnandTech
The Tech Report - PC Hardware Explored
chrysocome.net - RawWrite for Windows
Here We Go Again: How to Tell a Bubble When you See One - ConsortiumInfo.org
Build a DIY brushless motor controller in a day (ish) - the spingarage blog
Lithium-Ion (LiIon) & Lithium polymer (Lipoly) battery tutorial
Simple Bench Power - Hack a Day
Tools: Saleae Logic, logic analyzer - Hack a Day
Zentyal - The Linux Small Business Server
Digaboard
Overview | Onepoint - Project and Resource Management | Innovation means Change
OpenKM Document Management System | Open Source DMS - Home
scapy.pdf (application/pdf Object)
Deckmaster
Mafait.org - project Thinknowlogy - Artificial Intelligence by Design • Designed...
massXpert | Main / HomePage
Fun with ethtool | Linux Journal
Keynotopia: User Interface Design Libraries for Keynote, PowerPoint and OpenOffi...
Opendedup
Doug"s Windows 95/98/Me/XP/Vista Tweaks and Tips
Windows 7 Power Free
Acc2010: You receive error "The database cannot be opened because the VBA projec...
Exclusively for PayPal Customers | HopShopGo
How To Change & Fix Broken File Type Associations In Windows 7
scrumblr
Nagios plug-in development guidelines
Sysadmin ramblings
Nagios Config to monitor ReadyNAS Devices - comdivision consulting tech wiki - C...
Jan-Piet Mens » Gathering Replica Information from Domino"s cldbdir.nsf
http://www.readynas.com/download/SNMP/READYNAS-MIB.txt
wkhtmltopdf - Convert html to pdf using webkit (qtwebkit) - Google Project Hosti...
Jan-Piet Mens » Monitoring a ReadyNAS NV+ with Nagios
Nagios SNMP Monitoring plugins | Download Nagios SNMP Monitoring plugins softwar...
fgp/AirReceiver at STABLE_1_X - GitHub
OsmocomBB
BlueProximity - GNOME Bluetooth device distance detection and automatic locking ...
Why every technician should own a Dremel Stylus « The Angry Technician
Profile Migrator is Part of Project Morpheus | sepago
Experience Project Morpheus » ocb - Citrix Community
Trojan Feigns Failures to Increase Rogue Defragger Sales | Communauté Symantec C...
xoscillo - A software oscilloscope that acquires data using an arduino or a para...
Real World Computing: How to Do a Mail Merge to Email using Lotus Notes
BlackBerry Today | Spiked Studio Productions
SCCS - The POSIX standard Source Code Control System.
Helge’s Profile Toolkit | Helge Klein
IBM Lotus Domino and Notes Information Center
Sed - An Introduction and Tutorial
Literature.org - The Online Literature Library
FAI - Fully Automatic Installation
System Administrator Interview Cheat Sheet
Operational Efficiency – Free SQL Server Licensing Guide from Independent Analys...
Scholarly HTML | Guidelines and tools for web based research and scholarship
community broadband networks | Helping Communities Achieve True Self-Determinati...
Super User Blog
Windows 7 Network Awareness: How Windows knows it has an internet connection - S...
How Windows 7 Network Awareness works
Tact Filters
MSDN Subscriber Downloads - product availability depends on your subscription pr...
New Microsoft TechNet things
Japanese Cellular Phones FAQ
Web Deployment Made Easy: Seriously - Palermo4 on MSDN - Site Home - MSDN Blogs
System.Data.SqlClient.SqlException: Login failed for user "NT AUTHORITY\ANONYMOU...
Diagnose and repair sound playback and recording problems automatically - The bl...
Possible cause of error code 1719 or 1723 when installing a 64-bit MSI - Aaron S...
NuGet Project on OuterCurve
SharePoint 2010: people picker issue "There was an error in the callback" - ISG ...
MSDN Blogs - Free sharepoint
Separation of Duties for DBA customer ready white paper - My Application Platfor...
SharePoint Adventures : ADFS Setup – Part 1 - CSS SQL Server Engineers - Site Ho...
Cainteoir Text-to-Speech — Listen to and Record ePub and HTML ebooks
Nagios & Icinga Plugins - Transitiv Technologies
» Linuxaria Nethogs, Iptraf – for network statistics
Testing in Python using doctest | Packt Publishing Technical & IT Book and eBook...
Ubuntu 11.04 Unity Keyboard Shortcuts and Tricks - Softpedia
The New Domino Admin » Blog Archive » BES Server: Upgrade to 5.0.3 MR2 Gone Wild...
Fixing Lotus Notes so the inbox opens by default | Chris Gonyea
Facebook Download is Self Collection | The Many Faces of Mike McBride
TortoiseHg
Speeding Up SSH Access « UNIX Administratosphere
Google Sets
Notes
Dan Carlin - Hardcore History
Sandboxie - Sandbox software for application isolation and secure Web browsing
The Modern Day Pirates | Category Archive | Laughing Historically
BBC - A History of the World - Home
BackStory with the American History Guys | VFH Radio at the Virginia Foundation ...
Binge Thinking History Podcast
Matt"s Today In History on Mevio
History According to Bob | History Podcasts
BBC - Radio 4 - In Our Time - Homepage
History on Air
MySQLDumper - Backup your MySQL-Database (e.g. forum, guestbooks and online shop...
New & free: Delprof2 - User Profile Deletion Tool | sepago
virtuallyGhetto: Semi-Interactive automated ESXi installation
HA and DRS Audit « « Virtu-AlVirtu-Al
Repair Messed Up EXE File Association - The Grim Admin
Stylesheet Limits in Internet Explorer - EricLaw"s IEInternals - Site Home - MSD...
Time Management Checklist - J.D. Meier"s Blog - Site Home - MSDN Blogs
Packeteer PacketShaper: Inbound, Outbound, Inside and Outside. Which is which ?
Project Freelancer
25 Easy Organizing Changes You Can Make Today | Wise Bread
Empathy - GNOME Live!
Ekiga ~ Free Your Speech
Linphone, open-source voip software | Linphone, an open-source video sip phone
Thymer - Super easy Planning, Task and Project Management
Time Synchronization and Domain Controller VM"s - Hyper-V notes from the field -...
How to eliminate tempuri.org from your service WSDL - Ron Jacobs - Site Home - M...
SQL Server Compression Estimator - Home
BoxCryptor :: On-the-fly Encryption for cloud storage
VidCoder - Home
NETRESEC Products - Tools and Applications for collecting and analyzing network ...
Arduino Tutorials « t r o n i x s t u f f
FreeNAS 8.0 | Storage For Open Source
IBM - Understanding the Full Access Administrator Feature in Domino Release 6
Maven License Verifiery plugin - Introduction
The New Domino Admin » Blog Archive » Lotus Domino Clusters: Code To Scan Mail F...
cabextract
SwarmTV Introduction
WiKID - Rhymes with Wicked. — WIKID Strong Authentication
Reportico Open Source PHP Reporting Tool
SimpleHRM
flophase - simple cash flow management
SharePoint Connoisseur: SharePoint 2010 Warm up script comparison
Thank You, Kim! - Vibro.NET - Site Home - MSDN Blogs
What does the different colours of the address bar in IE9 mean - The blog of Rob...
AtomicParsley
Jim Breen"s Japanese Page
MS Mincho font
Error Codes (Windows)
How to remove malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, T...
Download details: Microsoft Product Support Reports
Microsoft"s Premier Support Reporting Tool will save time and your sanity | Beta...
Mix-It-Quik Concrete Mixer, Cement Hand Mixing Tool
LetoDMS is an open-source, web-based document management system.
Secure FTP, SFTP Server, & Secure File Transfer Software
Main Page - Observium
Omniback for the System Administrator
AppleCrate II: A New Apple II-Based Parallel Computer
CloudBees: Cloud Platform as a Service for Java Web Apps, Supported Jenkins/Huds...
Hudson Continuous Integration
Jenkins! | Jenkins CI
hudson fork
Regmon by Sysinternals.com
Windows Double Explorer
38 Life Lessons I’ve Learned in 38 Years | zen habits
Managing IT….people – Storagebod
Building Configuration Policy Checks, Part 1 - Applied Infrastructure
Truly agile project management with GreenHopper for JIRA
Final Computer Related Examination Patent Guidelines (BitLaw)
Batch Renaming Files With Windows PowerShell | Thu 28 Apr 2011 | Blog | CodeStor...
LAW PreDiscovery
What is it ?
UNIX Utility of the Day: watch — The Lone Sysadmin
KCMENU- Unix Menu Program (Perl)
Script to Reset WSUS for SysPrep"ed Image - Random Musings of Jeremy Jameson - S...
SQL Server Installation : Useful tools - Chaitanya"s Blogs -- SQL Developer find...
How to automate a command line utility like DiskPart (vbscript) - Decrypt my Wor...
Broadcast Storm - The Cisco Learning Network
Of Clouds And Perceptions Of Risk - Chuck"s Blog
Linux Defense in Depth | PCI Compliance Articles & News
openpom | freshmeat.net
Monitoring Plugins
The AWS Outage: The Cloud"s Shining Moment - O"Reilly Broadcast
Design for Failure
Replication of this database is not permitted - By Ulrich Krause - eknori.de
Ubuntu Linux boosted by 10,000 seat PC win | ITworld
Upgrade Your Linksys Router, Literally! - Darwin Mach
iPhoneMap: iPhoneTracker port to Linux
AWS Service Health Dashboard - Apr 23, 2011
DeTraS | Download DeTraS software for free at SourceForge.net
DSIRE: Incentives/Policies by State
Is It Better to Buy or Rent? - Interactive Graphic - NYTimes.com
Another IPv6 Crash Course For Linux: Real IPv6 Addresses, Routing, Name Services...
What is WRITELOG waittype and how to troubleshoot and fix this wait in SQL Serve...
The real “legacy” network adapter - Virtual PC Guy"s WebLog - Site Home - MSDN B...
Why am I getting prompted for Credentials? - CSS SQL Server Engineers - Site Hom...
Largest use of Whitebox Fuzzers finds GIANT number of security bugs in Windows 7...
University of Wisconsin, Madison finds GIANT number of security bugs during Wind...
Learning With Visualizations - Computer Science Teacher - Thoughts and Informati...
Administering GP Security - Dynamics GP Support and Services Blog - Site Home - ...
Research: What is Automated Reasoning - Sam Stokes on Research in your life and ...
SproutCore Blog - SproutCore 1.5 Released
Setting your machine power plan via Powershell –repost - SharePoint Infrastructu...
64 Logical Proce...
Update to the F# 2.0 Free Tools Release, Corresponding to Visual Studio 2010 SP1...
sec-wall :: Home
conman - ConMan: The Console Manager - Google Project Hosting
PowerShell Diversion #1: Discussion - richmac - Site Home - MSDN Blogs
MSDN Magazine Digital Magazine Downloads
TechNet Magazine Digital Downloads
Seth"s Blog: Get better at buying
Tinkernology: Four Lego Delta Robots
THE VIEW Online Knowledgebase
THE VIEW -- 7 Ways to Ease Users’ Transition from MS Outlook to Lotus Notes
The switch from Microsoft Outlook to IBM Lotus Notes is typically the result of a business decision or acquisition, so most users don’t get a choice in the matter. And although there isn’t much you can do as a Domino administrator to affect the culture of an organization during this change, you can do a great deal to ease the transition from Outlook to Notes so that users can be productive right away:
(de) Fortunes::Flashrider v0.90 (BB-Styles Edition)
Heilbrunn Timeline of Art History | The Metropolitan Museum of Art
Conflict History | 1265-1267
World History
Kings Quest III: Remade & Ready To Rock [Mac & Windows]
4 Ways To Reduce The Size Of A PDF File
2 Effective Ways To Browse Through Google Reader Feeds
ERUNT and NTREGOPT
Storybook - Open Source Novel Writing Software for Novelists, Authors and Creati...
Practice your personal Kaizen
Nagios and the Ampersand Character in URLs « UNIX Administratosphere
sed is truly ancient, yet many Unix folk use it daily.
Cisco IOS Hints and Tricks: Distributed firewalls: how badly do you want to fail...
Cellebrite - Mobile Forensics and Data transfer solutions - Mobile Forensic Prod...
SSRN-Ghosts of 1932: The Lost History of Estate and Gift Taxation by Jeffrey Coo...
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 FP1: Code To Fix All Da...
Lotus Notes R8.5.1 FP1: Code To Fix All Day Events Created in a Different Time Zone (That Are Currently Messing Up Your Busytime)
Download Install Full Version of Internet Explorer 6.0
"C:\Windows Update Setup Files\ie6setup.exe" /c:"ie6wzd.exe /d /s:""#E"
NagiosQL | Webbased Nagios and Icinga Administration
Arduino geiger counter brings open source radiation detection to the geeky masse...
How to automatically replace files when updating WordPress | Free Software Tips ...
Blue Microphones
Webcast Testing Site
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 FP1: My Simple Solution...
Your iPhone is silently and constantly logging your location
Speed up large MySQL backup, dump, restore processes | Linux Admin Zone
Stresslinux
Dradis - Effective Information Sharing
Where is ASP.NET 3.5 on IIS ? - The Way I See It - Site Home - MSDN Blogs
ZFS Backup & Recovery using Hadoop HDFS « Cuddletech
Parasitic Hadoop - c0t0d0s0.org
Erase a CD like a boss (video) -- Engadget
Opus Domini for mac
uraniacast
Online Scrum Tool / Agile Software Development Management Site
There and Back Again... - Blog - Bill"s Blog
BLDGBLOG: Islands at the Speed of Light
Islands at the Speed of Light
The Master Gardeners
The origin of CTRL-ALT-DELETE - Hack a Day
Hacking Cisco
organic fertilizer: sccm: client stuck downloading package with bit .tmp files i...
IEZoneAnalyzer v3 - Microsoft"s USGCB Tech Blog - Site Home - TechNet Blogs
Negotiating Your Salary: How to Make $1,000 a Minute
pydnsadmin - Python class to administer DNS servers effectively - Google Project...
STAsoft.net | The key to the success
Thinkmap Visual Thesaurus - An online thesaurus and dictionary of over 145,000 w...
FAN 2.1 available
Get Help with Microsoft Excel Tips, Excel Tutorials from a Spreadsheet Addict
Welcome to Cloud Foundry
U.S. scientists unveil worlds first computerized human brain map
Your first PDF form with Scribus - Scribus Wiki
gpEasy CMS Home - gp|Easy CMS
Raptor 2.0 - Forensic Acquisition and Preview - Simplified
SQL Server Customer Advisory Team - SQL Server Best Practices
DiscRotate by Georg Wacker
Evince – Simply a document viewer
Unlogic.se - Eagle DNS
DBeaver
jhl::mafipulation
Gluejar, Inc.
Cloud Scenarios Hub on TechNet - J.D. Meier"s Blog - Site Home - MSDN Blogs
CIPE - Olaf Titz
Tips and Tricks: Templates, your shortcut to becoming an expert - Microsoft Proj...
Printers and Photocopiers Solutions: Paper Charactiristics, Standard Sizes and C...
autoplot.org - Main Page
The Top 10 Movies for Computer Science Students | Online College Tips - Online C...
C-Kermit 8.0 - Interactive Communication, File Transfer, and Scripting across Se...
Open Compute Project
How To Use Microsoft Word Mailings To Automate Emails
My Top Lessons Learned as a Computer Technician | Technibble
organic fertilizer: misc: offering remote assistance in windows 7
The Role Of Service Providers In Breaking The Stockholm Syndrome - Chuck"s Blog
You spent HOW much on our new server and the app slowed DOWN??!! - Notes from a ...
Rip, Watch and Organize Everything: The Ultimate Media Guide
Banshee » Banshee 2.0.0
Elderly Georgian lady disconnects Armenian internet for half a day... by acciden...
Free Academic Open Access Books, Journals and Research Papers | InTechOpen
Teach Yourself Programming in Ten Years
Migrating Windows: What data contains your roaming profiles? – Use Powershell to...
Exploring NDIS’s WMI classes - The NDIS blog - Site Home - MSDN Blogs
Negotiating 101: The 5 Buyers You Meet In Hell | Wise Bread
iClarified - Finder
Diagnostics with Event Viewer - The NDIS blog - Site Home - MSDN Blogs
Diagnostics tools in NDIS - The NDIS blog - Site Home - MSDN Blogs
KB16270-Drafts do not synchronize with the BlackBerry smartphone
ST EDI Enveloping | The Integration Engineer
What is the GS segment? | The Integration Engineer
What is in the ISA? | The Integration Engineer
EDI Enveloping Part One - How it works | The Integration Engineer
EDI Primer - find the answers to EDI here. | The Integration Engineer
X12 Technical Tutorial - Syntax and Control
http://publib.boulder.ibm.com/infocenter/wtxdoc/v8r2m0/index.jsp?topic=/com.ibm....
X12 Properties
VMware Communities: vSphere 4.1 Hardening Guide
VMware Communities: vmwarevSphereSecurityHardeningReportCheck.pl 1.5
Seth"s Blog: Who"s responsible for service design?
In my experience, most of the problems are caused by ignorance and isolation, not incompetence or a lack of concern.
A Fistful of Dongles: An Interview with Shafik Punja
Great list of tools, books, etc
iPhone backup with iTwin | Contacts and SMS - Save and Export !
iPhone Backup Extractor for Windows and Mac
ipddump - Extract your information from a blackberry backup IPD - Google Project...
Mena Step Innovative Solutions - Magic Berry IPD Parser
Peter F. Hamilton
Download details: Microsoft iSCSI Software Target 3.3
Microsoft iSCSI Software Target 3.3 for Windows Server 2008 R2 available for pub...
en:start [FusionDirectory Website]
How to Compute Basic Statistics with R - O"Reilly Answers
Tintri - Storage for VMs
OSSEC and VMware
SAP on HP-UX Best Practices - Part 1
jHepWork
Data Visualization Software | Tulip
Gambas - Gambas Almost Means Basic
Scaling and Queuing PowerShell Background Jobs - Windows PowerShell Blog - Site ...
Enable Display Mirroring on First generation iPad | Nature"s Eye Studios
Veusz - A Scientific Plotting Package
OpenShot Video Editor
Splashtop Remote Touchpad for iPhone 3GS, iPhone 4, iPod touch (3rd generation),...
Highly Useful Resources for Android App Development | TechSource
ExhibitCore Floor Planner
The Ultimate Guide To Managing Batteries On Location | DIYPhotography.net
32- and 64-Bit Connectivity from the Same Machine - Microsoft SQL Server Develop...
Loading SQL Server Snapins into your PowerShell Session - Dan"s Blog - Site Home...
ruddigkeit.net » Applying a Fix Pack to Lotus Notes on USB (Nomad)
Mondrian - Interactive Statistical Data Visualization in JAVA
Discover Microsoft Office 2007 & 2010 - Microsoft UK Faculty Connection - Site H...
Opalis Community Releases
HP ProLiant Server and BladeSystem Management Packs for Microsoft System Center ...
blog.opennebula.org
http://william.leibzon.org/nagios/
Nagios Exchange - check_netstat
WMI Query Tool : random.geek()
ciphron - advanced security: Downloads
Interesting Projects–A Collection - Computer Science Teacher - Thoughts and Info...
virtuallyGhetto: How to automatically add ESX(i) host to vCenter in Kickstart
Update SQL Server Statistics with Powershell - olivier pieri"s WebLog - Site Hom...
Moving to the Cloud - the Microsoft experience - Education - Site Home - MSDN Bl...
Managing Local Backups with Windows Server Backup : Brian Desmond"s Blog
O"Reilly Commons - WikiContent
lnacls
Monster Savings – Delivering Costco Savings to Your New York City Home or Office
iPhone, iPad, iPod touch: Supported Bluetooth profiles
HFP
Bluetooth profile - Wikipedia, the free encyclopedia
TRUPAX.COM - Download
Cisco IOS Clocks and NTP - Packet Life
AFCEA International - The Armed Forces Communications and Electronics Associatio...
Official Site Of Andy"s PHP Knowledgebase Project
Computing pioneer Jean Jennings Bartik dies | Ghanamma.com
Texttest.org
Papers in Computer Science
TIMELINE: A Nuclear Crisis Unfolds In Japan : NPR
How does a NIC inside a VM get a MAC address assigned? - Hyper-V notes from the ...
7 Nutrients You Need More Of | Wise Bread
VirtMus - the modern music stand
How to Increase Productivity By Reordering Your Office | GrokCode
Internet Explorer 9 Compatibility Cookbook (Windows)
SQL Server backup and powershell - olivier pieri"s WebLog - Site Home - MSDN Blo...
Hiring for the Future ... Cloud Expertise is a MUST. - MICROSOFT GULF COMMUNITY ...
Project 2010 Help Content – Now Available for Download - Microsoft Project 2010 ...
Yet Another Wit Frontend in Launchpad
graphical
Cbeyond Small Business Phone Service & IT Solutions
Control Your iPad with Bluetooth Mouse (also Work on iPhone) | The iPhone and iP...
cydia
21 Ways to Excel at Project Management | Project Smart
Read only USB stick trick
InMaps: Visualize the different sources of your LinkedIn connections
3 Ways To Meaningfully Visualize Your LinkedIn Network
Amazon price tracker, Amazon price history charts, price watches, and price drop...
Delta pilot recounts overwhelmed Japanese ATC on day of earthquake - Flight Inte...
» Buying a Safe: Understanding UL Safe Ratings
Tax Tips for the Freelancer
Web Deployment with VS 2010 and IIS - Visual Web Developer Team Blog - Site Home...
YouTube - HOW SETUP DOMINO 8 0 WEB ACCESS
Derks.IT: Tools
Minerva - The Premier Home Automation Suite and Smart Home Software for Linux
Tutorial: Translating Scanned Docs | Linux Journal
My Green Paste, Inc.: Image File Execution Options: Good, Evil, Fun.
Image File Execution Options
Circuit Diagram
TinyButStrong - PHP Template Engine
JRecord
http://xkcd.com/radiation/
RKWard
100 Oldest .COM domain names
Font Association Part I: A Primer - Global Developer Blog - Site Home - MSDN Blo...
ForensiT Free Downloads
inhouse-web - Web based time recording and management application - Google Proje...
Wandora - WandoraWiki
Layering the info seems to be the differentiate.
Rustock Botnet Flatlined, Spam Volumes Plummet — Krebs on Security
Layer 8: NASA satellite snaps rare cloud-free emerald Ireland
EMC PowerShell Cmdlets – Where to start « « Virtu-AlVirtu-Al
How To Create The Ultimate Boot CD For Windows
Enterprise Configuration Database :: An Open Source Approach to Configuration Ma...
iTop - Home
NavalPlan - Open Web Planning: NavalPlan
marcelog PAGI: PHP Asterisk Gateway Interface OOP Client
The Virus Turns 40
youtube-dl
To 1433 or not to 1433...that is the question - CSS SQL Server Engineers - Site ...
Web Performance Tips: 10 JavaScript Best Practices - Dr. Doris Chen"s Blog - Sit...
PowerShell Using Threads in C# to Launch a Process and Read Output Streams - Not...
Domino Admin for Beginners -- Final
Corporate Social Media Policies: The Good, the Mediocre, and the Ugly | Fast Com...
Research Master - Asymptopia Software
A Brief History of Notable Internet Disruptions - Packet Life
PSPad - free unicode developer editor, handles near any syntax like HTML, PHP, X...
Official nuBuilder Home
GNU Telephony
How to Get and Give Honest Feedback | Wise Bread
Programming Bad Performance « The Network Therapy Blog
10 DIY Dog Toys You Can Make for Pennies | Wise Bread
Clearwell Streamlines the Legal Hold Process with the New Clearwell Legal Hold M...
How to Avoid Getting Hired | Wise Bread
Installing Visual Studio 2010 Service Pack 1 may prompt for source - Heath Stewa...
IE9 Shortcuts - thebeebs - Site Home - MSDN Blogs
Introspection – evaluating talent, part 1 - Terry Zink"s Cyber Security Blog - S...
It"s Pi Day. Do you know what 3.1415926535897932384626433832795 sounds like? -- ...
Counting and Creating Sums with awk
7 of the Best Free Graphical User Interfaces for R - Linux Links - The Linux Por...
{CWoC 2010} A Scripting Guide to Simulating Agent Workload on the Notification S...
Junkyard Jumbotron
din is noise
Compliance Risk Management: Ethical & Workplace Compliance Solutions
Texmaker (free cross-platform latex editor)
Google"s quest for eight habits of highly effective manager - The Economic Times
Cheap Car Rentals - AutoSlash
UrBackup - Client/Server backup system for Windows and Linux
Imaging Windows 2008 Server - Alex Tcherniakhovski - Security - Site Home - MSDN...
The emergency internet bunkers | Security | Features | PC Pro
Four more reasons to come to the PowerShell Deep Dive - Windows PowerShell Blog ...
Power Saving Options on SQL Server - Cindy Gross - Troubleshooting, tips, and ge...
How to check current installed version of PowerShell? - Brijs Blogging... Lookin...
Before you install Windows 7 Service Pack 1... - Random Musings of Jeremy Jameso...
Home automation and lighting control with Kinect - nitrogen"s posterous
Windows 7 Service Pack 1 install failures common? « Tim Anderson’s ITWriting
Change VM Video Memory « « Virtu-AlVirtu-Al
Japan"s Quake And Tsunami "Beyond Our Imagination" Eyewitness Says : The Two-Way...
teho Labs | KiCAD Tutorial
Vanilla: Analysis of a Domino NSD report - howto
Super Flexible File Synchronizer for Linux
Movgrab - Colum"s Code
Google Person Finder (消息情報): 2011 日本地震
Person finder for March 2011 earthquake
Zen Load Balancer V1 rc1 is released
LFT | freshmeat.net
Giada | your hardcore loopmachine by Monocasual
Partclone
Prime | Download Prime software for free at SourceForge.net
puddletag - Home
Automating Telnet and SSH - GitHub
DDMSence: An open source Java library for DDMS
MCG, the eMail Configuration Generator for procmail and mutt | Free Software Tip...
Seldom a love story: IT and end users - O"Reilly Radar
CloudSight -- by Backupify
ToneCheck
Lazygal
Third-party USB hubs may incorrectly disconnect after wake from sleep, causing s...
CSC Takes Cloud Seriously - Chuck"s Blog
Stream Spigot : Feed Playback
Enabling ESX SSH via PowerCLI « « Virtu-AlVirtu-Al
Paul"s Extreme Sound Stretch
thaberkern/timehive - GitHub
reCsvEdit
GPuTTY | freshmeat.net
wissel.net :: Who has access to your certifier?
Linux wireless LAN support http://linux-wless.passys.nl
QPaMaT - Password managing tool for Unix, Windows and MacOS X
dupeGuru Picture Edition - JPG, PNG, TIFF, GIF, BMP duplicate scanner
How do I use WinDBG Debugger to troubleshoot a Blue Screen of Death? | TechRepub...
Free Techie Blog
VMware Powershell – Find the number of Windows VMs | Free Techie Blog
Disable Nepomuk (Desktop Search) on KDE 4.4.2 Kubuntu Lucid 10.04 | Free Techie ...
Weekend Project: Set Up a Personal Wiki on Linux with TiddlyWiki | Linux.com
VirtualBox/SharedFolders - Community Ubuntu Documentation
Gestalt IT
Auto-Nooter 3.0.0 (1.1 only) - xda-developers
Near Field Communications: a technology primer
CCIE_RS_Quick_Review_Kit.pdf (application/pdf Object)
wissel.net :: Manager vs. Engineer
David Bilinsky - Thoughtful Legal Management
Speccy - System Information - Free Download
ISO Workshop - Extract, Backup, Convert, Burn your Disc Images
Fast Copy 2 speeds Windows file copying | Software News - Betanews
The Tech Convention Survival Kit | Tech Gear News - Betanews
This is Indexed
wfrog - Project Hosting on Google Code
Nixory - Antispyware tool for Firefox, IE, Chrome
TOMUSS: The Online Multi User Simple Spreadsheet
IE6 Countdown
List of GSM cell phone frequencies in use by country
List of Cdma Mobile Operators,Carriers and Networks By Country- Africa,Europe,Ca...
This I Believe | A public dialogue about belief — one essay at a time
NounProject
6 Inspiring & Funny Blogs You Should Read If You Are A Parent
Snippet Designer
More Young People Scorning Sex, Study Finds : Shots - Health Blog : NPR
"The more sensitive the questions, the more both sexes only want to talk to a woman,"
FAQ: How do I connect to a 32-bit SQL Server instance with ODBC in my 64-bit Win...
Reducing IT costs in education - Part II - Education - Site Home - MSDN Blogs
My database is X GB, how big should my log be? - Cindy Gross - Troubleshooting, ...
How to use Windows Explorer to view RAW files in Windows 7 x64 - Jon Gallant"s B...
T-SQL Query Script to monitor Memory Usage of a SQL Server Instance - Sakthi"s S...
PowerShell Script to Configure Search in SharePoint Server 2010 - Random Musings...
[PowerShell Script] PowerDbg v6.0 – Using PowerShell to Control WinDbg - Debuggi...
Mandatory parameters in PowerShell - Santiago Cánepa"s Blog - Site Home - MSDN B...
Updated Hyper-V Best Practice Analyzer - Virtual PC Guy"s WebLog - Site Home - M...
Technological Women
Script to Clear (and Save) Event Logs - Random Musings of Jeremy Jameson - Site ...
Work Smart Productivity Guides
How to deploy Windows 7 to 200,000 computers - Education - Site Home - MSDN Blog...
IT Showcase On: Windows 7 Deployment
iSqFt | The Leader in Preconstruction
Visual Studio 2010 Service Pack 1 installing for over 2 hours could be a sign of...
WoodITWork.com » HP Flex-10 DNS issue causing network outages
TechHead - VMware, Virtualization, Virtualisation, EMC, HP & Microsoft Related I...
fre:ac - free audio converter
EMC VNXe Storage Provisioning, Snapshot & Replication Demo | TechHead.co.uk
RecipeSource: Your Source for Recipes on the Internet
/downtimed/
Window Switch Home
Charting the upgrade path from DOS 5.0 to Windows 7 (video) -- Engadget
Python Tutorials for Kids 8+
Training - Microsoft Office
Tips on hard drive problems and troubleshooting
nsftools.com - The March 2011 Blog
Dual Core? No, We’re Not Ready. › AndroidGuys
Locking files for shared access
EMC VNXe Storage Provisioning, Snapshot & Replication Demo | TechHead.co.uk
3 essential skills for IT professionals - O"Reilly Radar
Testing Forms in PHP with SimpleTest
Automated testing of PHP forms.
TidBITS iPhone iPad iPod: Hands-On Details about the iPad 2 and iOS 4.3
ipad2
The ramblings of one curious guy | CuriousMitch
Speed up your Domino Administrator Client with a notes.ini setting | CuriousMitc...
Notes 7.x and Notes 6.x coexistence
issue still comes up with Domino 8.5.2 basic and full
Moving Outlook Contacts to Mac OS X Address Book « Lucas Chan :: Weblog
IBM is on Twitter, forty billion times. Who do I follow? | IdoNotes (and sleep)
Linux Backup Server: Refining Rsync, Passwordless Authentication - Rsync Backup ...
Nested-RAID: The Triple Lindy | Linux Magazine
Mac OS X Lion features hidden tribute to Steve Jobs
Microsoft IT Advisory Council
Real Help For Your Small Network - SmallNetBuilder
IBM - How to manually recertify an expired ID
Make Customers Smile in 7 Easy Steps with OTRS - Part 4 | Linux Journal
Cisco IOS Packaging Customer Q&A  [Cisco IOS Packaging] - Cisco Systems
IBM - FAQ: 64-bit version of Domino
What happened to versioning? - Word - Microsoft Office
Office Migration Planning Manager
quitesleep - Project Hosting on Google Code
One in six schools block Wikipedia - Education - Site Home - MSDN Blogs
86% of schools block Facebook 57% of schools block YouTube 14% of schools block Wikipedia
Khan Academy
Netbios Share Scanner Samba Windows Linux Unix
PowerShell Script to Configure the State Service in SharePoint Server 2010 - Ran...
javamelody - Project Hosting on Google Code
Oleksiy Gayda"s Tech Blog: Tip: Display current COM ports on the system
projects:start [Przemoc"s wiki]
Former Sun CEOs recount plan to buy Apple in 1995
The Death of BCC? — The NeoSmart Files
HIPAA Bares Its Teeth: $4.3m Fine For Privacy Violation | threatpost
Reducing IT costs in education - Education - Site Home - MSDN Blogs
Tim O’Reilly: The Future of Business Intelligence is Now - BizIntelligence.TV - ...
Microsoft Dynamics Project Readiness Assessment Quick Start - Microsoft Dynamics...
Cmdlet Help Editor V2.0 with Module Support - Windows PowerShell Blog - Site Hom...
America"s Debt: Get the Facts - BizIntelligence.TV - Site Home - MSDN Blogs
Azure Diagnostics and ASP.NET Health Monitoring - DavidHardin - Site Home - MSDN...
How about a bootstrapper package for SQLServer Express 2008 R2? « RobinDotNet"s ...
Mandatory parameters in PowerShell - Santiago Cánepa"s Blog - Site Home - MSDN B...
Eco-Cottages, the small modular home from Nationwide Homes
Rocio Romero, modern design and prefab architecture
Bloat - Overview - Bufferbloat
404 Tech Support: use-hp-web-jetadmin-to-simplify-printer-management
Disk Drill | freshmeat.net
Monit...
Using m4 with Nagios: Advanced Ideas « UNIX Administratosphere
m4 is back ;)
Penguin Pills
WoodITWork.com » HP Flex-10, ESX and Broadcom fun still continuing with ESX 4.1 ...
Wells Fargo Meeting Today With Philly Homeowner Who "Foreclosed" On Them (Here"s...
Bufferbloat: Sacrificing Latency for Throughput - www.enterprisenetworkingplanet...
How to Use Apple Magic Trackpad with your Windows PC
With Jolicloud 1.1, let’s reinvent the computing experience for millions - Jolic...
Visualized: Android activations mapped geographically, chronologically, breathta...
UNL | Lotus Notes
UNL | Lotus Notes - Backing Up Lotus Notes
Client
Secrets of a Mind-Gamer - NYTimes.com
Welcome to Open Library (Open Library)
Troubleshooting the 451 qq Temporary Problem
3TB Drives are Here | Linux Magazine
sqlninja - a SQL Server injection & takeover tool
Giovanni Tirloni » Blog Archive » Datacenter temperature and server failures
How to root a Nook Color to transform it into an Android tablet
[HOW-TO] Flashable Zip: Install Honeycomb to Internal Memory (eMMC) of Nook Colo...
CAI Networks - WebControl™ - Industrial Controller over TCP/IP network
Download details: Windows Server 2008 R2 Hyper-V Component Architecture (with Se...
SmartDeviceMonitor
SmartDeviceMonitor for Admin
Lotus Notes Tutorial - Lotus Notes and Domino Enterprise Education
The Geekery » Nagios, web scraping, and PHP as an agent
Conference Companion app suite poised to transform event experiences
Sayonara Japan | The 3 Month Checklist That Will Make Your Life A Whole LOT Easi...
Repatriating
Automate Windows Azure Functions with PowerShell Service Management CmdLets - Ig...
Partitioning & Archiving tables in SQL Server (Part 1: The basics) - Félix Martí...
Hyper-V CPU Scheduling–Part 2 - Virtual PC Guy"s WebLog - Site Home - MSDN Blogs
Microsoft Exchange RPC Extractor 1.0 is now Available - Office Interoperability ...
Resources for starting your Dynamic Data Center solution deployment - Microsoft ...
Computer Vision Syndrome (CVS) | American Optometric Association
YouTube - jeriellsworth"s Channel
Adafruit Industries, Unique & fun DIY electronics and kits
How I Learned to Stop Worrying and Love the SharePoint Topology Service - Beside...
What x86 hypervisor based virtualisation leaves for your application - c0t0d0s0....
WoodITWork.com » Scripting Flex-10 ESX design with PowerCLI
sapnote_0000674851vsphere50_WIN.pdf (application/pdf Object)
BayForce - SAP Consulting Services & Solutions
Bat To Exe Converter
TidBITS Networking: Should We Care about New Top-Level Domains?
Great diagram about icann structure.
WoodITWork.com » Flex-10 ESX design with simplicity and scalability: Part 1
WoodITWork.com » Flex-10 ESX design with simplicity and scalability: Part 2
Seth"s Blog: On pricing power
heaper is the last refuge of the marketer unable to invent a better product and tell a better story.
open-broadcast-encoder - Project Hosting on Google Code
Web Reporting solution for MySQL, MS SQL Server and Sybase | myDBR
Sphereless: Hackers, transparency, and the zen of failure
Hold Conversations, Not Meetings - Tony Golsby-Smith - The Conversation - Harvar...
Hold conversations
Exploratory treemap for Obama’s 2012 budget proposal
2010-Tax-Study-Final-Tax-Notes-PDF.pdf (application/pdf Object)
OpenShot Video Editor | Simple, powerful, and free video editor for Linux!
Design Your Facebook Fan Page With Pagemodo’s WYSIWYG Editor
799px-aspect_ratios_and_resolutionssvg.png (PNG Image, 799x600 pixels)
What Development Board to Use? (Part Two) - Hack a Day
USBConnect - AT&T BusinessDirect® | Premier Business Center
Nine traits of the veteran Unix admin | Unix - InfoWorld
Is Your Cloud System Safe From the Law? | Gov Monitor
ilektrojohn/creepy @ GitHub
How unique are your usernames?
LiveUSB MultiBoot
Moscrack
MyIT CRM - Development Team Website
testapi - Release: TestApi v0.6
OpenPublish - Open-Source Online News Publishing
My Arm’s Broke, Fix Me - Three Levels of Guidance in patterns & practices - J.D....
rsvndump - remote Subversion repository dump
Befriending Windows Security Log Events
What All This MD5 Hash Stuff Actually Means [Technology Explained]
Great images to explain to someone what a hash is.
Backup and Archiving | Symantec Connect
http://www.routemeister.net/projects/sipcalc/index.html
Understanding Blame : Bob Plankers, The Lone Sysadmin
When visibility is limited people tend to speculate.
VMware KB: Determining where growth is occurring in the vCenter Server database
Mallory: Transparent TCP and UDP Proxy – Intrepidus Group - Insight
BlackBerry Swiss Army Knife
Raleigh/Durham Business News | Triangle Business Journal
Download the bbc.closing.sites.archive torrent
Whisper Systems
Zenapp.blogspot.com
Whitepaper - Deploying SAP GUI on XenApp 4.5 » ocb - Citrix Community
Configuring Cisco to work with a Windows NLB Cluster - Internetworkpro
VMware KB: Sample Configuration - Network Load Balancing (NLB) Multicast mode ov...
VMware KB: Microsoft NLB not working properly in Unicast Mode
Unicast vs. Multicast - Original Posted Feb 21, 2005 - Cluster Help
Make Customers Smile in 7 Easy Steps with OTRS - Part 3 | Linux Journal
Make Customers Smile in 7 Easy Steps with OTRS - Part 2 | Linux Journal
Lotus Notes Diagnostics Version 2.9 (LND) has been released
IBM"s Lotus Notes/Domino Admin Tools v1.0 available
chan-sccp (revisited)
Vittorio Pavesi: NLB Unicast vs. Multicast
bluepot - Project Hosting on Google Code
The impact of IT decisions on organizational culture - O"Reilly Radar
The Sylinkreplacer tool for connecting SEP clients to a SEPM | Symantec Connect
GAP System for Computational Discrete Algebra
Cisco IOS Hints and Tricks: How did we ever get into this switching mess?
The New Domino Admin » Blog Archive » Lotus Domino SNMP: Solution when the SNMP ...
Jokosher
ASP.NET: Adding and Editing Database Entries | Mon 7 Feb 2011 | Blog | CodeStore
Lotusphere Podcasts
New Project: The Official Microsoft ASP.NET Site
Happy Software Engineer: Regular Expression To Match IPv4 Addresses
Troubleshoot Connectivity failures (18456 State x) with SQL Server - Sakthi"s SQ...
Teaching Kids Programming with SmallBasic video - Contagious Curiosity - Site Ho...
NicolTIP#021: hot to restart printer spooler service via PowerShell - NicolBlog ...
Gartner slams Cisco"s single-vendor network vision
When isn’t a loopback always reachable?
Tutorial: Arduino and GSM Cellular – Part One « t r o n i x s t u f f
IBM Lotus Domino Express - Small business email
Painless password management: The best free and paid tools | ITworld
Linux with badram Saves the Day! « The ERACC Web Log
Love the BadRam patch
sambascan2 | Download sambascan2 software for free at SourceForge.net
MFCMAPI
OutlookSpy - the Ultimate Outlook Developer Tool
What CIOs Really Want To Know About Cloud - Chuck"s Blog
KB11632-How to increase the number of email messages sent to a BlackBerry smartp...
KB04882-Best practices for installing service packs for BlackBerry Enterprise Se...
SQL Server and Hyper-V Dynamic Memory - Part 1 - SQLOS Team Blog - Site Home - M...
Recursive Loops - Computer Science Teacher - Thoughts and Information from Alfre...
heidelbergit
Introduction to PowerShell Training - Nick MacKechnie - Site Home - MSDN Blogs
Chemistry Add-in for Word
How Not to Respond to a Security Incident
Compare database schemas, synchronize database schemas with SQL Compare
Powershell to Automate SQL Compare | Home Of The Scary DBA
Cloudkick | Cloud monitoring and management tools
Linuxaria 12 open source books : Linuxaria
What’s the Internet? – Hilarious Video of NBC’s The Today Show in 1994 | Singula...
Installing the HP Universal Print Drivers on Citrix/Terminal Servers
J House Consulting — Application and Desktop Virtualization Specialist with Micr...
Acrobat and Reader 9.x (Windows): Deploying Acrobat/Reader installers and patche...
pepper
Welcome: Evergreen open source library system
KB18269-Duplicate desktop or unknown services are found in calendar or contact l...
BlackBerry - Smartphone Simulators
IT Salary Levels: Staffers vs. Superstars — Datamation.com
Compatible web browsers and PDFMaker applications | Acrobat
BURP - BackUp and Restore Program
Convert RAW Files to DNG with DNGConverter « Scribbles and Snaps
IBM - How to analyze questionable deletions in a Notes database
HDT
Tools « Business Model Alchemist
Business Model Canvas Poster
Tomboy : Simple note taking
OneNote-ish
WikidPad - wiki notebook for windows
OneNote-ish
NetXMS — Welcome
LensHero | DSLR Lenses
http://www.altanetworks.com/x3/tc_ships.html
Staffnote - Staff Attendance, Share Messages and Notes - Online Staff Attendance...
Windows PowerShell Survival Guide - TechNet Articles - Home - TechNet Wiki
Access to SQL Server Migration: How to Use SSMA - Microsoft SQL Server Migration...
Identify Slow Queries using MySQL’s Analysis Tools — DatabaseJournal.com
Bitflu
MSR Tools | when quality matters…
Average iPhone owner has 108 apps, spends 84 minutes a day using them
YouTube - Lego Antikythera Mechanism
Ancient astronomy: Mechanical inspiration : Nature News
Perl script to parse ADTS audio header - Matthew van Eerde"s web log - Site Home...
Alternative Software and Apps To Your PC (Windows, Linux), Mac, iPhone, Android,...
Converting VOC Audio Files from Digital Recorders « UNIX Administratosphere
VLANs and IP Routing on an Ethernet Routing Switch | Michael McNamara
802.1Q VLAN Tagging on an Ethernet Routing Switch | Michael McNamara
News Room - Trulia.com - Rent vs. Buy Index
The Importance of Provider Independent IPv6 Addressing
Three ways to fix the Cisco IOS Translating “xyz” Domain Server
Disable name lookup for cisco terminal
Moodle reporting | Matteo Redaelli
Oracle Solaris 11 Downloads
Oracle VM Templates
IBM - Download options for Notes/Domino 8.5.2 Fix Packs
Fix pack download links for 8.5.2 fp1
awstats_update_all - update all awstats sites in parallel processing
ScrumDo - Agile Story Management Web App
iTWire - LCA 2011: Cerf calls for "re-imagining" the internet
What Does a Good IT Manager Look Like? - Ethics and Trust - Opinions - LinuxPlan...
Andy"s House O" Blog: Troubleshooting IMAP - Slaying the beast
Troubleshoot imap via telnet
Wireless Sniffing and Jamming of Chronos and iclicker - Hack a Day
Protecting DBA’s secret - Microsoft SQL Server Migration Assistant (SSMA) Team"s...
Why does the name of my TEMP directory keep changing? - The Old New Thing - Site...
Why does my temp file get recreated each time?
Will Entriken: Classic and modern job searching tips
Areca Backup - Official Website
Duffbert"s Random Musings :: So everyone *doesn"t* intuitively understand Outloo...
Seth"s Blog: Eight Lessons from the life and work of Jack LaLanne
Gartner: Most CIOs have their heads in the clouds | IT Systems News - Betanews
Removing .cpan Directory
CPAN recovery
The Open Information Security Foundation - The Open Information Security Foundat...
How to perform an SQL Server Edition Upgrade - SQL Server Setup - Site Home - MS...
Can it work in the reverse direction?
Clonezilla - About
Clonezilla
How to Create Hyperlinks to support files in Microsoft Excel 2010 - Microsoft Le...
Top 200 Free High Quality Fonts of 2010 Part4 - Microsoft Lebanon"s Official Blo...
Top 200 Free High Quality Fonts of 2010 (Part 03) | MicrosoftFeed
Top 200 Free High Quality Fonts of 2010 (Part 02) | MicrosoftFeed
Top 200 Free High Quality Fonts of 2010 (Part 01) | MicrosoftFeed
How to Fast Copy without Clipboard in Microsoft Excel 2010 - Microsoft Lebanon"s...
Career Center for Job Seekers, powered by Monster.com - Microsoft Office
How to Get Full Headers - Lotus Notes
Finding headers in Lotus Notes 6 to 8 - View/Show/Page Source
Database Deployment Manager | Download Database Deployment Manager software for ...
offrss: Documentation
Offline RSS feeds for later offline reading.
key-mon - Project Hosting on Google Code
Display key presses onscreen
New Year"s Resolutions for Geeks Like Me - Geek Speak Blog
www.kmeckstein.com » Blog Archive » Speeding up the internet with pdnsd and squi...
SDL Tools
Download details: Attack Surface Analyzer BETA
Driving the Generational Shift in ERP - Microsoft Dynamics ERP "The Edge" Blog -...
Personal Change Control – My Etherealmind
It"s the Latency, Stupid
PowerShell : Getting the hash value for a string - XAML "for real" / XAML "dans ...
The Importance of Salary Negotiation
Notesboy
Install Single Sign on after it hasnt been installed previously
Powershell: Scripting Best Practices Analyzer remotely | vNinja.net
HP ProLiant MicroServer – Oh, it’s there! | vNinja.net
You Had Me At EHLO... : Introducing Remote Desktop Connection Manager (RDCMan) 2...
QNAP Systems, Inc. ( Download Center ) - Quality Network Appliance Provider
Seth"s Blog: Misjudging risk (and bad decisions)
Microsoft Outlook and Lotus Notes Crosswalk - Email - Information Technology - D...
Working between outlook and lotus notes?
Linuxaria Pcal – calendar from command line : Linuxaria
beets: the music geek"s media organizer
3 types of IT leaders: maverick, innovator, guarantor - O"Reilly Radar
X12 EDIFACT Mapping - Wikipedia, the free encyclopedia
Radio-Locator
What is BetterTouchTool?
Virtual Magnifying Glass 3.4
WoodITWork.com
242 Technologies
Explorer++ - A small and fast file manager for Windows
2G, 3G, 4G, and everything in between: an Engadget wireless primer -- Engadget
Understand Cellphone Technologies from AMPS to LTE
Sourcefabric
virtuallyGhetto: vGhetto Script Repository
William Lam"s excellent vmware work
MKSBackup Overview
How to Automate the Disk Cleanup Tool in Windows XP
Features, Architecture and Requirements :: MooseFS network file system - Moose F...
TaniDVR
egosoft.com :: View topic - [TC] Spike"s Walkthroughs
mission walkthroughs
Back up MySQL Databases with a Simple Bash Script - Linux Magazine Online
ExpressPCB - Free PCB layout software - Low cost circuit boards - Top quality PC...
NavalPlan - Open Web Planning: NavalPlan
ITDB - IT Items Database - Free IT Asset Management Software
Home | SFLphone - SIP/IAX2 softphone and VoIP client for GNU Linux
Does eating fruits and veggies make you more attractive? | MNN - Mother Nature N...
“In humans, the more red and yellow tones found in the skin, the more attractive the people were found to be.”
Verizon was "never in the running" for original iPhone
SQL Server - New Drives Use 4K Sector Size - CSS SQL Server Engineers - Site Hom...
Hate Your Job? It Could Be Your Fault | Wise Bread
Notesboy
Notesboy
Folder contents on archives getting deleted
IBM - How to rerun setup on a Notes 8.0 or 8.5 client
KB23745-Upgrading from Desktop Manager 5.0 to Desktop Software 6.0
With the release of Desktop Software 6.0 there are some features that will not be available which may affect some users.
Mini-Box.com: mini-ITX, nano-ITX, pico-ITX, mobile-ITX solutions
Minicomputer hardware
NotesHound - The world"s most powerful and affordable Domino developer tools
Field Bird - Android Tools
Intro to Circuit Bending - Hack a Day
osmius.com
Lots of good buzz words in this one.
Hand Crafted Sun Dried Fruit - Sun Dried Tomatoes, Sun Dried Mangos
NextWorth: Buy and Sell Electronics, Sell iPhone and Video Games, Recycle your g...
SellYourMac | Sell your used MacBook Pro, Mac Pro, iMac, Mac Mini, Powerbook G4,...
Dropping huge tables in MySQL without blocking I/O | StoiloBlog: everyday admini...
The work around is to create a hard link to the table’s .ibd file, drop the table, and then remove the link.
Why is IT governance so difficult to implement? - O"Reilly Radar
Introduction to Linux Cgroups — ServerWatch.com
How to copy data from a corrupted user profile to a new profile in Windows XP
How to ask a question
Another symptom of this error is getting the following answer: "You question has been answered a hundred times. Please use a decent search engine and/or search our archives before posting any future questions"
Reverting Changes in SVN (or: it"s not as easy as svn up -r) - Code Kills
svn cat -r $OLD $FILE > $FILE
HP-UX boot Guide
shutdown -h -y now
Network Security Toolkit (NST v2.13.0)
Free Security Alarm Monitoring Services, Home Business Alarm Monitoring
Free Alarm Monitoring
Understanding and extending the SharePoint PowerShell snapin - Beside the Point ...
W3Perl - Free logfile analyzer
Arduino The Documentary. How open source hardware became cheap and fun – New Tec...
Linuxaria The best way to move data : Linuxaria
rsync with ssh is the best performing option.
My Cold Life As a Temp UPS Driver Over the Holidays
Day in the Life of a UPS driver
astGUIclient - VICIDIAL
Dialer for Asterisk
KnowledgeTree Document Management Made Simple
USGBC: LEED for Retail
LEED for Retail
Putty – Fixing Right Click Paste – My Etherealmind
Intro to Nested-RAID: RAID-01 and RAID-10 | Linux Magazine
Great article about nested raid
Whose house is of glasse, must not throw stones at another. « jg"s Ramblings
organic fertilizer: powershell: naming functions and cmdlets
Houcem HACHICHA"s Blog: How to create and setup a virtual machine using VirtualB...
Enterprise Support - Symantec Corp. - CleanWipe is NOT recommended to be run fro...
It is NOT suggested that the CleanWipe tool be run remotely using a Remote Desktop, PC Anywhere, VNC or other software based remote control program. This is because there are Symantec network drivers that are removed, and the original network drivers for the Network Interface Cards (NICs) are replaced. If there is an error while running the clean wipe tool, it could render the NICs useless until the drivers are reinstalled. If the drivers need to be reinstalled, then you will need to be either physically at the computer or use a KVM over IP device, iLO or other mechanism to connect to the server.
Andrew Gee » GPX Viewer
Viewing Deleted Active Directory Objects Using LDP - Federated Infrastructure - ...
AwesomeBox | Open-Source Real-Time Pitch-Correction (is that enough hyphens for ...
Licorize - for the web worker tribe
Social Book Marking at its finest
Revolution Jacket from SCOTTEVEST/SeV - Revolution Jacket with Hidden Pockets
Tax Tables
The Daily Admin
good collection of IT geekery
IOGraphica — MousePath"s new home
skeletek
How to create a Windows PE boot disc - computer help forum
McAfee Communities: Content Does Not Match Content Type
Content Type mismatching at its finest
Seth"s Blog: Making meetings more expensive
DB Sanity
TeamLab – Create Your Enterprise Portal in the Cloud for Free
How to make a basic WinPE 2.0 CD - MSFN
Remote (in band) configuration tips – My Etherealmind
Recycle IIS Application Pool": 0x80070005 Access denied - Deploying sharepoint s...
Essential Project–Open Source EA Metamodel - Inside Architecture - Site Home - M...
2010 Investment Returns by Asset Class » My Money Blog
The GAdmintools Project
WS6Z"s hamtools
Chaosmap | freshmeat.net
Half Moon, Full Wallet: Free Online Yoga Videos | Wise Bread
Top 50 Programming Quotes of All Time | TechSource
Starting Jobs in Powershell using Job Name - SQL Server Agent Team Blog - Site H...
3 Useful Scripts To Modify Your Proxy Settings For Internet Explorer
I, Cringely » Blog Archive » And Then Along Comes Larry…. - Cringely on technolo...
XODA - the KISSed Document Manager
adamdoupe/WackoPicko - GitHub
WackoPicko is a vulnerable web application used to test web application vulnerability scanners.
Common Errors in English Usage
iTunes: Back up your iTunes library by copying to an external hard drive
Keith Hill"s Blog - Windows Live
Mailbag: Should I re-install the versions of the .NET Framework in a specific or...
DB Mirroring Tips - Esoteric - Site Home - MSDN Blogs
The Semicolon Wars | Lambda the Ultimate
The Myths of IT – Part 2 « The Network Therapy Blog
The Myths of IT – Part 1 « The Network Therapy Blog
Interleave: Open source Business Process Management software
wissel.net :: Golden Rules for Domino Adminstrators (courtesy of Manfred Meise)
shedskin - Project Hosting on Google Code
Building a World Class Team - A Glossary of Roles - InsideRIA
Building a World Class Team - Implementing Code Review in an Agile Environment P...
Building a World Class Team - Implementing Code Review in an Agile Environment P...
Building a World Class Team - Tightening Development Workflow Part 3 - InsideRIA
Building a World Class Team - Tightening Development Workflow Part 2 - InsideRIA
Building a World Class Team - Tightening Development Workflow Part 1 - InsideRIA
Creating a Pathway to Action - InsideRIA
Constructing a Team Vision - InsideRIA
Building a World Class Team - A Holistic View Part 5 - InsideRIA
Building a World Class Team - A Holistic View Part 4 - InsideRIA
Building a World Class Team - A Holistic View Part 3 - InsideRIA
Building a World Class Team - A Holistic View Part 2 - InsideRIA
Building a World-Class Team - A Holistic View Part 1 - InsideRIA
Building a World Class Team - Sharing Knowledge Part 2 - InsideRIA
Building a World Class Team - Sharing Knowledge Part 1 - InsideRIA
Where users of Avaya and Nortel connect.
The SQL Server 2008 R2 builds that were released after SQL Server 2008 R2 was re...
Versions of SQLSERVER2k8r2
wissel.net :: Notes / Domino upgrade cheat sheet
X3 Terran conflict (X3TC) on X3TC.RU: knowledge base, properties of all ships, m...
Stubborn Tech Problem Solving: quote-count: A debugging tool for shell scripts
How to pronounce ASUS (video) -- Engadget
How to pronounce ASUS -- hint youre doing it wrong.
NSA considers its networks compromised
Debora Plunkett, head of the NSA"s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be considered completely and utterly impenetrable - not even that of the NSA.
HOWTO - virtualbox as a service on Windows (srvstart.exe) (View topic) • virtual...
Good magic
Null Logics Software - Windows Service Commander - Manager all Your Windows Serv...
SQL SERVER – Start SQL Server Instance in Single User Mode « Journey to SQL Auth...
Finding and Installing Windows Saplog.ini File
Magical new things with 710 and 720 guis
Using Active Setup to Deploy User Based Settings via an MSI
Rivendell Project Home Page
Outlines and Templates - Proposal Development - Tufts University
The Ji Village News » SQL Server 2008 R2 unattended installation via configurati...
Merging Two Domino Databases With Folders :: Dec"s Dom Blog
SQL Server Version Database
Derek Seaman"s Blog: SQL 2008 R2: Unattended Install Script (Part 2)
SQL: SQL Server 2008 Express Missing ConfigurationFile.ini « Nick Olsen"s Progra...
Silent install of SQL Server 2008 « Mahesh’s brain droppings
Locale IDs Assigned by Microsoft
1033
How to make SVN ignore some folders" contents.
Silent install, repair and uninstall command lines for the .NET Framework 4 - Aa...
Aaron comes through again.
Putting /etc Under Subversion (SVN) | BarryODonovan.com
Making magic happen with 1 commit at a time
Index — Python Tips, Tricks and Hacks
Leadership Blogs - J.D. Meier"s Blog - Site Home - MSDN Blogs
Visual Studio 2010 SP1 Beta IIS Express Integration - Visual Web Developer Team ...
Generating Proxies for Silverlight accessing a Silverlight-Enabled WCF Service -...
SE-Explorer : Free portable file manager with lots of build-in viewers, archive ...
X3 - Terran Conflict: Online Complex Construction Calculator
egosoft.com :: View topic - The Ultimate X resource and guides list - last updat...
VisualDB | Download VisualDB software for free at SourceForge.net
Visualize your Postgresql database - VisualDB
Severed Fifth | Releases
How to Teach Yourself About Project Management… | Michael Greer"s PM Resources
BerliOS Developer: BerliOS Developer Services
Quotista.com - shared quoting experience
Century Gothic Saves More Ink Than Ecofont : TreeHugger
A more effective ecofont
Security Blanket Technical Blog: Tips for Securely Using Temporary Files in Linu...
Active Directory SPN Mappings and Kerberos : Brian Desmond"s Blog
Doodle: easy scheduling
Synergy - Welcome - Synergy
The Nubby Admin || The blog of a nublet SysAdmin
Life As A Sys Admin: Best Networking Tweaks for Linux | Network World
Clonezilla-live download
ivarch.com: RT Flag Updated
ivarch.com: RT Achievements
ivarch.com: RT Email Import
Armitage - Cyber Attack Management for Metasploit
True Knowledge - the internet answer engine
ShareEnum
Seo Panel: World"s first open source seo control panel for multiple web sites
The gWaei Project Homepage, Latest Release 1.4.3
Date and Time Math with PowerShell : Brian Desmond"s Blog
appscale - open source Google App Engine
Minibis - CERT.at
Hayward"s Free Intranet Employee Photo Directory → An Open Source Django Project
NiX | freshmeat.net
PST, CST, EST, and JST from the Regex Master
BambooInvoice: Simple, Beautiful, Open Source, Online Invoicing
FreeRADIUS: The world"s most popular RADIUS Server
Swingbench
Building wireless IDS system using open source | Softwink, Inc [800-538-9357]
SmartCam | Download SmartCam software for free at SourceForge.net
OSForensics - Download
Nfsight
Insults
pachube :: connecting environments, patching the planet
nrh"s pogo at master - GitHub
Tiny Core Linux, Micro Core Linux, 10MB Linux GUI Desktop, Live, Frugal, Extenda...
» Enable Lotus Notes notes:// protocol in mediawiki itlivewire dev blog
Mutil
Sysconfigtools | Sysconfigtools
QUATTOR: QUattor is an Administration ToolkiT for Optimizing Resources
SimpleDiagrams
DNSViz | A DNS visualization tool
Portland Pattern Repository
ICS Resource Center
IRODS:Data Grids, Digital Libraries, Persistent Archives, and Real-time Data Sys...
Gluster.org Community Website | GlusterFS is a cluster file-system capable of sc...
It"s clamfs chowder time!
FireShepherd
AWS Free Usage Tier
The Gosu Programming Language
Validate Follower
http://www.nomadix.com/
Chef - Opscode
DevOps - Wikipedia, the free encyclopedia
Black"s Law Dictionary
troysblog
Firefox Extension BlackSheep Detects And Protects You From Firesheep
Saving money by saving power - how Microsoft IT rolled out desktop power managem...
ProjectForge
Alice.org
SkySQL » Welcome to SkySQL, the alternative source for software, services and su...
FreeTDS.org
google-mysql-tools - Project Hosting on Google Code
mysqladmin - MySQL Admin Tool
SETroubleShoot Overview - setroubleshoot - Trac
MySQL Preacher
Fun with mysqlslap benchmarking - Everything MySQL
DNSSEC Debugger
What is the System Update Readiness Tool?
Security Intelligence Report (SIR) vol.9
Office 2010 Deployment in the Enterprise – Part 1 - Pushkar"s Office Blog - Site...
SQL Server 2008 and R2 Cluster Best Practices - pamitt - Site Home - MSDN Blogs
Performance Analyzer 1.0 for Microsoft Dynamics - Microsoft Dynamics NAV Team Bl...
Database Mail – Validating your SMTP mail server configuration using powershell ...
mod_pagespeed Overview
ssldump home page
Make Customers Smile in 7 Easy Steps with OTRS - Part 2 | Linux Journal
Make Customers Smile in 7 Easy Steps with OTRS | Linux Journal
Resource page for reposurgeon 0.3
Download the Free Linux Foundation Publication: Self-Assessment Checklist | Linu...
Ubuntu Crack & Hack Win7 User Passwords & Files | Linux Blog
Download details: Microsoft Network Monitor 3.4
Logos in Inkscape | Packt Publishing Technical & IT Book Store
FrontPage - The Wireshark Wiki
Likewise Open Source Software that Authenticates Linux, Unix, and Mac systems wi...
Cleanup User Objects with Invalid MailNicknames : Brian Desmond"s Blog
Macintosh Security Site - Security for Mac Platform MacOS X Security Firewalls D...
An example regex and mini-tutorial -- finding multiple strings (Page 1) - Tips a...
USG DNSSEC Deployment Status
Shareaholic for Firefox - The best way to share, tweet, bookmark, save and e-mai...
MPE to HP-UX Cross-Reference
jessyink - Project Hosting on Google Code
Makecheque: A Check-printing Tool
plowshare - Project Hosting on Google Code
The Internet Services Disruption « Ray Ozzie
Stop spam with the Anti-Spam-SMTP-Proxy (ASSP)
AFICK (Another File Integrity CHecker)
Apophysis.org
Performance & Security for Any Website | CloudFlare (Private Beta) | Home
CLI Companion in Launchpad
HowTo: Use Bash Parameter Substitution Like A Pro
OCS Inventory NG - Welcome to OCS Inventory NG web site !
Howto: Using ExtPart to Expand Windows Server 2003 VM Boot Volume - h0bbel.p0gge...
Drivers and Downloads - extpart
DriveSaver™ — The First Online Hard Disk Drive Simulator
Find_SSNs - Search files for U.S. Social Security or Credit Card Numbers | IT Se...
digiKam - Photo Management Program | Manage your photographs as a professional w...
LemonPOS | Home
wissel.net :: Create an Enterprise Event Calendar on the Cheap
Resource page for ssh-installkeys 1.5
cb2Bib: Overview
DIASER - Main
Gforge: gPM: Project Info
Tosca, open source request-tracking system
Shovelglove: The Sledgehammer Workout
Master lighttpd – the lightweight alternative to Apache | Linux User
Strange packet: "daylight rekick", anyone?
Welcome to VRC
REDCap
Do you know about Lotus Notes 8.5.2 managed replicas?
Tokyo Hackerspace – Akihabara Station Video Tour - Hack a Day
Mac 101: Preparing your old Mac for sale or recycling
Windows 2008 R2 Performance Monitor – Processor Information Counters have replac...
Home - Process Hacker
A self elevating PowerShell script - Virtual PC Guy"s WebLog - Site Home - MSDN ...
Decrypt secure strings in PowerShell - Beside the Point - Site Home - MSDN Blogs
Download details: Microsoft Web Application Configuration Analyzer v1.0
Paper processor
Implementing two Factor Authentication on the Cheap
duplicity: Main
baculafs - Project Hosting on Google Code
ttyutils
iexploder - Project Hosting on Google Code
DigiFAIL.com - Bluelog
Tutorials and How-tos/Backup with rsync and rsync.net - ExcitoWiki
CiviCRM | CiviCRM Community Site
constituent relationship management solution
Orange Leap - Where nonprofits rise and shine
LifeType | Open Source Blogging Platform
Booting HP-UX
RT-Nagios gateway | Cedval"s website
Salecker.org - Software - kismon - english
Getting the Most Out of Salary Comparison Sites | Wise Bread
GCreep: Google Engineer Stalked Teens, Spied on Chats (Updated)
Risk and Health Assessment Program for Microsoft SharePoint Server (SPRAP) - New...
Elearning open source platform, LMS and LCMS
PuTTY Tray
KiTTY - Welcome
gource - Project Hosting on Google Code
Using ffmeg to batch convert cd audio files to mp3
CLOC -- Count Lines of Code
cx_OracleDBATools
Download the free Access 2010 Migration Guide - Microsoft Access - Site Home - M...
SAP Landscape Management with SQL Server Policies - Running SAP Applications on ...
Modifying Configuration Redirection Settings using PowerShell - Robert McMurray"...
How Systems Fail (and Principles of Prevention) « UNIX Administratosphere
Licensing changes in SQL Server 2008 R2 - Esoteric - Site Home - MSDN Blogs
The .xz file format
SMRadius : HomePage
SharePoint 2010 Solution Deployer–V1.1 - SharePoint Infrastructure....From the f...
Chapter 38. The Samba Checklist
NCurses Disk Usage
Disk Cleanup Tool in Windows XP
Sux
iTerm
Manager Tricks: How to message annual Review - Bhola Meena"s Tech Diary - Site H...
Login failed for user "sa" while installing SQL Server 2005 - Sakthi"s SQL Serve...
android-wifi-tether - Project Hosting on Google Code
Whyteboard: Open Source Paint Program
Visual Disk Test (VDT)
iNum - One number for the world - Home
The OpenBTS Project
How to make a Cosmic Wallpaper in GIMP | Scott Photographics | Free Photography,...
Multithreaded FLAC to mp3/vorbis/FLAC encoding script
Making an executable take pipelined input in PowerShell | Farblondzshet in Code
Visual Round Trip Analyzer - Experience is what you get when you don’t get what ...
How to Repair Corrupted Excel Files « the back room tech
videokiosk - Project Hosting on Google Code
Easy GUI Backup Solution, Bare Metal Restore, Open Source GPL Recovery
Open Source Billing and Rating Software | jBilling
PDFpirate, (Soon) One Stop Shop for All Your PDF Needs
Expatistan, expat life made easy
Fix Task Manager Problems in Windows « the back room tech
Stupid tar Tricks | Linux Journal
Concordance
The New Domino Admin » Blog Archive » Lotus Notes 8.5.1: Death By PowerPoint … a...
drupowa | Download drupowa software for free at SourceForge.net
Winmail.dat Reader - Free winmail.dat converter to open files sent by Outlook an...
Matterhorn: Open source lecture recording tool - The H Open Source: News and Fea...
Campsite : Sourcefabric
BugHotel Reservation System | Hotel Booking System - Home
Centralized Logging with a Web Interface | Linux Journal
SymKat» SymKat | SSH: Tips And Tricks You Need
GoVirtual: The Online Destination for Virtualization Researchers and Academics
Ed Brill - Lotus Notes 8.5 client version-to-version comparison
Amazing News: Inside AT&T"s National Disaster Recovery Batcave: Who AT&T Calls W...
Welcome to GNS3 Vault
Revolution Wi-Fi
Revolution Wi-Fi: Virtual APs Will Make You Look Like a Fool
DentBetty - Get competing estimates from body shops by uploading photos
eat the seasons | food seasons
log2timeline
How to recover from USB errors? (Part 1) - Microsoft Windows USB Core Team Blog ...
Cloud security 101: Start cramming now - Architects Rule! - Site Home - MSDN Blo...
Sharepoint 2010 Administration ToolKit Released - MOSS Attacks - Site Home - MSD...
Everything iTunes [Windows Version]
openpom - Project Hosting on Google Code
Free CCNA Workbook
Undiscovered Features: Thermostat
organic fertilizer: powershell: generating a range of test users
Qualys Community: BlindElephant - BlackHatUSA2010 - Slides (Version 2)
Configuration Reference : The Official Microsoft IIS Site
Cisco IOS Hints and Tricks: Custom-written DNS servers: Learn to love them
CCNP ROUTE: Official Study Guide or Foundation Learning Guide? - Packet Life
The Ancient and Noble Art of Troubleshooting | My Etherealmind
Samurai Programmer.com - PowerShell: Restoring a whole heap of SQL Databases
An Educators Guide to School Networks
cvechecker | A local CVE checker tool
Country Profiles - Guides to Culture, Etiquette, Customs and Protocol
Writing optical discs using IMAPI 2 in powershell - OpticalStorage - Site Home -...
PowerShell for Failover Clustering: Find Clusters in a Domain - Clustering and H...
Find out how much space is used / can be used by a virtual machines virtual hard...
Downgrading SQL Server Enterprise Edition to Standard Edition - Nice things insi...
Who Invented the Pascal Program?
Main Page - Process and Service wiki
Lyrics by song, album, or music artist - LyricWiki
Debian Live Studio
Device Naming Conventions - Terry"s Blog
The Guerrilla Guide to Interviewing - Joel on Software
» How to Prepare for Losing Your Job
oracle monitor with zabbix
Automating SharePoint 2010 Install on Windows 7 - Ram"s Blog - Site Home - MSDN ...
Things to do in Tokyo - Time Out Tokyo
How do spammers get my email address? - Security Tips & Talk - Site Home - MSDN ...
Download the Latest Microsoft Security Intelligence Report - Official Microsoft ...
Download - Spell, Style, and Grammar Checker for OpenOffice
CloudAudit
The EFF SSL Observatory | Electronic Frontier Foundation
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 FP4: Fix Pack 4 Install...
Voxitas | Home
Main Page - Win32 Perl Wiki
Oracle-L: RE: Oracle 9 Agent not starting
Free Script: User Profile Domain Migration with SetACL | sepago
Automated IOS Updates - Terry"s Blog
Mikogo: Free Remote Desktop, Web Conferencing & Online Meetings
expect-lite
The Essential Components of the Good Life » My Money Blog
CheckInstall Homepage
Project Plans in a Nutshell - J.D. Meier"s Blog - Site Home - MSDN Blogs
Don’t mess with the system databases in SQL Server, or Error: 916 - Carpe Datum ...
Home | TurningArt
Welcome to Index Engines
Seth"s Blog: A post-industrial A to Z digital battledore
Unleashing the Ideavirus
The News is Broken :: General :: Latest Project
Longform.org
StaticNAT » Blog Archive » Do Not Social Engineer Yourself out of Clients or you...
openSIPS | Main / HomePage
Car Service, Limo, Limo Rentals, Limousine Services, Airport Limo | LimoRes.net
EU3 Wiki
Andy"s HousEverything old is new again - The Handheld Warse O" Blog:
Wireless Out-of-Band Console Access with Opengear"s ACM5000 - Packet Life
How to make see-through text to image in GIMP | Scott Photographics | Free Photo...
LVM, RAID, XFS, EXT3 tuning for small files parallel I/O on Debian / Linux blog ...
Systems Administrators Changing Roles
Three Sysadmin Rules You Can’t (And Shouldn’t) Break
.:: OpenNebula: The Open Source Toolkit for Cloud Computing ::.
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1 Upgrade: Solution to th...
Kensington"s Laptop Locking Station is a thief"s worst nightmare... maybe -- Eng...
http://liblearn.osu.edu/tutor/jscript.html
Powershell Remoting with SQL Server « Home of the Scary DBA
» How to Recover A Stolen Identity
The Blog of Helios: The Future of IT...Here They Are.
Writing Better Shell Scripts – Part 2 | Innovations Technology Solutions | Blog
Writing Better Shell Scripts – Part 1 | Innovations Technology Solutions | Blog
A Deadly Linux/UNIX Command in Action (Video) | TechSource
The 7 Deadly Linux Commands | TechSource
Seattle OnHold Music
Awesome Science Teacher Resources
NetStress :: Network Benchmarking Tool
Free SQL Server 2008 R2 Online Training Course Available on Channel9 - US ISV Ev...
IIS Developer Express Overview : Using IIS Developer Express : WebMatrix Beta : ...
ASP.NET Perfecto - Taking a quick peek at the performance of your ASP.NET app - ...
FAQ Week for NLB: Monday - Clustering and High-Availability - Site Home - MSDN B...
WIKINDX 3
Argumentative
Endpoint Encryption User Guide
McAfee Communities: Dan Larson"s McAfee Blog: Unofficial Quickstart Guide for Mc...
CMU Sphinx - Speech Recognition Toolkit
Colin: Administration with Perl in a Windows Environment
ONI Home Page | OpenNet Initiative
Power tip (igo, Kensington, Targus etc...) exchange thread - Page 22 - FlyerTalk...
FAQ Week for NLB: Wednesday - Clustering and High-Availability - Site Home - MSD...
Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allo...
Intel vPro PowerShell Module - Windows PowerShell Blog - Site Home - MSDN Blogs
Presentation Links: SQL Server Performance Tuning (Quest) - Carpe Datum - Site H...
PowerShell and Extended Properties - Carpe Datum - Site Home - MSDN Blogs
Time Tracking | TaskFreak! web based task manager and todo list, project managem...
OpenStack Open Source Cloud Computing Software
SchemaCrawler - SchemaCrawler
Cisco IOS Hints and Tricks: Server virtualization has totally changed the Data C...
16 Enterprise Architecture Strategies Learned The Hard Way - Linda Chong"s Blog ...
REMnux: A Linux Distribution for Reverse-Engineering Malware
Sagan from Softwink, Inc [800-538-9357]
Principles 1: The Essence of Driving – A Crash Course in Project Management - Iv...
Observium :: Network Monitoring and Observation Main/Home Page
Customising Office 2010 before deployment
Damn Vulnerable Linux - The most vulnerable and exploitable operating system eve...
Installing OpenWrt on Seagate DockStar HOWTO
Racktivity: insight and control for your data centre - Home
Laptop Makers Pushing Paid Support Instead of Answering Questions
Tech Support Showdown 2010 - Tech Results Compared
Characters in the local part of a mail address
BES users and Out Of Office issues and fixes | IdoNotes (and sleep)
Tokyo University"s Grape-DR supercomputer is a tangled green powerhouse -- Engad...
Duffbert"s Random Musings :: So just how secure is your Domino server from attem...
Ask a Manager
Bitcoin P2P Cryptocurrency | Bitcoin
Continuous integration with Buildbot
Buildbot
Free video lectures | Online Courses | Video Lessons | Lecture Videos | Tutorial...
Buildbot
dl: download ticket service
Kindlerama
The Ware Tetralogy, four novels by Rudy Rucker
Kindle software versions v2.5.3, v2.5.4, v2.5.5 – What are they? | TeleRead: Bri...
VMware VI Perl Probleme unter Debian Lenny [wiki.secured.de]
Possible installation problems with .NET Framework 2.0, 3.0 and 3.5 hotfixes tha...
What is a PM? - J.D. Meier"s Blog - Site Home - MSDN Blogs
Program Manager
What Do The URL Domain Extensions Stand For & Why Are They Needed? [In Case You ...
Unattended Ubuntu Installations « UNIX Administratosphere
Ten Things You Need to Know About Design - Canadian Developer Connection - Site ...
CTT - Charity Technology Trust - A charity that helps charities to use technolog...
Using Ketarin to Automatically Update Software Packages | deranjer - A Productiv...
Greenshot - a free screenshot utility optimized for productivity
How to Hire a Contractor Without Getting Hosed
» How to Dry Fresh Herbs
Open Validator - Web Conformance Tool
MoCo Monitoring and Control System
V3RITY Software - Breach Investigations and database forensics
The Archivist By Mix Online
How Microsoft IT Approaches Organizational Change Management | Media | TechNet E...
Merge Replication Capacity Planning - REPLTalk covers Using and Tuning SQL Repli...
HYPER V and SYSTEM CENTER
Foundstone Network Security - Risk Management - Free Tools
Dive Into HTML 5
HTML5Rocks - Home
debianadmin.com Scan Report - URLVoid.com BETA
gnomeDIAicons - Beauty icons on your diagrams
New free e-book every month from the University of Chicago Press!
picogen.org
Your Employee Handbook :: Personnel Policy Manual and Editable Template
LinOTP 2
PowerShell for Failover Clustering: Webcast Follow up - Clustering and High-Avai...
Why Aren"t You Agile? - InsideRIA
Real-time Sunlight Wallpaper - Home
OpenPSA - Home: Welcome to openpsa2.org
F.lux: software to make your life better
Update CPAN modules - Kiffin Gish dot Com
perl -MCPAN -e "CPAN::Shell->notest(install => CPAN::Shell->r)"
Understanding Software Assurance - Microsoft Office 2010 Engineering - Site Home...
Volume Activation Tips and Tricks - Microsoft Office 2010 Engineering - Site Hom...
Why Office? “Our business runs on Excel.” - Microsoft Office 2010 Engineering - ...
DennisKennedy.Blog » My Latest ABA Journal Technology Column Introduces the Mobi...
Ksplice » Attack of the Cosmic Rays! - System administration and software blog
Flash Crash Analysis - May 6"th 2010 - Part 1 - Empirical Analysis - Answers - N...
50ms is approximately the time it takes light and electronic communication to travel from New York to California and back.
OpenSCAD - The Programmers Solid 3D CAD Modeller
My Kerberos Checklist… - CSS SQL Server Engineers - Site Home - MSDN Blogs
CHDK Download - build 0.9.9, revision #905
Planning migration to Office 2010 - FE blog - Site Home - MSDN Blogs
SAP on Windows and Anti Virus Scan - SAP Global Alliance Technology Team Blog - ...
$daniele.work.ToString() - Site Home - MSD...
$daniele.rant | Out-Blog
DeepPeep: discover the hidden web
Technical Solutions InputSystems Blog: .NET Framework 3.0 Service Pack 2 Update ...
FBI says new phone scam targets your bank account
BBLISA - Back Bay Large Installation System Administration
LOPSA-NJ
Dove - Document Distribution Software
Learning Powershell « Home of the Scary DBA
Visio Guy » Remove Backgrounds From Images With Office 2010!
MuseScore | Free music composition & notation software
Free Fax • Free Internet Faxing
dzo | Download dzo software for free at SourceForge.net
Californian Accused Of Sex Extortion Via Computer : NPR
Wizard Wall Portable DryErase Whiteboard
iOS Opt Out
Vmware ESXi 4 Log Files | Xtravirt
Obtaining an upgrade or update for Symantec AntiVirus Corporate Edition or Syman...
10 Reasons to Upgrade SAP systems to Windows 2008 / Windows 2008 R2 - Running SA...
Bluetooth Radar
Synology Inc. • View topic - Simple WDIDLE3.EXE Setup
UNISA Chatter – Operating System Concepts: Part 12 … Security - Willy"s Cave - S...
VODO presents: Pioneer One
XHTML/HTML Debugger (xhtmldbg)
unknowndevices - Project Hosting on Google Code
Home | OpenOffice.org Templates
sobees - sobees
Download details: Microsoft Baseline Configuration Analyzer 2.0
googlecl - Project Hosting on Google Code
DNS Sinkhole ISO Availabe for Download
SQL Server 2008 R2 Best Practices Analyzer is now available - Microsoft SQL Serv...
PowerShell for Failover Clustering: CSV Free Disk Space (and other info) - Clust...
Forumlogr.com - Connecting you to the best threads - 59 people online
SQL Load Test
E-mail ghettoVCB Backup Logs for Windows & VMware ESX/ESXi
Home Automation with ADSL, I-mode, Wap...
DC++ your files, your way, no limits
Opsview | Business-Powered System and Application Monitoring
Should IT Managers Assume Good Intentions When Developers Mess Up? — Datamation....
His philosophy: always first assume good intentions.
Wakodi | Download Wakodi software for free at SourceForge.net
Disconnect Between Legal and IT Getting Worse, Recommind Survey Reveals | Other ...
Rise of the Legal Support Manager
Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWAS...
7 Free, Open Source Tomes For Your Edification
LogicalDOC Document Management - Document Management Software, Open Source DMS
Sprint IP Network Performance
20 Windows 7 quick tips and tricks for IT admins - The blog of Rob Margel - Wind...
What Font is
Ultimate Deployment
Electrical What ?!
Jeffrey Miron » The Book
The SQL Server 2008 Data Collector: Part 3 - Dassault Systèmes ENOVIA V6 on SQL ...
Improve Your Site’s Search Ranking - Expression Web team blog - Site Home - MSDN...
You may see your IIS 6.0 applications failing to respond after you install Micro...
msgoodies: Get-Line and Got-NewJob
DBCC CHECKDB / Database Integrity - Cindy Gross - Troubleshooting, tips, and gen...
CloudHarmony
ITDB - IT Items Database
What is JavaScript and How Does It Work? [Technology Explained]
How to back up and then restore printers when you upgrade from Windows Server 20...
BBC World Service - Documentaries
swaks - Swiss Army Knife SMTP
Carnegie Mellon NetReg/NetMon
Cable Labels & Wire Markers for Laser Printers
Remus Information Management
New Data Center – Where have I been? | Michael McNamara
Green for Your Garden—and Your Wallet! | How to Get More Plants at No Cost | Pho...
A VC: MBA Mondays
Best Houseplants to Improve Indoor Air Quality « Pro"s Who Know
Dual Monitor Tools - Home page
Less known Solaris features: hxbt - or: WAN emulation - c0t0d0s0.org
Batch File to Local Administrators a Sysadmin Login in SQL Server - David Browne...
SysMT - SAP system maintain calendar
10 Tools To Add Some Spice To Your UNIX Shell Scripts
Cloud computing saves L.A. millions in IT costs - O"Reilly Radar
BigAdmin HCL: Sun Device Detection Tool
How to completely remove Symantec Antivirus (without entering password) [GluekWi...
HP Alumni Association
7 Sites With Laptop Teardown Guides & Other Laptop Repair Resources | Technibble
Google"s front page gets an image: are doodles dead, and what"s the purpose? | T...
AT&T website scraped to reveal iPad 3G owners" email addresses
AV Exclusion List - TechNet Articles - Home - TechNet Wiki
A list of microsoft exclusions
Hp | Router Freak
Front Page
Wiki whose focus is PeopleProjectsAndPatterns in SoftwareDevelopment.
tinyPM - Agile Collaboration Tool - Smart, Advanced and Lightweight Project Mana...
The Photographic Periodic Table of the Elements
The New Domino Admin » Blog Archive » Lotus Notes R8.5.1: SnTT – Updated (V3) St...
How to transfer the logins and the passwords between instances of SQL Server 200...
Browse Interleave Files on SourceForge.net
Slashdot IT Story | Botnets Using Ubiquity For Security
Security through Ubiquity
Home — CMDBuild
iTop
SQL Server lifecycle and the compatibility level settings - Cindy Gross - Troubl...
Free Credit Score & Credit Report Card. No Credit Card Needed
Billing, CRM and trouble ticketing - Freeside
Welcome to RT Se7en Lite - Introduction
7Customizer a replacement for vlite for windows 7 - MSFN Forums
Coova :: Open Source Captive Portal Access Controller and RADIUS Software |
NoCatSplash - SeattleWireless
Best Free and Open Source CRM Software | TechSource
The Ultimate Bash Array Tutorial with 15 Examples
TechSoup - The Technology Place For Nonprofits  
100 Terrific Web Tools for Meeting Your Personal and Career Goals
The Regex Coach - interactive regular expressions
The resume is an introduction, not an interview - One Louder - Site Home - MSDN ...
FILESTREAM Storage in SQL Server 2008
Moving FileStream data to new location - Sriram"s 2 Cents - Site Home - MSDN Blo...
Vladi Belperchinov-Shabanksi "Cade"s home site away/dfeta
PBS Helpdesk Start
Can I listen to you Mr. MSDTC? - Microsoft SQL Server Tips & Tricks - Site Home ...
Understanding the Performance Characteristics of Your System: Part 3 - PTC Windc...
Understanding the Performance Characteristics of Your System: Part 3
Understanding the Performance Characteristics of Your System: Part 2 - Dassault ...
Understanding the Performance Characteristics of Your System: Part 2
Understanding the Performance Characteristics of Your System: Part 1 - Dassault ...
SQL Server Latest Updates – May 2010 - SQL Adventures in Africa - Site Home - MS...
How to shrink Transaction Log (TLOG) quickly to reclaim space - Sakthi"s SQL Ser...
win7utils - Windows 7 ISO Disc Image Utilities
VisualCV • Get a better resume, online.
Reprofiler - A tool for repairing broken userprofile-associations.
Live Hacking | The Ultimate Guide to Hacking Techniques & Countermeasures for Et...
Association of Support Professionals—Tech Support Benchmarks & Best Practices
American Scientist Online
FGA: SPF is harmful. Adopt it.
Tracking Inflation: Consumer Price Index Explained - Infographic » My Money Blog
The things that are better left unspoken : Transitioning your Active Directory t...
An Introduction to the Windows System State Analyzer - Ask the Performance Team ...
Windows System State Analyzer
Two-Minute Drill: Disabled performance counters and Exctrlst.exe - Ask the Perfo...
Windows Server 2003 Security Baseline
roomle.com - the online room planning platform - GET THE IDEA!
Sev17
SQL Server PowerShell Extensions
blog.scottlowe.org - The weblog of an IT pro specializing in virtualization, sto...
Juniper Networks - What is the recommended ScreenOS version? - Knowledge Base
www.juniper.net/customers/csc/software/netscreen_versions.jsp
Welcome to The Sietch - A community of friends changing the world for the better...
Energy Savers: Approved Energy Efficient Appliance Rebate Programs
IBM - Index of recommended Fix Packs and fixes for Lotus Notes, Domino and iNote...
ReThinkHR (ReThink Human Resources)
Tabnabbing: A New Type of Phishing Attack « Aza on Design
VMware Documentation Downloader v10.04.14 | Xtravirt
VMware Documentation Downloader
Xenophane"s Blog » Blog Archive » Output a sortable HTML table
Dividend Window
Find the best sunscreen for you | EWG"s 2010 Sunscreen Guide
SQL Server and Log File usage - Blog do Ezequiel - Site Home - MSDN Blogs
Copyc.at | Check your webpage copy for readability
Want to speed up the SQL Server Setup Installation Wizard - SQL Server Setup - S...
PolicyTool - Now Available Free Social Media Policy Generator
SD Formatter 3.0 (Beta) for SD/SDHC/SDXC - SD Association
Scan Websites for Viruses - URLVoid.com BETA
ediscoveryinfo
IIS7.x: A Common Mistake when reinstalling IIS 7.x - errors 0x80070490 and 0x800...
Precision Computing - More PowerShell Syntax Highlighting
Visual Studio 2010 Architecture Guidance – Why are we talking about two types of...
Starting/Stopping your SharePoint 2010 Dev environment with Powershell - MOSSy B...
Customize setup for Office 2010
Configure a silent installation of Office 2010 by using Config.xml
StartCom Free SSL Certification Authority
www.tspforum.com | Tips & Tricks for Nortel Meridian
TommyP"s HFSLIP
perl2exe unpacker by (GalaxyMaster)
OpenDocument Developers Corner
epubcheck - Project Hosting on Google Code
The New Domino Admin » Blog Archive » Lotus Domino: What’s Going to go Wrong whe...
The unclustering of Domino
AlFahes Configuration Auditor: Main/Home Page
vCheck (Daily Report) « Virtu-Al
deltasql, Database Evolution under Control
Upgrade Juniper SSG 5 from the command line CLI | Network Users Group
Credenza Software - Professional Practice Management Inside Outlook
Seth"s Blog: The modern business plan
Applicant Tracking & Online Recruiting Made Simple - The Resumator
Your PasswordCard
ClearBits™ - Hosting and Distribution of Open Licensed Media
LCD monitor test images
Wi-Fizzle.com | TCL"s Expect, Autoexpect
The One Ring
TruPax.com
Simulating a more interesting environment with Vyatta and VMware ESXi – pt 3 « C...
Simulating a more interesting environment with Vyatta and VMware ESXi – pt 2 « C...
Simulating a more interesting environment with Vyatta and VMware ESXi « Carlos" ...
Free Online Employee Scheduling Software - ShiftPlanning.com
Effective To Do Lists - StacksAndStacks.com
ToneTool | Portable tone & selcall generator
Terry Zink"s Anti-malware Blog : Conficker - The Enemy Within
Download details: Windows 7 Deployment Plan: IT Pro Work Template
DROID | Get DROID at SourceForge.net
Resolving stop (blue screen) errors in Windows 7
Dassault Systèmes ENOVIA V6 on SQL Server : Understanding the Performance Charac...
Understanding the Performance Characteristics of Your System: Part 2
Converting a virtual disk image: VDI or VMDK to an ISO you can distribute | Turn...
How Linux Saved A Fast Food Giant. | Holy Crap My Hair Is On Fire
A Piece of Internet History
The Evolution Of Usenet News: The Poor Man"s Arpanet
Wimba Pronto
10 Organic Garden Aids For Pest & Disease Control : TipNut.com
Siginet Software Forums - Powered by vBulletin
Random Musings of Jeremy Jameson : Use PowerShell to "Reset to Site Definition" ...
Free Resume Help | Blue Sky Resumes
SQL Server Setup : Want to speed up the SQL Server Setup Installation Wizard
Car Care Automotive Maintenance Software - Free Mycar-Monitor - Bug tracker - In...
Nagios Meta Check Part 3
ODESSA
HealthBlog : Wizards of Health Technology
Lorem Ipsum - All the facts - Lipsum generator
Lorem Ipsum
Mark Arend : SharePoint 2010 Content Database Size
Shalla Secure Services KG
wpkg-gp - Project Hosting on Google Code
Linux and 3G. Not as tough as you’d expect! « 0×0000
Desktop Google Reader
Nexus SC: The System Center Team Blog : Virtual Machine Servicing Tool 3.0 Beta ...
Koha Library Software Community
Mentioned in the Humanitarian FOSS.
In-Out Board, Staff Status and Availability - Tabzon
How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or...
Default permissions and user rights for IIS 6.0
Description of default permissions and user rights for IIS 7.0 in Windows Server...
Gautam Goenka (MSFT) : How To: Test your application on slow network
MetLife | Brand Center
Giz Explains: Why Using Your Phone In Another Country Costs So Damn Much - Inter...
Arabind Coomaraswamy - Australian Visual Studio Product & Licensing Blog : Visua...
Arabind Coomaraswamy - Australian Visual Studio Product & Licensing Blog : Who n...
Blog do Ezequiel : SQL Server and Log File usage
shadowbox | 2010 wave for developers : Quickstart: Creating a Bootable USB Drive
Is Your Data Center Power and Cooling Truly Safe? « UNIX Administratosphere
Use "configure replace" Instead of "copy start run" - Packet Life
Dr. Z"s Blog : Moving Data from SQL Server 2000 to SQL Server 2008
Grant Holliday"s Blog : How to: Copy very large files across a slow or unreliabl...
My learnings : Generate GUID using guidgen.exe
Disney Vacation Tips and Lessons Learned
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Progr...
Creating Passionate Users
PTC Windchill on SQL Server : Are You Making This Common RAM Mistake?
Siemens Teamcenter on SQL Server : The Plan Cache
Vasu Sankaran : TF50374 error when upgrading to TFS 2010
Random Musings of Jeremy Jameson : Upgrading TFS 2005/2008 Project Sites to TFS ...
PTC Windchill on SQL Server : SQL Server Maintenance Sequence
J.D. Meier"s Blog : The Secret of Results
The Secret of Results
Ladislau Szomoru : TFS Administration Tool 2.0 has been released
SQL Azure Team Blog : Vertical Partitioning in SQL Azure: Part 1
SQL Server Setup and Deployment Support and Information | TechNet
Young i Professionals
The Tax Foundation - "Hauser"s Law": Can Tax Revenues Exceed 19% of GDP?
HP bought Palm after a five-company bidding war -- Engadget
How to check if your email server looks like a spam source | Free Software tips ...
Andy"s House O" Blog: Multiple Notes/Domino address books on your BlackBerry
Terry Zink"s Anti-malware Blog : No cyberattack on Wall Street
Virtual PC Guy"s WebLog : General Floppy script [Hyper-V]
Don Jones on PowerShell
Microsoft SQL Server Tips & Tricks : INF: New SQL Server features in SQL Server ...
Microsoft SQL Server Tips & Tricks : INF: New SQL Server features in SQL Server ...
Help : Office 2010 technical support articles
Christophe Fiessinger"s Blog : Microsoft Project Server 2010 - A look at Demand ...
Microsoft Press : Automating Microsoft PowerPoint
PTC Windchill on SQL Server : Understanding the Performance Characteristics of Y...
The Geek Alphabet
Technology Cadre |
Semiconductor Reverse Engineering and Patent Infringement Analysis | Chipworks
Aaron Stebner"s WebLog : Silent install, repair and uninstall command lines for ...
Get a Job FAST using LinkedIn, Facebook or Twitter - Business Opportunities Webl...
Medzilla;Biotech jobs, Pharmaceutical jobs, Pharmaceutical sales jobs, Health Ca...
organic fertilizer: getting the powershell version
ASPj"s WiFi Page: mdk3, rt73, rt2570 and other aircrack-ng experiments
Wifi Analyzer for Android
This. . . is. . . Sparta! The Culture of Education 2.0 - O"Reilly Radar
KB03744 - How to silently install BlackBerry Desktop Software - Port3101.org : Y...
Juristech Associates Ltd Home
organic fertilizer: opalis: properly retrieving published data from powershell s...
Code Quarterly
Looking through the Windows : Installing Windows 7 on a MacBook via a USB
Microsoft SQL Server troubleshooting : SQLPORT – SQL Server Portuguese Community
Canadian Developer Connection : New Programming Jargon
Concur Travel & Expense | Business Travel Expense Report Management Software | T...
Microsoft SharePoint Social Computing Team Blog : How user profile synchronizati...
Running SAP Applications on SQL Server : Monitoring SQL Server I/O performance w...
Heath Stewart"s Blog : Detection keys for .NET Framework 4.0 and Visual Studio 2...
Pedro Silva"s Blog : Cool Extension: Power Commands for VS 2010
Lessons Learned : PowerShell for Non-N00bs: Creating Shortcuts
Lessons Learned : Powershell for non-N00bs: Creating XML the .NET Way
Windows PowerShell Blog : Configuring WSMAN Limits
Lessons Learned : PowerShell for Non-N00bs: LiveMeeting XML API and You
Beside the Point : Double-hop authentication: Why NTLM fails and Kerberos works
Sandeep Joshi"s Den : Office 2010 64 bit and SharePoint Datasheet/Export to Acce...
Siemens Teamcenter on SQL Server : Updating a SQL Server Failover Cluster
Support Details | Tech Support Management
Get things done. Simple todo list - without the list.
gmapcatcher - Project Hosting on Google Code
SQL*Net compression « Oracle Scratchpad
WWoIT - Wayne"s World of IT: Keeping Citrix sessions alive with sendkeys
PTC Windchill on SQL Server : Managing a SQL Server Failover Cluster
StyleCop
Active Setup Explained « Helge Klein
50 Body Language Secrets You Need to Succeed in Life
Who Owns All the Data in the Workplace?
public sector employees" rights to workplace privacy in the digital age.
Oil spill approaches Louisiana coast - The Big Picture - Boston.com
How to make an ‘Obama’ HOPE Poster in GIMP | Scott Photographics | Photography &...
Ad Bard Network | Ad Bard Network
How to Delete a Failed Domain Controller from Active Directory « Useful Glyphs
Submin - Subversion Web Administration
The Absolute Minimum Every Software Developer Absolutely, Positively Must Know A...
The Floating-Point Guide - What Every Programmer Should Know About Floating-Poin...
Principles of Robust Timing over the Internet - ACM Queue
Upgrading to SharePoint Server 2010
Windows PowerShell Blog : A PowerShell Wander: ToolBox Mindset, –ExpandProperty,...
Beside the Point : Calculate Time-to-First-Byte with PowerShell script (Ping-Url...
Phishing and Spam IQ Quiz by SonicWALL
Digital Forensic SIFTing: SUPER Timeline Analysis and Creation
Super-Timeline Analysis
Microsoft SQL Server Tips & Tricks : SQL Server 2008 & SQL Server 2008 R2 cluste...
Temenos T24 on SQL Server : Performance Analysis of Logs (PAL) Tool: Part 1
Siemens Teamcenter on SQL Server : Reading the SQL Server Error Logs: Part 5
DNS-OARC | The DNS Operations, Analysis, and Research Center
Resequencing ACL Entries - Packet Life
Checksuite System Administration Tools
1-800-Recycling | Search for Recycling Centers, Green News and Tips
hoopajoo.net | IPDF
» BVC #17: The Luhn Algorithm
Luhn Algorithm
Setting Up Subversion for One or Multiple Projects | Linux Journal
mireka - Project Hosting on Google Code
The Many Faces of Mike McBride » Blog Archive » Fourth Rule of Knowledge Workers...
The Many Faces of Mike McBride » Blog Archive » Third Rule of Knowledge Workers:...
The Many Faces of Mike McBride » Blog Archive » Second Rule of Knowledge Workers...
The Many Faces of Mike McBride » Blog Archive » First Rule of Knowledge Workers:...
The Many Faces of Mike McBride » Blog Archive » Rules of Knowledge Workers -Intr...
Carpe Datum : SQL Server for the Oracle DBA Links
10 cool things you can do with Windows PowerShell | 10 Things | TechRepublic.com
#drupalcon Florida Hospital Takes Charge of Their Destiny with Drupal
IIS Aid | Microsoft Internet Information Services Support
Decrypt my World
Carpe Datum : Data Movement and the Decision Matrix
Pradipta"s Sql Server Blog : Deadlock Identification and Resolution - SQL 2000 a...
Pradipta"s Sql Server Blog : Sql Server General performance
Pradipta"s Sql Server Blog : Database Mirroring in Sql Server
Pradipta"s Sql Server Blog : SQL Server Corruption
Pradipta"s Sql Server Blog : All Sql Server Resources
Pradipta"s Sql Server Blog : Uninstalling SQL Server 2000, 2005 & 2008 on a Clus...
Pradipta"s Sql Server Blog : Uninstalling SQL Server 2000, 2005 & 2008 on a stan...
Pradipta"s Sql Server Blog : Sql Server Setup and Upgrade on a standalone box
Pradipta"s Sql Server Blog : Sql Server Setup and Upgrade on a Cluster
Diary Of An x264 Developer » Announcing the first free software Blu-ray encoder
How to colour gradient match photos in GIMP | Scott Photographics | Photography ...
The Structure of Authority: Why security is not a separable concern
Aircrack-ng
Procurement and Open Source Software Guideline —
Troubleshooting BlackBerry Enterprise Server Integration : Brian Desmond"s Blog
Siemens Teamcenter on SQL Server : Monitoring SQL Server"s Disk Subsystem
PTC Windchill on SQL Server : Reading the SQL Server Error Logs: Part 2
cmdln.org (a sysadmin blog) » Blog Archive » Analyzing I/O performance in Linux
FE blog : What’s new in the Office 2010 applications
Microsoft SQL Server troubleshooting : TechDays 2010 – SQL Server Engine Interna...
Microsoft SQL Server troubleshooting : TechDays 2010 – SQL Server High Availabil...
Dassault Systèmes ENOVIA V6 on SQL Server : Reading the SQL Server Error Logs: P...
Dolibarr Home
Monitoring OpenSolaris from an iTouch : Karim Berrah"s Weblog
The New Domino Admin » Blog Archive » Lotus Domino: The Simple Joy of Making a S...
The Mathematics Genealogy Project - Welcome!
The Secure Shell (ssh)
Motivation and Open Source - Linux Magazine Online
McAfee KnowledgeBase - False positive detection of w32/wecorl.a in 5958 DAT (for...
Social media demographics
Guest Post: Advanced GTD with Remember The Milk - Remember The Milk Blog
Sanjay Narang"s thoughts on SharePoint : SharePoint 2010 Performance (Stress, Lo...
Imagine Think Create Share : SharePoint Server 2010 Performance and Capacity Man...
SharePoint Technologies...from the field : SharePoint 2010 – Just published whit...
Siemens Teamcenter on SQL Server : Reading the SQL Server Error Logs: Part 1
Microsoft Fix it Center Online
Domiclipse :: RPC Monitor plug-in for Notes 8
Kexi Project - "Microsoft Access for Linux" - Home
MindTouch - Open Source Collaborative Networking for Intranets and Extranets
QuteCom - Home
Karsten SlideShow Project
openSIS | Open Source Student Information System
Archimedes - we"re back — Archimedes - The Open CAD
Areca Backup - Official Website
Linux Lock down - Security Blanket® Technical Blog
SpaceSniffer, find lost disk space the easy way.
Windows Freeware by Steffen Gerlach
How To Set Up Call Forwarding With Google Voice
Oleksiy Gayda"s Tech Blog: How-to: Juniper SSG - Reset to Default Settings
HWiNFO & HWiNFO32 - Hardware Information and Analysis Tools
Microsoft Fix it Center Online
Cisco Debug Enabled? - Terry"s Blog
TechnoLawyer Blog: Workshare Protect Server: Read Our Exclusive Report
The Invisible Catalyst Switch - Packet Life
Main Page - Openscap
infoScoop OpenSource Site - News
gsm_phone-anatomy-latest.pdf (application/pdf Object)
Ext2Fsd Project
Ext2 IFS For Windows: Screenshots
NagiosGrapher: HTTP Response Time
PROUHD: RAID for the end-user.
Prescription Assistance Program |
ostinato - Project Hosting on Google Code
Home (bonkey, the backup monkey)
The pmacct project: libpcap, NetFlow, sFlow, memory tables, SQL, RRD, BGP, probe...
check_rbl – nagios_plugins
Getting Started with Inkscape – Make Tech Easier
Resource Manager
Leave the CDs in the Office | Linux Journal
Business Has Killed IT With Overspecialization - www.enterprisenetworkingplanet....
Sage North America - Business Software Solutions for Accounting, CRM, ERP, FAS, ...
ERP Software, MASS Group - Manufacturing Automation Software & Systems Group, En...
gelogic homepage
Cisco Template Manager
Hard Drives Can Pose Risks to Sustainability - O"Reilly Broadcast
Plan Cruncher
fewt@blog:~$ _: System security? What about your DATA!
Nokia N900 overclocked to 1GHz in bid to outrun obsolescence (video) -- Engadget
USB/IP Project
NTA Monitor - ike-scan
United States - Cisco Systems
Comt
VirtualBox Virtual Appliances | VirtualBoxImages.com
You may want to avoid hacking your open-source CMS - FierceContentManagement
Selenium web application testing system
Philosophical Games: Hudsuckr: Advanced Windows proxy configuration from the com...
unimpressed.org
NexentaStor Project - CommunityEdition - NexentaStor Project
Membrane SOAP/HTTP Monitor and Proxy
Buck Security - Security Checks for Debian Linux
memonaut - Project Hosting on Google Code
NPAD Diagnostics at Three Rivers Optical Exchange (3ROX) (Pittsburgh, PA)
Storage OEM - Fibre Channel, iSCSI, and SAS Storage Arrays – Dot Hill
Windows PowerShell Blog : Testing cmdlets with FxCop
killerbee - Project Hosting on Google Code
friends « HR Geeks
JXplorer - an open source ldap browser
Gabriel Morgan : Positive and Negative behaviors to look out for in Enterprise A...
Using a Garmin GPS 18 LVC as NTP stratum-0 on Linux 2.6
Twitter FAQ: RT, HT, OH Explained. | Brent Ozar - Too Much Information
Escape From PDF « Didier Stevens
PS3Cluster Guide: By The Cluster Workshop
How To Read Your Camera’s Histogram And Take Perfectly Balanced Images
What Is A CPU and What Does It Do? [Technology Explained]
SharePoint 2010 Licensing Explained « Murray Gordon
Siemens Teamcenter on SQL Server : Creating a Performance Baseline - Part 1
Keyboard shortcuts - Google Reader Help
URL Encoding
Microsoft Mouse Mischief
Microsoft SMB Community Blog - By Eric Ligman : Be sure the customer’s name is o...
Change This - The Myth of Overnight Success
GMapCatcher Browses Online Maps and Saves Them for Offline Use - Maps - Lifehack...
Etacts - Gmail Browser Extensions
Decrypt my World : How to change drive letters (VBScript)
wissel.net :: Understanding the Notes directory structure
wissel.net :: Comparing Microsoft and IBM deployment diagrams - Part 1
Prevent inbound spam in Lotus Domino Mail Server part1 | Lotus Notes Tutorial Si...
System Garden - Habitat
WWoIT - Wayne"s World of IT: More useful command-lines
Linux Software - Mini SNMP Daemon
iTuner - The iTunes Companion
SamyGO, Samsung Firmware on the GO
The Tax Foundation - States Extending Income Tax to Travellers
The Tax Foundation - High Sales Taxes
Lotus Notes Ninjas: Prevent Lotus Notes mail server being used as an open relay ...
Linux Kernel Driver for Garmin GPS/USB | Get Linux Kernel Driver for Garmin GPS/...
GpsDrive - a free car (bike, ship, plane) navigation system
LinuxPlanet - Tutorials - Stumbling and Sniffing Wireless Networks in Linux, Par...
OpenAPC - Open Source Advanced Process Control - Open APC
Hack From A Cave
Wiki Web Help
Use ssh_config To Simplify Your Life | Linux Journal
Opendedup
Zim - a desktop wiki
One Mile at a Time - Tips, Tricks, and Travel with Lucky
USAir offering fastest way to Preferred status - Triangle Trip
MobaXterm - The free multitab Unix browser for Windows
Making Sense of DNS
The Apache Cassandra Project
Remmina - The GTK+ Remote Desktop Client
drizzle.org
TaskForest - A simple, expressive, open-source, text-file-based Job Scheduler wi...
Understanding the IBM Lotus Notes 8.5.x client directory structure
resetting client info is in here.
BIND zone file creator
.LRN Home
Deploy Trusted Root CA Certificate (command line) | Victor Tong"s Blog
Backupify :: Secure Online Backup and Archiving for Gmail, Facebook, Twitter, an...
"Making Sense of Privacy and Publicity"
Freedom In the Cloud
Download the Microsoft Web Platform
AlexSemi"s Blog : ZTIWindowsUpdate.WSF does not install all patches
Lessons Learned : PowerShell Gotchas: Looping with $null
PTC Windchill on SQL Server : Defragging Your Indexes
Microsoft SMB Community Blog - By Eric Ligman : Microsoft Open License Basics - ...
Terry Zink"s Anti-malware Blog : What we know (and learned) from the Waledac tak...
The figure description language: Box | Get The figure description language: Box ...
Inside Microsoft Dynamics GP : Feature of the Day: Rapid Migration Tool - Peacht...
WebTopics : IIS 7.5 – How to enable IIS Configuration Auditing?
untitled
Electronic Discovery Software, Discovery Assistant for eDiscovery
BackUp Tapes: Friend or Foe? « docNative Paradigm Blog
Legal Transformation: The Changing Legal Profession: Resource Management within ...
unexpected-incident-response.pdf (application/pdf Object)
Slashdot Hardware Story | Server Room Smells Can Be an Early Warning
True, True
Mercurial SCM
home/host/glitch.tl/repos/wifi-scanner: Summary
Athena FirePAC - Firewall Security Software
LedgerSMB.Org | Community developed Open Source accounting software
Grisbi - Personal Finance Manager for all
http://www.overstock.com/ringsize.html
Windows 7 RC | Support, Deployment, Resources
OpenMainframe.org - Home Page
The National Broadband Plan: Connecting America
How To Install Windows 7 On Your Netbook From A USB Flash Drive
MBRWizard! - The MBR Management Utility
MX Lookup Tool - Check your DNS MX Records online - MxToolbox
ForgeRock
Not 403: An example of the awesomeness of the open source community
Regional Nagios Server Setup | Linux Server Training
Rick Mitchell Solutions - RMSBlog: Configure port forwarding on Juniper routers ...
McAfee KnowledgeBase - Webwasher: How to Enable SSH Access for Appliances
Solution There are a couple of ways to enable SSH access to the appliance. Afterwards, you can log into the Webwasher using an SSH client like PuTTy.
http://www.antapex.org/unix.txt
TrustedSource - Check Single URL
Nasuni - The gateway to cloud storage
http://serverprotect-p.activeupdate.trendmicro.com/activeupdate/server.ini
What pattern version is trendmicro currently at?
SharePoint Escalation Team : SharePoint 2010 Logging Improvements – Part 1
SharePoint Escalation Team : SharePoint 2010 Logging Improvements – Part 2 (Intr...
The Science of Network Troubleshooting - Packet Life
ViewVC: Repository Browsing
Security Compliance Management Toolkit Series
Best Practices for Optimizing Group Policy Performance
Download details: Group Policy Inventory (GPInventory.exe)
SourceForge.net: phpivr - Project Web Hosting - Open Source Software
GenSnortDNS - Generate Snort DNS signatures
pdnsd maintenance page by Paul Rombouts
Top 20 Nginx WebServer Best Security Practices
UNIX History
wattOS :: Light - Fast - Now
The Raven Report | Cleaning up the Altiris Helpdesk Database
The Systems Engineer
AKB 20356: Unable to modify incident: This incident is being modified by another...
Wriju"s BLOG : Free Guide Books from Microsoft
Jotti"s malware scan
Why is my screen black when I start Windows 7?
Shavlik - Simply Secure
Samurai | Get Samurai at SourceForge.net
County Health Rankings
Please Rob Me
Photo Friday: Monitor Calibration Tool
Staying safe: protect yourself when selling a game console
How to build and maintain a tiered WSUS infrastructure
Search the PopSci Archives | Popular Science
Data in, Brilliance Out | Tableau Public
EssayRater - Home
Ride The Lightning: The Rebellious Millennial Employees: We Love the Evidence Th...
global_millennial_generation_research.pdf (application/pdf Object)
5 Tips to Acing An Interview | Wise Bread
Fixing a Problem with Nmap
FusionInventory » Time to unify them all! ;)
android-forensics - Project Hosting on Google Code
Nerd Merit Badges - Welcome
SAP and IBS-STL UK: A Timeline and Some Reflections « UKCBD: The Christian Books...
Inside Architecture : Should IT run “like a business” or “like a non-profit?”
dnsmap - Project Hosting on Google Code
dvdtube - Project Hosting on Google Code
Home - exscript - GitHub
STARDEV: Cluster - Welcome to StarCluster!
That Mysterious # sign in Twitter…What Does it Mean? | KristineWirth.com
NOX | An OpenFlow Controller
Home | vyatta vs cisco
Open vSwitch
how not to be a leader leadership | Ian"s Messy Desk
Coadunation OS: | Making the web your Desktop
RedKrieg’s Blog » Ghost 4 Linux complete guide to imaging
FOG :: A Computer Cloning Solution - Home
PXE Knife
AppDelivery » Migrating files and folders with Robocopy
Jiange Sun"s WebLog : A win2k8 server is running out of disk space but I cannot ...
Windows - When in doubt reboot:
» What Do Credit Card Numbers Mean? Making Sense of Your Credit Card Number
Steganography: The art of hiding stuff in stuff so others don"t find your stuff ...
Powershell for Batch Operations « Home of the Scary DBA
Mail::Postini - search.cpan.org
NetResView - View computers/network shares
BluetoothView - Monitor the Bluetooth activity around you
Oolite
Mail Relay Testing Tool
Excel Writer
Interesting Letterhead Designs | Letterheady
Tips, Tricks, and Advice from the SQL Server Query Processing Team : Understandi...
Microsoft Business Connectivity Services Team Blog : BCS PowerShell: Introductio...
Microsoft Assessment and Planning Toolkit Extender (aka "DBSpider")
Carpe Datum : Restarting the SQL Server Service Account – Why?
Jay"s notes on SQL : Creating a custom performance monitor counter for SQL Serve...
Linda Chong"s Blog : Making the Case: Discovering the Business Value in a Potent...
andLinux.org -- Run Linux natively inside Windows
Script to add the current user to the SQL Server "sysadmin" role - Home
howard rheingold"s | tools for thought
The WELL - the birthplace of the online community movement.
InternetSafety101.org: Internet Safety 101
Nick MacKechnie : Exchange Pre-Deployment Analyzer
granth"s blog : TFS2010: Create a new Team Project Collection from Powershell
NCDevGuys" ramblings on connected bits.... : Creating a bootable VHD image
Team Foundation Server Team Blog : Reporting in Team Foundation Server 2010 – Pa...
Team Foundation Server Team Blog : Reporting in Team Foundation Server 2010 - Pa...
Team Foundation Server Team Blog : Reporting in Team Foundation Server 2010 – Pa...
All topics fundamental : Windows Server 2008 R2 Virtual Hard Disk (VHD) Performa...
while (alive) { writeCode(); } : SharePoint 2010 & Service Provisioning
net stop SPAdminV4 && stsadm -o execadmsvcjobs
PuTTY Connection Manager
Microsoft SharePoint Team Blog : SharePoint Dialog Auto-Sizing and Master Page C...
Visual Studio SharePoint Development Blog : How to deploy a SharePoint Site Defi...
Reprofiler – Repair Tool of the Week | Technibble
Want More Photography Knowledge? Try These Free MIT Courses | Your Photo Tips
ADRestore.NET rewrite - Windowmaker"s blog
Carpe Datum
Experimenting with VLAN hopping - Packet Life
Document drafting | Document assembly | Document automation
Understanding MSTP - CCIE Blog
The Skill of Interviewing Part 3 - InsideRIA
Startup Manager
Research-IO
Auctions for Free Stuff - Listia.com
A Big Case of ...OOPS... - Following the White Rabbit Blog -
Ignite | Ignite Show Video
www.culturalcognition.net - home
On MicroSD Problems « bunnie"s blog
Netdisco Installation and Configuration
Simple PM - What Everyone Needs to Know About Project Management
Contract Analyst - Contracts Management System - Home Page
Introduction to DNSCurve
Panopticlick
IAN Symbol Libraries (Free Vector Symbols for Illustrator) - Integration and App...
Open Security Architecture
Admin script mistaken for self replicating virus! WTF! | Ask The Admin
Project management, requirements, collaboration, and task software: Endeavour
AlienVault - Creators of OSSIM - The OSS Correlation and Security Suite - Commun...
FXS, FXO explained
‘Time Bomb’ May Have Destroyed 800 Norfolk City PCs — Krebs on Security
Virus brings Norfolk"s computers to a screeching halt | HamptonRoads.com | Pilot...
nagaconda - Project Hosting on Google Code
Weird Usage Of “select” in perl | Safer Code - Secure Coding In C C++ And More..
Using Linux to back out a Windows XP patch - Computerworld Blogs
cdpr | Get cdpr at SourceForge.net
Spacewalk: Free & Open Source Linux Systems Management
Network Tracker
Securing the Debian zones
BarMax CA for iPhone, iPod touch, and iPad on the iTunes App Store
Network Address translation (NAT) cheat sheet - Packet Life
OneNote Testing : Optimizing a test virtual disk for distribution over our inter...
Microsoft Enterprise Content Management (ECM) Team Blog : Introducing Document M...
Active Directory Rights Management Services - AD RMS : Decommissioning AD RMS
Eric Kraus" SharePoint/.NET Blog : Backup Documents in SharePoint Using PowerShe...
SAP Global Alliance Technology Team Blog : System Center Virtual Machine Manager...
Microsoft Perspectives on Payments and Core Banking in Financial Services : Brid...
Access Road | Get Access Road at SourceForge.net
Splice Label Maker : Overview
Browse TeleKast Files on SourceForge.net
UNetbootin, Universal Netboot Installer | Get UNetbootin, Universal Netboot Inst...
Wiring the Vancouver Olympics | Beyond Binary - CNET News
Webbasierte Projektzeiterfassung für Dienstleister - openTimetool: Home
SendmailAnalyzer
Snoopy Logger | Get Snoopy Logger at SourceForge.net
Moodle reporting « Matteo Redaelli
NTFS Disk Recovery | HowtoForge - Linux Howtos and Tutorials
PHP-Calendar
Gosmore - OpenStreetMap
How do I enable ClearType in Windows XP?
Cleartype Registry
New to Japan - Language - Useful Japanese Expressions
Japanese Grammar Guide | Tae Kim"s Guide to Learning Japanese
Stolen Computer Registry - Homepage - Report and Search
How To Network Like A Rockstar « The Adventures of Reddsmitty
The Ten eDiscovery Commandments Revealed | Electronic Discovery Blog
Fuji-sama › Japan Today: Japan News and Discussion
Tellu Inventory Management
SecurityFriday [NBTdeputy]
ProxInbox : ProxInbox - Get proxies in your inbox
Email Updates | Anonymode Proxy Network
everydayproxy.com
Weird Kindle tricks: screensavers, screenshots, and games
Cheat Sheet and Quick Reference Card Directory | devcheatsheet.com - Cheat Sheet...
Project Server 2007 : Microsoft Project 2010 Ignite
A consultant"s perspective on FAST ESP and SharePoint Technologies. : Installing...
Tips and Tricks : Quick adapter speed settings? Use PowerShell
Joaquin Torres - BIG BLOGGIN : Ping a Subnet
msdev: SQL Server 2008 Express How-To-Guide Series
System Center Cross Platform and Interop : A PowerShell script for removing all ...
Canadian Developer Connection : CUSEC 2010 Keynote: Douglas Crockford – The Soft...
Maberry Centre Bat Homes :: Welcome to the world of bats!
The UK Higher Education Blog : Ready-made IT user documentation
Ready-made IT user documentation
The SF Site: The Best in Science Fiction and Fantasy
Hour 25 Home Page
Strategic Legal Technology :: Considerations for In-Sourcing and Outsourcing E-d...
Managing eDiscovery « eDiscovery Assistant
Command Line Kung Fu
Your Name In Japanese
Build An Impressive Free Resume Online In 15 Minutes With JobSpice
Free image vectorizer
Software for print quota and print control management. Your print accounting and...
PaperCut Print Logger - free logger and auditing program
Xerox are ripping me off « The Angry Technician
Main Page - Eth0Wiki
Linux Experiences: Linux Newbie : Why grep almost never yields something product...
rtspdump: Solution to playing MS-RTSP (WMS / WMV / X-ASF-PF) on Linux
Cisco Routers Help, CCIE lab - CCIE training - CCNP, CCNA Cisco Router Forum, Ce...
Im still trying to see the humor behind the site - not work friendly
Home | Email Standards Project
Personal Message Store Export Utility
Website Security Check - Unmask Parasites
The Hidden Dangers of PST Files
Download details: Microsoft IT Environment Health Scanner
ionipti: libpst and readpst... the hacked way on vista
TidBITS iPod & iPhone: Prepare Your Enterprise for the iPad
Lotusphere 2010: An Oral History Of Ibm Lotus Notes First 20 Years
SQL Power - SQL Power DQguru Data Cleansing & MDM Tool
OfficePOD®. Changing the way people work. Welcome to the next generation of work...
» How to Build a Zero-based Budget
Strong Authentication - e-Identity - PKI Solutions
Choose the optimal VPN service - Internetworking Expert Hints
Ra Testing Manager
terrastore - Project Hosting on Google Code
Gregor"s Tools and programs
IPv4/IPv6 DNS and DHCP config generator
Data Recovery in the event of your Death
Amateur Radio/Ham | Linux Journal
Legit Torrents - Legal Torrents, Free Media
Public Domain Movie Torrents with PDA iPod Divx PSP versions
LegalTorrents™ - Film, Music and Digital Media
OpenOffice.org Extensions for Business Users | Worldlabel Blog
Rachota Timetracker
Not enough server storage | Windows Problem Solver
Arch Reactor - News
NES stuff
SocNetV - Social Networks Visualization and Analysis Software
Topsy - A search engine powered by tweets
Main Page - OneCMDB
MonitoringForge: Network Management Software
eventh - Project Hosting on Google Code
Lucidor - E-book Reader
Timeclock Software | Employee Timeclock Software
National Software Reference Library
To DeNIST or Not to DeNIST, that is the question! « Bow Tie Law’s Blog
DeNIST
SiT! Support Incident Tracker
Torrus Project
Computer Science Teacher - Thoughts and Information from Alfred Thompson : So ar...
Microsoft UK Schools News Blog : Top 10 ICT Money Saving Tips – 6 – Stop buying ...
Academic Earth | Online Courses | Academic Video Lectures
Ten essential Python tips for beginners | Linux User
organic fertilizer: list domain controller site information with powershell
Project SIKULI
PowerShell Script for Creating Indexes « Home of the Scary DBA
How to Protect Your Privacy with Facebook’s New Privacy Settings in 17 Easy Step...
Active Directory Powershell Blog : Adding/removing members from another forest o...
Null Reference Exception : Learning PowerShell: Random Album
Powershell4SQL
The Gates Notes
odmon.com - Online Device Monitoring
Microsoft Project Team Blog : Project 2010: Introducing the Backstage view
SharePoint Brew : SharePoint 2010 Shared Service Architecture Part 1
Windows Update Error Code 8024A000
Make IT Right : More than trends
Information Security : Reducing Operational Risk through Business Continuity Man...
organic fertilizer: using psexec to launch processes that survive logoff/logon …
organic fertilizer: enabling ntlm authentication with firefox
20 (More) Awesome GIMP Brush Sets | TECH SOURCE FROM BOHOL
Steve Friedl"s Home Page
Legion: A Worldwide Virtual Computer
Scannedonly Scalable Samba Anti-virus module
./: The Tower of Babel
VirtualBox’s Little Secret: The Command Line | Linux Magazine
AdFreak: Apple Get a Mac: The Complete Campaign
EvilPacket MiFi GeoPwn
SECURE WORLD-Know your threats : Password policy settings, Vulnerability,counter...
webERP: What Is webERP?
lnav -- The Logfile Navigator
Programming with proportional fonts is great - m-mz"s posterous
PowerShell Notes : Getting Uptime of Multiple Servers
Decrypt my World : How to get all DCs in a Forest (VBScript)
Microsoft SMB Community Blog : How to add a license agreement to your view on Mi...
Microsoft Volume Licensing Service Center
Ask the Performance Team : An Introduction to the Windows System State Analyzer
Windows System State Analyzer
Windows Server : Windows Server 2008 R2 – Feature Components Poster
Windows 2003 Server falls off network | Michael McNamara
Click Start, click Run, type regsvr32 polstore.dll, and then click OK.
Root Wireless
» The S&P500 Dividend Aristocrats
Mac Specs, Prices, Answers, & Comparison @ EveryMac.com - Est. 1996
DIY solar Hot Water System build your own
Internetworking Technology Handbook - DocWiki
Unreasonable Security Practices That Will Soon Be Even More Irrelevant - www.ent...
queXS | An Open Source, web based CATI system
wissel.net :: Domino and Disk Fragmentation
Photo Calendar Homepage
Manage your business documents with Kraft
Text Stream Filters LPI Course Tutorial | Linux Server Training
The Official, Unofficial, Federal Desktop Core Configuration [FDCC] Blog
Federal Desktop Core Configuration
Federal Desktop Core Configuration - Wikipedia, the free encyclopedia
Federal Desktop Core Configuration (FDCC) deployment resources
Complying with the FDCC Mandate
Project for Excellence in Journalism (PEJ) | Understanding News in the Informati...
A Journalist"s Guide to the Internet
vdbench | Get vdbench at SourceForge.net
Pitfalls of Benchmarking Flash with dd(1M) : Lisa Noordergraaf
UK SharePoint Team : SharePoint Server 2007 and Records Management: Part 4 of 4
On Ensemble : Masato Baba, Kristofer Bergstrom, Shoji Kameda and Kelvin Underwoo...
How You Can Tell Whether a Website is Safe
How to Read the Results of SELECT @@VERSION in SQL Server - Windows Live
Network Diagram v0.7beta
Planet M.U.L.E.
Programmers Need To Learn Statistics Or I Will Kill Them All
The PowerPoint Team Blog : 5 Tips on Getting PowerPoint to Sing!
SharePoint 2010 End-User Training
Notes from SQL Server Premier Field Engineer : SQL Server 2005/2008 database tun...
SQL Server 2005/2008 database tuning - picking low hanging fruits - part I
Notes from SQL Server Premier Field Engineer : SQL Server 2005/2008 database tun...
Sql Tools I use in the UK ADC Scalability Lab - Windows Live
Business Continuity Lifecycle
Add MIB files to Wireshark SNMP decoder - CT3
HWiNFO32 Download
MobileRead
Reversing Everything
Feedbooks | Food for the mind
Network Connection Chart | Get Network Connection Chart at SourceForge.net
Petit - Open Source
NetMap
What is UPR?
SourceForge.net: SerLooK - Project Web Hosting - Open Source Software
The Fast-Track Homepage
Jolicloud
Create Public Share on Samba | Linux Server Training
Cisco, Symantec, Apache Tackle Y2K10 Glitches — Datamation.com
Windows 7 has lots of "GodModes" (exclusive) | Beyond Binary - CNET News
{00C6D95F-329C-409a-81D7-C46C66EA7F33} {0142e4d0-fb7a-11dc-ba4a-000ffe7ab428} {025A5937-A6BE-4686-A844-36FE4BEC8B6D} {05d7b0f4-2121-4eff-bf6b-ed3f69b894d9} {1206F5F1-0569-412C-8FEC-3204630DFB70} {15eae92e-f17a-4431-9f28-805e482dafd4} {17cd9488-1228-4b2f-88ce-4298e93e0966} {1D2680C9-0E2A-469d-B787-065558BC7D43} {1FA9085F-25A2-489B-85D4-86326EEDCD87} {208D2C60-3AEA-1069-A2D7-08002B30309D} {20D04FE0-3AEA-1069-A2D8-08002B30309D} {2227A280-3AEA-1069-A2DE-08002B30309D} {241D7C96-F8BF-4F85-B01F-E2B043341A4B} {4026492F-2F69-46B8-B9BF-5654FC07E423} {62D8ED13-C9D0-4CE8-A914-47DD628FB1B0} {78F3955E-3B90-4184-BD14-5397C15F1EFC}
Surveys: IT job satisfaction plummets to all-time low
2010 bug hits millions of Germans | World news | The Guardian
Slashdot Technology Story | Hotmailers Hawking Hoax Hunan Half-Offs
epub2pdf : book pages your way : quick and easy conversion of EPUB to PDF
The so-called “God Mode” | BrandonLive
SourceForge.net: Lemon Pos - Project Web Hosting - Open Source Software
Kodak Easyshare Wireless Picture Frame - How to show everyone whats on your fram...
Ben Parker"s Blog : The security Permissions aren’t the same when I use Robocopy...
Microsoft SMB Community Blog : The end of my 10 years at Microsoft
Mobile Express Driver Drivers and Downloads
Global Print Driver Drivers and Downloads
Shoka
Enterprise Hosting for Notes, Domino, Exchange, Sharepoint, Java, Tomcat, JBOSS,...
How the internet works: Domains - Blog - Bill"s Blog
The Art of Estimation Part 2 - InsideRIA
The Art of Estimation Part 1 - InsideRIA
Public Domain Day
Crypto Law Survey
Rapid Analysis Program for Investment Decisions
Less Than Dot - Blog - Beginning stages of a DR plan for SQL Server
Real World Computing & Collaboration: Our Infrastructure Upgrades - Domino (Part...
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 5)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 4)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 3)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 2)
Less Than Dot - Blog - Applying Kanban to IT Processes (Part 1)
How To Enable Windows 7 Secret God Mode
Use any version of Windows 7 free for 120 days
Best Way - Can I Insulate the Floor of a Crawlspace With Rigid Foam Insulation? ...
Foam board installation in crawlspace
The Open Information Security Foundation - Suricata Downloads
Suricata
sshbl.org - (the SSH blacklist)
Serbert homepage
Malheur - Automatic Analysis of Malware Behavior
Egypt Tech Talk : Secrets of IE8
Free Cisco Tools - BradReese.Com
Whyteboard: Simple whiteboard and PDF annotator in Launchpad
GRC"s | DNS Nameserver Performance Benchmark  
"You can"t optimize it until you can measure it: "
Flash Player Version
DNSCog - DNS reporting and diagnostic tools
Network Tools: DNS,IP,Email
Ten years of BlackBerry -- Engadget
Bazaar
Traveling Couples: Chris Dunphy & Cherie Ve Ard | Travels With Two
Self-Annihilating Sentences --- S. Gorn
Scripting with Windows PowerShell
22 stories underground: Iron Mountain"s experimental Room 48
OnStar GPS Hacking (radioetcetera)
SourceForge.net: Virtual Cache - Project Web Hosting - Open Source Software
SourceForge.net: Proxy Tester and WPAD Generator - Project Web Hosting - Open So...
AutoCAD Free Download and ACAD upgrade
JLinBar - Barcode Scanning with a Webcam
HOME PAGE OF MISHA CHERKES
Repair Tool of the Week: Universal Silent Switch Finder | Technibble
The Official Site of Game Key Revealer and SoftKey Revealer - Mustafa Bugra AKTA...
VirusTotal - Free Online Virus and Malware Scan - Email/Uploader
http://www.theforcefield.net/wordpress/
Your Friendly Neighborhood Computer Guy
Tech Vets
Copy your files faster with TeraCopy
HOME PAGE OF MISHA CHERKES
Expert Online Tech Support, Computer Support by Phone and Remote PC Support | Pa...
BlueScreenView - blue screen of death (STOP error) information.
Uninstall & Remove McAfee Norton & More Antivirus Applications — AppRemover Site
Repair Internet Explorer with Fix IE Utility | The Windows Club
Fix WU Utility – Repair Tool of the Week | Technibble
Free Driver Update Software - Device Doctor
Christophe Fiessinger"s Blog : Microsoft Project Server 2010 and PowerShell
Microsoft Visual Studio/.Net Framework Setup & Deployment Tips & Tricks : How to...
Creating a self signed wildcard certificate for IIS7
SourceForge.net: travelingsales
A Kindle World blog
Imagine Think Create Share : Security SharePoint boundaries - Securable objects ...
Home Office Design Ideas and Tips That Every Web Worker Needs To Know
Manpreet"s SharePoint Developer Blog : How to get audit logs for various admin a...
Backupify :: Secure Online Backup and Archiving for Gmail, Facebook, Twitter, an...
The Geek’s Night Before Christmas
The Dividend Guy
#753699 - Pastie
Dividend Growth Investor
Massively Parallel Procrastination: Savory
Ian"s Thoughts: dxTop - Android home alternative
LinuxPlanet - Tutorials - Fixing Your Holiday Photos With GIMP - Redeye, Low Lig...
Open Source Job Scheduler Overview
Inside Architecture : Does IEEE-1471 Define Enterprise Architecture?
Space Stage Tips
Civilization Stage Tips
Tribal Stage Tips
Creature Stage Tips
Cell Stage Tips
Dan on eScience & Technical Computing @ Microsoft : FREE PowerPoint Twitter Tool...
Crabby Office Lady Home Page - Help and How-to - Microsoft Office Online
UK Application Development Consulting : PowerShell script to clean and zip a dir...
EMEA Dynamics CRM Support : Speeding up IIS web site access / IE throughput
Randy Miller"s Blog : Managers and Makers
DataViz
SharePoint Brew : SharePoint 2010 Logging Improvements – Part 1
Access Control: Understanding Windows File And Registry Permissions
SharePoint Escalation Team : SharePoint 2010 Granular Backup-Restore Part 2
SharePoint Escalation Team : SharePoint 2010 Granular Backup-Restore Part 1
SharePoint Escalation Team : PowerShell Intro for SharePoint Administrators - Pa...
SharePoint Escalation Team : PowerShell Intro for SharePoint Administrators - Pa...
Pat"s Application Compatibility blog : Common Issues with 32-bit Applications Fa...
Shawn Hargreaves Blog : The psychology of randomness
FrankFi"s view of the world : Random Thoughts on Leadership
Microsoft SQL Server Tips & Tricks : Unable to install SQL Server 2005 on a Wind...
Anon Bestman (newlywedsontjob) on Twitter
Twitter, Newly Weds, Electronic Bed Foolery, and The Best Man!
:: Thinstation - a light, full-featured Linux thin client OS ::
Adobe Acrobat User Community | Acrobat User Community
NANY 2010 Pre-Release: Page Countster - DonationCoder.com
David Rumsey Historical Map Collection | Google Maps
Get RekindleIT
ICANN | Committees | Security and Stability Advisory Committee
» Your DNS is an Asset (Twitter DNS Woes…) · Security to the Core | Arbor Networ...
Newpods
Inside the Trackpad: a BlackBerry Science Lesson - The Official BlackBerry Blog
Org-Mode: Your Life in Plain Text
TaskFreak! web based task manager / todo list written in PHP
WebCollab
Slashdot Comments | What Does Everyone Use For Task/Project Tracking?
But generally, my advice would be to not even try to devise a technical solution that will "keep you organized". Either you"re organized or you aren"t. If you add a complex technical solution on top of your disorganization, you"ll probably end up dealing with your technical solution in a disorganized manner and it won"t work. Get organized, then figure out a system that will help you skip over some of the more tedious steps of your workflow. Also, don"t try to put all your information into a single task list. Keep the task list simple enough that you can glance at it and see if there"s anything you can check off. If you need more information on a given task, keep a resource file somewhere else and store all the details there.
Redmine - Overview - Redmine
Nth Dimension/downloads:: Negatively discriminating against idiots since 1995!
The Open Source BPM Company | BonitaSoft
Retro delight: Gallery of early computers (1940s – 1960s) | Royal Pingdom
Making it in Japan
Welcome to TameGoesWild - The personal portal of Joseph Tame
A Year in Japan - a regular podcast from the TGW network
WiFiDog
Magical Jelly Bean Software - Magical Jelly Bean Keyfinder v2.0.1
TidBITS Networking: Improve Wi-Fi Performance in the 5 GHz Band
Create mount and copy floppy disks images under linux « A fork in the road
emtcopy
ImDisk
BlackLight
ReputationDefender : Home
LEGO Digital Designer : Virtual Building Software
Orchestrate, Integrate and Automate IT Operations Run Book Processes - Opalis So...
About Warrick
Home Improvement Blog - One Project Closer
PC Perspective - Western Digital introduces "Advanced Format"
CTX075552 - Troubleshooting ICA 32-bit and Web Client Connectivity Issues - Citr...
IBAM, the Intelligent Battery Monitor
How to Survive in IT (the soft evil skills) — Datamation.com
LinuxPlanet - Tutorials - Make Your Own Holiday Cards with GIMP - Using Your Own...
Tech Tip: Add Latitude/Longitude Information to Photos | Linux Journal
Windows 7 USB/DVD Download Tool
Wild New Design: Data Center in A Silo « Data Center Knowledge
Study finds Americans consume 34 gigabytes of information per day -- Engadget
Analyzing Malicious Documents Cheat Sheet by Lenny Zeltser
Information Technology and Security Cheat Sheet References by Lenny Zeltser
Airport Lounge Access Worldwide | Priority Pass
Script to remotely list Windows local administrator group membership « the back ...
Unix and Linux startup scripts, Part 2
Unix and Linux startup scripts, Part 1
You Can Negotiate Anything * Get Rich Slowly
CaseCruzer - Reusable Shipping & Carrying Cases
Port3101.org : Your BES Connection - Powered by vBulletin
EasyIDS
Linux Server Training Tutorials and Courses
20 years ago today...Notes 1.0
condensation on inside of windows - DoItYourself.com Community Forums
The History of the Internet in a Nutshell
Unix and Linux startup scripts, Part 1
chml: a tool to control Windows Integrity Levels
Hari Prasad"s Blog : SharePoint Planning Visio Diagrams
Simple Desktops
Ubuntu Learner » Blog Archive » DVD-drive won’t work after kernel update to 2.6....
Batch Programming Stuff
Useful commands for Windows administrators
DOS Batch - File Examples
Eyes for Lies Blog
CSEdWeek.org
Core Configurator 2.0 (Windows Server 2008 R2)
The Double-Edged Cert - Packet Life
TruePower UCS Power Outlet With Built in USB Ports - TruePower UCS Power Outlet ...
SquidTL - Time Control Limit for Squid proxy
Professor Seymour Papert
ge was
Teamwork Home Page - Work Management, Time Track , Project Management
LATRIX.ORG | HR Support & Attendance Tracking
How Robber Barons hijacked the "Victorian Internet"
About the Project and Feedbacks
MailArchiva - email archiving, email archiving software, ediscovery
ClearOS | Overview | Software
t r y ^ d :: long live free music
Understanding NIC Bonding with Linux - www.enterprisenetworkingplanet.com
PlayStation® 15th Anniversary
SecuraBit
Official Google Blog: Introducing Google Public DNS
8.8.8.8 8.8.4.4
Lickity Split
TaxTalent.com
How To: Getting VPN to work through NAT firewalls :
Adobe PDFMaker Error Message - Help and How-to - Microsoft Office Online
Microsoft Office program name has detected that your computer has a version of Adobe Acrobat PDFMaker that is known to cause instabilities in program name 2003. To resolve this issue, download an update from Adobe Systems’ Web site
The Golden Ear - TWEAK - The Windows Environment and Application Konfigurator
Main Page - Beagle
Developer Ponders Release of Linux Malware - News - eWeekEurope.co.uk
Johannes said the malware does not exploit any security holes, only loose security configurations and mindless execution of unverified downloads.
Google’s Safe Browsing Diagnostic Tool
browsersec - Project Hosting on Google Code
ratproxy - Project Hosting on Google Code
Malware Domain List
StopBadware.org - Search Badware Website Clearinghouse
Google Pack
Mango, open source M2M
Downloads « www.run-virtual.com
About the Business Software Alliance.
RoomAtlas - Book hotels from our interactive map
Tom"s Planner | Gantt Chart Software | Faster than Excel easier than MS Project
hpHosts Online - Simple, Searchable & FREE!
| McAfee SiteAdvisor Software – Website Safety Ratings and Secure Search
Google Safebrowsing
RackTablesInstallHowto - RackTables - Trac
Frugal IT — Information Technology on the Cheap!
Dimdim: Web conferencing that just works. Dimdim provides easy, open, affordable...
Free Worldwide Travel Guides - Wikitravel
Oracle Security Tools (GUI)-is a free tool, aimed to test the security of the DB...
Home (The Magic Clock)
Windows PowerShell Blog : You Don’t Have to Be An Administrator to Run Remote Po...
SVN Access Manager Documentation
CRON-O-Meter
The Electronic Discovery Reference Model
ULS Viewer - Home
Employee individual vacation record - Templates - Microsoft Office Online
J.D. Meier"s Blog : Now Available: Final PDF of the Microsoft Application Archit...
SQL Server Security : Consolidation Guidance for SQL Server
PFE - Developer Notes for the Field : Creating non-user specific printer mapping...
Hari Prasad"s Blog : Copying sites in SharePoint 2007
Hari Prasad"s Blog : Backup and Restore - SharePoint Farms, Site Collections & S...
saurabhd"s musings : Powershell:Reading the header columns in a .CSV file using ...
WebTopics : How To: Collect a Crash dump of an IIS worker process on IIS 7.0 (an...
Steven Haden"s Blog : Key Microsoft Project Resources
Imagine Think Create Share : Follow SEO recommendations in your public SharePoin...
Carpe Datum : The Magical World of SQL Server Licensing
Leading Geeks: On Interviewing
The Power Collective Ridgeblade wind turbine power generation Yorkshire
NConf - Enterprise Nagios configurator [NConf - Enterprise Nagios configurator]
netsniff-ng - Project Hosting on Google Code
Remotely Configuring DRAC Cards : Brian Desmond"s Blog
Inkscape
Graudit - Just Another Hacker
wissel.net :: Preparing for an IBM compliance audit of your Notes licences
Etherealmind - Human Network Infrastructure - cisco network design, study, archi...
Early death of Cisco VPN Client forces VPN license fees | My Etherealmind
Public.Resource.Org
CommonCrawl - About
Track down your stolen laptop – Prey
Definitely need a builtin webcam on this one.
Helpful Tips for ESI Data Mapping to Reduce E-Discovery Costs || ESIBytes
ESI (Electronically Stored Information)
TunesArt Index
Go Aruna
MozillaHistoryView: View the list of visited web sites in Firefox/Mozilla/Netsca...
IE HistoryView: Freeware Internet Explorer History Viewer
Linux.com :: Taking a load off: Load balancing with balance
Apsis Gmbh - Pound
Inlab Software GmbH - BalanceNG: The Software Load Balancer - Available for Linu...
Pen
Ultra Monkey:
Distributor
::dataBridge:: SharePoint Training SharePoint Development SharePoint Consulting
Thecus NAS ( Network attached storage ) - Storage server Leader; RAID, iSCSI Exp...
Get Apple’s MultiTouch Magic Mouse To Play Nice on Windows
Carpe Datum : Using Perfmon with SQL Server – Part Two
Virtual PC Guy"s WebLog : Hyper-V and Domain Controllers – Demo Tips and Tricks
» How To Write an Interview Followup Thank You Letter
» How to Dress for an Interview
» How to Properly Use Headhunters
» Ten Resume Mistakes You Must Avoid
» How to Write A Kick-Ass Cover Letter
Legal Holds and Trigger Events: BlackBerrys Make Legal Holds Tougher
EduGeek.net
Intern Queen Inc - The Official Website of Lauren Berger
Inhabitat
Ad.ly - In-Stream Advertising
Low-Cost Tools to Kickstart Your New Business - www.smallbusinesscomputing.com
Nimbus - Nimbus Open Source IaaS Cloud Computing Software
Berkman Center
Cloud computing security benefits, risks and recommendations
How to remotely wipe a media card in a BlackBerry smartphone « the back room tec...
Eric Lee : Scrum Is Not About Tools
Galaxy Zoo 2
Pulse 2
The Backup Blog: Avamar v5.0
Nikon Nikkor Lenses
Windows 7 Resource Kit - Unofficial Support Site
Bob"s Blog : The IT Complexity Crisis: Danger and Opportunity
Eric Kraus" SharePoint/.NET Blog : Automated SharePoint 2010 Install with PowerS...
Five improvements for IT managers in 2010 | IT Systems News - Betanews
The Unix Power Classic: A book about the Unix Way and its power
Information Technology Standards Committee
Here Be Dragons: An Introduction to Critical Thinking
Best practices for setting up a Windows print server
Windows Server 2003 Print Services
Drive Snapshot - Kommandozeile
Tiny PE
MileTrak in Launchpad
bigsync - Project Hosting on Google Code
Ed Brill
Lotusphere on $5 a Day (sort of) by The Turtle (Scott Wenzel)
msgoodies: PS Remoting to Home Server
MailArchiva Email Archiving & Email Compliance Features
untitled
How to uninstall the Adobe Flash Player plug-in and ActiveX control
More Fun With Bash Quoting | Linux Journal
Visualizing Stackoverflow"s data dump - O"Reilly Broadcast
The Copier Network
Downloads : NETGEAR ReadyNAS Community
How to Easily Monitor System Performance with the new DiskLED 1.1 « Helge Klein
Yabs - Yet another Business Software
PesterCat : Web Testing - Home
PowerFolder | freshmeat.net
Endeavour Software Project Management
Déjà Dup in Launchpad
http://jttslite.sourceforge.net/
SourceForge.net: VisualDB - Project Web Hosting - Open Source Software
The DIY Zoning Project
25 best quotes from tech history
chosaq
DPC Latency Checker
Schneier on Security: Laissez-Faire Access Control
Install Twiki on a Debian 3.1 box - Quantact
Secure-24 - SAP Managed Hosting Services
Script to find and email files in a directory « the back room tech
Share Book Recommendations With Your Friends, Join Book Clubs, Answer Trivia
Welcome to Shelfari! Read, Share, Explore! - Shelfari
Clay Shirky"s Internet Writings
The Ethical Hacker Network - Cool and Illegal Wireless Hotspot Hacks
Synergy Recycling - Mayodan, NC
Windows PowerShell Blog : I Can Do That With 1 Line of PowerShell: Installed Sof...
LeanPM | Get LeanPM at SourceForge.net
CosmoLearning | Your Free Online School: Courses, Video Lectures, Documentaries,...
Which PM Methodology is the “Right One” for Your EDD Project? « Electronic Disco...
The Project Management Tip You Can’t Ignore » The Rapid eLearning Blog
SQL Server Setup : SQL Server 2008 Discovery Report
CSS SQL Server Engineers : How It Works: How many databases can be backed up sim...
LogIn SDK - Windows SDK team blog : Steps to sign a file using Signtool.exe
The ShiSh List : Sharepoint 2007 Planning Tools/Resources
Security Tools : Some New Software Security Tools for Web Developers – (CTP Rele...
In search of simplicity, quality and tranquility in software engineering : Chatt...
basqet - Project Hosting on Google Code
Kimai - Open Source Time-Tracking
Microsoft Access Performance FAQ
Japanese - Pimsleur Study
Remus
How To Easily Automate Backing Up Your Wordpress Blog
Encours: Real-time interactive presentations
Logic Circuit official web site
Doc Searls Weblog · Colors of salt
Aprigo- SaaS IT Management Essentials | aprigo
Unix, Linux, Mac OS X Help, Tutorials and support pages
LinuxPlanet - Tutorials - Character Sets in Linux or: Why do I See Those Weird C...
SocialCatz, True Social Media Marketing Solutions
USB Switchblade - Hak5
ique of
CoTweet™ - How business does Twitter
IT Training and Consulting - SharePoint, Project Management - Springhouse Educat...
Main Page - mRemote
SharePoint Brew : PowerShell Intro for SharePoint Administrators - Part 1
Xbox-Scene News: Xplorer360
Layer 2 Network Protections against Man in the Middle Attacks
SourceForge.net: Wrapper for AWK providing modules - Project Web Hosting - Open ...
TuxSoft - Products
RipIt - a command line audio CD ripper
ecoATM-web-final
The Postini always rings twice (Page 2)
Technology Explained: What Is Bluetooth?
Introduction to iSCSI | Linux Magazine
Creative Cleaning with Everyday Products * Get Rich Slowly
Beginner"s Guide to Linux Desktops Backups: Basic Strategies and Tools
Allan"s Best Week Ever : SharePoint 2010 Tree of Life – Resource Roundup
Random Musings of Jeremy Jameson : A Simple Backup Solution
Nick MacKechnie : Microsoft Assessment and Planning Toolkit 5.0 Community Techni...
8 Free (and 4 cheap) Things to Do in Auckland with a Toddler | Wise Bread
LyX | LyX – The Document Processor
CDI - Center for Defense Information - Security Policy Research Organization
Disk Benchmark | ATTO Technology, Inc.
SaaS vs. On-Premises Solutions Considerations | Lotus Journal
All The Best Organizing Solutions In The Organizer"s Toolbox -- OnlineOrganizing...
h+ Magazine | Covering technological, scientific, and cultural trends that are c...
What DNS Is Not - ACM Queue
DNS (Domain Name System) is a hierarchical, distributed, autonomous, reliable database. The first and only of its kind, it offers realtime performance levels to a global audience with global contributors. Every TCP/IP traffic flow including every World Wide Web page view begins with at least one DNS transaction. DNS is, in a word, glorious.
ImageMaster
lessfs
Legend of the seeker.org - Fansite for the Legend of the Seeker / Sword of Truth...
Creating Ebooks with Sigil - Linux Magazine Online
Dashboard
WordPress › WordPress Exploit Scanner « WordPress Plugins
Insider threat: The snapnames case
404 - File or directory not found.
Terry Zink"s Anti-spam Blog : The Story of Conficker, part 2
Terry Zink"s Anti-spam Blog : The story of Conficker
extendedsubset.com - Renegotiating TLS
Tokenless Two Factor Authentication | Multi-factor Strong Authentication
Links » Another Protocol Bites The Dust
MINTS - Minnesota Internet Traffic Studies
pnp-0.6:start [PNP4Nagios Docs]
Apple’s Magic Mouse — First Impressions
Download details: Office 2003/XP Add-in: Remove Hidden Data
Process Visualization Browser ( pvbrowser ) SCADA
MBLogic
Postini Help
VolkerW"s WebLog : Server Room to Datacenter To Compute Container
Online Tool for URL Encoding/Decoding
Random Musings of Jeremy Jameson : Deleting Empty Folders
Timetonote - Free, Simple, Fast and Elegant CRM
UMPCPortal - Ultra Mobile Personal Computing
CAINE Live CD
StartSSL™ Certificates & Public Key Infrastructure -
UGENE - Integrated Bioinformatics Tools
BioRails.org
Bioclipse - Home
Free network tools for system administrators
Description of the Windows Management Framework on Windows XP, Windows Server 20...
Sortable Table JavaScript: Sort your tables easily!
msgoodies: DFS, IPv6 and – sort of – disabling it
Zip and UnZip Files Using the Windows Shell (XP, Vista, 2003 and 2...
"The compression cannot be performed because the size of the resulting Compressed (zipped) Folder is too large."
Droid Explorer
SmartTools for SharePoint
svchost viewer
Performance Analysis of Logs (PAL) Tool
Requires Log Parser http://www.microsoft.com/downloads/details.aspx?FamilyID=890cd06b-abf8-4c25-91b2-f8d975cf8c07&DisplayLang;=en
Business Information and News: Track, Connect and Share - Tracked.com
Keeping the Door | All you can eat sci-fi and fantasy books
GPSBabel: convert, upload, download data from GPS and Map programs
Powershell Get Inventory Script
Windows PowerShell Owner"s Manual
PowerShellPack - Release: PowerShellPack (Setup)
How to reserve a range of ephemeral ports on a computer that is running Windows ...
Daniel Schneller"s Blog: Windows: TCP Port conflicts above 1024
Chuck"s Blog: Ten Things I Wish We Did Better As An Industry
Dreaming in PowerShell - PowerShell.com
Windows PowerShell Blog : Quick, Dirty, Super-Useful Scripting
Free Online Computer Science and Programming Books, Textbooks, and Lecture Notes...
Ken Schaefer : Using PoolMon (Pool Monitor) to debug kernel memory leaks
Factory Reset Nortel IP Phone | Michael McNamara
Free Utilities! - Trigeminal Software, Inc. (English)
How to replace Microsoft software or hardware, order service packs and product u...
Progressive Development : Motley says: “To prepare for an interview, just make s...
Progressive Development : Motley says: "To prepare for an interview, just make s...
Slightly humorous when the microsoft factor is added in
Lifehacker"s Complete Guide to Windows 7 - Windows - Lifehacker
AnandTech: Windows 7 Performance Guide
Windows 7: The Complete Guide - Windows 7 guide - Gizmodo
Syslog Summary Script - Terry"s Blog
80/20® Inc. - The Industrial Erector Set®
Nightly Business Report . Your Mind and Your Money | PBS
Orchestra: Open Source BPEL / BPM Solution - Orchestra : The Open Source BPEL so...
Rule engine integration with Nagios using NodeBrain | An It-Slave in the digital...
Household Register 2010 - Conduct Home Inventory
Chirashi Security
Yahoo!翻訳 - テキスト翻訳
Masonry Magazine: Mortars & Mixtures
A new Adore root kit [LWN.net]
Time-of-check-to-time-of-use - Wikipedia, the free encyclopedia
My Tech notes: Linux SMB write performance With Simple Tips
How to Troubleshoot Black Hole Router Issues
UrlScan 3.1 : Wade Hilmo : The Official Microsoft IIS Site
Network Weathermap | See Everything - Current Release v0.96a
gnetworktester | Get gnetworktester at SourceForge.net
CAADR | freshmeat.net
John Kristoff - Software
Category:OWASP WebScarab Project - OWASP
Category:OWASP Project - OWASP
Monitoring Cisco IOS versions with Nagios through SNMP
Twitter: Best Practices and Tips [PDF Guide]
The Hacking Mood › Mirroring Project Gutenberg’s Etext
mySAP Knowledge Base: SAP on Windows
Cindy Gross - Troubleshooting, tips, and general advice about SQL Server : Check...
Cindy Gross - Troubleshooting, tips, and general advice about SQL Server : Consi...
DeveloperS : Sample tool for testing Secure FTP Server
Engineering Windows 7 : Engineering 7: A view from the bottom
Small Basic
darktable | about
Conflict History
Employee Benefit Research Institute | EBRI
Home | NewJerseyNewsroom.com -- Your State. Your News.
Onsite Technology Solutions - Windows Live
SharePoint Farm configuring and deployment. Part 1 Architectural and Logical Pl...
Ence Certification Program
DB Fletcher Design
Scott Hanselman"s Computer Zen - Scott Hanselman"s 2009 Ultimate Developer and P...
SharePoint Brew : SharePoint 2010 Granular Backup-Restore Part 1
ReturnProxy.com - The Practical Proxy PAC file guide
OpenPSA - MidgardWiki
pyOBD - Open-source OBD-II diagnostics
Description of Transport Neutral Encapsulation Format (TNEF) in Outlook 2000
Welcome to Fentun"s Home Page
tnefclean home page
Bet you havent seen this before osk? | Ask The Admin
Gefen Inc. - Specializing in HDTV, HDMI, DVI, USB, Cables, HD-SDI, VGA and KVM S...
The Blog of Ben Rockwood
Free Document Management Software DMS - OpenDocMan
sanbarrow.com
WSUS Offline Update - Update Microsoft Windows and Office without an Internet co...
WVE - Wireless Vulnerabilities and Exploits :: index
DiskLED – A Flexible Hard Disk and General System Activity Indicator System Tray...
Upgrade from SQL Express 2005 to 2008 - Windows Live
SQL Server Setup : Creating a merged (slipstreamed) drop containing SQL Server 2...
SourceForge.net: Locksmith - a password changing website - Project Web Hosting -...
The Newspaper Guild
Greenbone: Company Overview
National Novel Writing Month
Nick MacKechnie : Scareware and Malvertising
Terry Zink"s Anti-spam Blog : Best practices for sending outbound mail
PowerShellPack - Home
Stephen P. Tarzia"s webpage
OpenDisc
What TCP/UDP ports does Backup Exec for Windows Servers 11d and above (including...
Backup Exec FAQ
Backup Exec License Assessment Tool | Symantec Connect
SVNBackup – Incremental Backup and Restore Utilities for SVN » The Wacky World o...
CrypTool - Educational Tool for Cryptography and Cryptanalysis
Dock-a-Mac for the MacBook
Presonic & Co - Prescanic
Sysinfo.org
News — Asterisell
WWW Tech Support/WinBatch/System Info\Detect a Laptop.txt
DeveloperS : Kerberos SPN Viewer and Helper Tool Sample
Microsoft Project Team Blog : Dealing with organizational resistance
The SharePointer : SharePoint Alerts/Emails Don"t Work on some VMWare Systems
Time Tracker v1.0 - Open Source Efficiency Tracking Utility for the Lotus Notes ...
OpenInkpot
» DNS-Test :: Free dns checking tool script! » Corpocrat Blog
Get more battery life out of your laptop in Windows 7. | The Windows Club
powercfg -energy -output c:UsersACKDesktopPower_Report.html
Home | The Linux Foundation
Common Criteria - The Common Criteria Portal
Altiris Blog Site: Scheduled tasks Disabled: Danger of installing additional com...
delete all (NS) scheduled tasks except the NS.Weekly.GUID. Enable this task and run it. It will recreate all schedules.
good_cheap_fast.jpg (JPEG Image, 430x323 pixels)
Go track yourself | Linux Journal
Sauron - A Free DNS & DHCP Management System
Timo Kokkonen - Projects
VMware Knowledgebase Weekly Digest
The UK Higher Education Blog : What features are in which version of Windows 7?
Moon › Japan Today: Japan News and Discussion
CeeVee - quick & painless résumé management
Hacker
VMware Self-Service- Increasing the Write Timeout Value for Conversions to ESX D...
VMware Self-Service- Investigating network devices and device settings as a caus...
How to find and run the Inbox Repair tool in Outlook
Nagios & Ubuntu 9.04 – Part 2
Crazy Advanced Mod_Rewrite Tutorial
Cisco Port Security and Sticky MAC Addresses
Video screen capture (ScreenCast) AviScreen
Free Trademark Search Online | Protect Business Name | Interesting Name Ideas | ...
IBM Lotus Notes and Domino licensing
IBM Lotus Notes and Domino - Client packaging
Sonic Visualiser
sslsniff
sslstrip
The Daily Beast
The Tech - MIT"s Oldest and Largest Newspaper
Clare Bayley » Blog Archive » My very own MIT admissions essay
Base64 Decoder
organic fertilizer: list domain controllers with powershell
What’s the difference between free ESXi and licensed ESXi? | VM /ETC
Ten ancient Greek tips for coping with our high-tech world - Times Online
Project Management Redux « docNative Paradigm Blog
Nice Sharing - Combine Multiple URLs into single URL
Moomeo
OpenNTF.org - kNBackup
FAX Server, Document Process Automation, Procure-to-Pay & Order-to-Cash Solution...
Virtual Worlds Productions - Software Development Group
Groowiki web site
Right mouse click keyboard shortcut « the back room tech
Install and Configure Apache2 with PHP5 and SSL Support in Debian Etch -- Debian...
My SysAd Blog -- Unix
Hivelogic - The Anti-Spam Email Address Enkoder
A List Apart: Articles: Graceful E-Mail Obfuscation
Country codes & international area codes - HowtoCallAbroad.com
Ubuntu Tips - Boot Faster (Page 1 of 4) - LinuxLinks News
Best Practical: RT: Request Tracker
triage - Project Hosting on Google Code
Kamishibai
Storycard Theater / Home
Kamishibai for Kids: Homepage
OpenOffice templates, tutorials, tips and FAQ
namebench - Project Hosting on Google Code
Online Learning Basics
Presentation Zen
Lean Manufacturing Blog, Kaizen Articles and Advice | Gemba Panta Rei
Barrelfish
Eric Meyer: CSS
CN=Monitor LDAP Monitoring
ComputerEcology: Linux-Ecology-HOWTO
Clean CSS - A Resource for Web Designers - Optmize and Format your CSS
DeSmuME - Nintendo DS Emulator
Gist
BackupPC Information
SoftHSM – OpenDNSSEC
Dietary Guidelines for Americans
Mac Repair - Powerbook Parts, Powerbook Repair, iBook and Macbook Upgrades - Pow...
Using our spam blacklists (2005-07-11)
Subversion Cheat Sheet
Ask the Directory Services Team : Troubleshooting KCC Event Log Errors
Siptrack
wissel.net :: New Desk for my Study
One Art - Poets.org - Poetry, Poems, Bios & More
Baobab
Virus, Spyware & Malware Protection | Microsoft Security Essentials
Wallpaper Generator - Home
Charl van Niekerk » Blog: Setting up commit-email.pl
Visio Guy » Visio Network Server Shape Icon Customization Tool
Microsoft"s New Certifications: What They Are, Why They Matter
Terry Zink"s Anti-spam Blog : How to reclaim your sender reputation - Introducti...
Aaron Stebner"s WebLog : Mailbag: How to manage reboots when installing multiple...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
Bruno Terkaly - Microsoft Developer Evangelist - bterkaly@microsoft.com : The Ar...
SUA Community: Microsoft Windows Subsystem for Unix-based Applications, Interix ...
organic fertilizer: list active directory subnets with powershell
A Three Page Order Hitting De-Duplication & Litigation Holds « Bow Tie Law’s Blo...
CSS Compressor - Online code compressor for Cascading Style Sheets
Security Fix - Clampi Trojan: The Rise of Matryoshka Malware
Clampi/Ligats/Ilomo Trojan - Research - SecureWorks
Inside the Jaws of Trojan.Clampi | Symantec Connect
How to manually edit the Boot.ini file in a Windows Server 2003 environment
Stager – Trac
Samhain Labs | beltane
invalid boot.ini loading from c:\windows
Virtual Mac Tool « www.run-virtual.com
Overcoming Depth of Field Problems in Portraits
HowardForums: Your Mobile Phone Community & Resource - *The Definitive Shortcut ...
Humor... ???
find examples
ActiveSync Problem Solving
All about the various PC power supply cables and connectors
Newegg - Power Supply Calculator
Connecting 20-pin ATX PSU to 24-pin Motherboard
unpaper 0.3
Introduction to FTDI bitbang mode - Hack a Day
Essential Personal Finance E-Books * Get Rich Slowly
Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES)
Cool Windows Resource Kit Utility: cleanspl.exe
SILC Secure Internet Live Conferencing
SecPanel
EWG Home | Environmental Working Group
Project 10 to the 100
Software Protection. Update Remove Driver
Riverdrums Load Balancer | Get Riverdrums Load Balancer at SourceForge.net
The Geek Code
JD Supra | Legal Documents, Legal Forms, Court Filings, Articles & Research by t...
Webmaster Tools
wikicrowd - Project Hosting on Google Code
Synthesizing Voice From the Command Line | Linux Journal
AsterFax Home - Email to Fax Gateway for Asterisk
AppKonference | Get AppKonference at SourceForge.net
Copyscape - Search for Website Plagiarism and Duplicate Content Online
Creating a Dialplan in Asterisk 1.6: Part 1
Released Versions of Windows Installer (Windows)
Justkez » VBScript and Excel
Windows Essential Business Server 2008: Preparation and Planning Wizards
VMWare ESX: static MAC address « Networknet.nl Blog
YAPP - Yet another PDP-11 Page
IVR Hacks: Shortcuts for company IVR systems, IVR services and Call Centers
synergy-plus - Project Hosting on Google Code
BizTalk Musings : Creating Certificates
Microsoft SharePoint Team Blog : Patching a mirrored farm with minimal downtime
From The Northern Edge Of Microsoft : Announcing New Tools for IT Professionals ...
EricLaw"s IEInternals : Understanding Domain Names in Internet Explorer
Habib Heydarian"s Blog @ Microsoft : Coverage of the Visual Studio 2010 Historic...
SQL Server 2008 Spotlight on Cost | Microsoft
Baralga - your open source time tracking solution! | Baralga
webcast.berkeley | UC Berkeley Video and Podcasts for Courses & Events
TechChatter: Excel Scroll Problem - Scroll Lock
Michael McNamara
DHCP Options (VoIP) | Michael McNamara
DHCP Options (VoIP) Part 2 | Michael McNamara
Slaptijack | Networks – Systems – Coding
GeekoZoid...: How to duplicate / clone virtual machine on VirtualBox
Data Center Power Outage | Slaptijack
Slaptijack was offline for 2.5 hours today when the data center with our server in it experienced a power outage. Apparently, the roof started leaking during a heavy rain storm and water dropped directly on a panel controlling the UPS. This caused the UPS to shutdown, and it took 2.5 hours for the data center personnel to bypass the UPS and put all customers onto very interruptible city power. So far, there have been no more outages since power was restored, but there may be downtime when customers are moved off city power and back on to the UPS.
5 Ways To Rescue Your Rotten Résumé * Get Rich Slowly
agenda2pdf | freshmeat.net
Chuck"s Blog: Chargeback Vs. Pricing
A guide to the Grc.dat file in Symantec AntiVirus Corporate Edition 8.x and 9.x
Configed.exe
Server configuration management: track changes with subversion and be notified -...
On-Demand Spend Management Solutions | Spend Analytics, Strategic Sourcing, Cont...
start · NeDi
Main Page - OneCMDB
MonitoringForge: Network Management Software
SecurityTube - Watch, Learn and Contribute Computer Security Videos
Main Page - Diegostart
Main Page - Bran
Howto Crack Zip Files Password | Ubuntu Geek
How to enable SNMP on a VMWare ESX Server - Geek Speak Blog - thwack
OSF DataLossDB | Data Loss News, Statistics, and Research
SourceForge.net: IIS Emulator - Project Web Hosting - Open Source Software
Charges on your phone bill
iStand on Flickr - Photo Sharing!
hierarchy_distractions_960.gif (GIF Image, 960x1019 pixels) - Scaled (92%)
[ExportZone] Backup Internet Explorer Zonemap domains listing
Welcome to iPod Nano Linux !
Phrases.net
HealthGrades - Research Hospitals, Doctors and Nursing Homes
Microsoft: Windows 7 upgrade can take nearly a day (Updated) - Ars Technica
Returning Values from Bash Functions | Linux Journal
OpenShot Video Editor: Screenshots
MobileRead Forums
epubBooks: FREE eBooks in the EPUB format for your iPhone, Sony Reader, and many...
DailyTech - Pirates Foiled by Deliberate Glitch in Batman: Arkham Asylum
An Edios admin going by Keir responded to the thread before it was closed writing, "The problem you have encountered is a hook in the copy protection, to catch out people who try and download cracked versions of the game for free. It"s not a bug in the game"s code, it"s a bug in your moral code."
Kitco - Ship to Kitco
WinToFlash - Install Windows from usb - Home page
Fast and Reliable Backup and Restore of VLDBs in SQL Server 2008
Remote Desktop Services (Terminal Services) Team Blog : Multi Monitor support in...
Home Page – esySoft
Google Book Downloader - Home
inumbr:: Auto expiring. FREE anonymous phone numbers for online safety.
Thoughts about this DIY-Thumper and storage in general - c0t0d0s0.org
RBridges integrated to Opensolaris Build 124 - c0t0d0s0.org
Build Your Own PBX With Asterisk and Linux - www.enterprisenetworkingplanet.com
Legal Technology - Commentary: Linux at Law
UNIX network performance analysis
Camera Life - A PHP Powered Online Photo Gallery Manager
Cowtacular LLC - Home
Do It Yourself Digital Camera Repair
SMB Traffic Analyzer « hhetter"s blog
Understanding Windows 7 Themes, Inside Out
http://wa5znu.org/2009/05/marauders-map/
10 Levels of Intimacy in Communication
CK-12.org
Inside Office Online blog : Demystifying Visio
Karan"s WebLog : SQL Server Analysis Services Port (SQL 2005 / 2008)
Magician Marco Tempest - Technoillusionist
Security Alerts at UVa
VA SCAN :: Virginia Alliance for Secure Computing and Networking
Microsoft Baseline Security Analyzer 2.1 Frequently Asked Questions
DAD | Get DAD at SourceForge.net
Security Tools Detection Assessment Malware Protection Update Management
Erlandsen Data Consulting » Blog Archive » Find Lost Or Forgotten Passwords
Under The Stairs
BSonPoSH » Command line guide for Server Core
nbtscan - NETBIOS nameserver scanner
Melvin’s Citrix Blog
Security Technical Implementation Guides
ClayPit
F D C C
Federal Desktop Core Configuration
FFFF - Fast Floating Fractal Fun | Get FFFF - Fast Floating Fractal Fun at Sourc...
PHMSA - Risk Management Self-Evaluation Framework (RMSEF) - RMSEF Security Templ...
Router security template - CT3
askthemct.com » Groups, Groups and More Groups
Password Policy / Password Filter for stronger Windows Passwords
SpartX - Virtual Business Card - A networking tool for the 21st century.
Official Seal Maker
Custom Electronic Enclosures for Engineers and Designers
Songbird - Open Source Music Player
OpenNTF.org - Client Level Tracking
SIP: Session Initiation Protocol -- 911
Articles - Additional Bluetooth Drivers for Microsoft Bluetooth in Windows XP SP...
How to troubleshoot Bluetooth detection and connectivity problems in Windows XP ...
Wi-Foo - The Secrets of Wireless Hacking
Downloads
trifinite.org - the home of the trifinite.group
BlueZ
Aruba Labs
Bluescanner
Bluesniff - Proof of Concept Bluetooth Wardriver
SecuriTeam - RedFang, Bluetooth Discovery Tool
ZigBee Alliance
Adrian Dimcev"s Blog |
KolibriOS - News
Polarhome - gateway to freedom
50 Fantastic Bing Tricks for Students & Librarians | Online Colleges
The Organization of Legal Professionals - Home
Home - iss.thalesgroup.com
The Deathrow OpenVMS Cluster
SDF Public Access UNIX System - Free Shell Account and Shell Access
The Timeline Project
IT Career Crisis Management: Five Lucrative Areas — Datamation.com
Green Data Center Blog
Free Management Library
phrasen|drescher - Portcullis Labs
OVAL - Open Vulnerability and Assessment Language
Green Dam Youth Escort - Wikipedia, the free encyclopedia
Hack Canada - It don"t mean jack if it ain"t got that hack.
Hping - Active Network Security Tool
.:[ packet storm ]:. - Legion by Rhino9
Circos - visualize genomes and genomic data
Honeybrid
Ether: Malware Analysis via Hardware Virtualization Extensions
HoneyBOT
Argos - An emulator for capturing zero-day attacks
Developments of the Honeyd Virtual Honeypot
Tool Release - Minionz - "VirtualBox Sandbox automation" | Australian Honeynet P...
Honeynet Project Blog | The Honeynet Project
Picviz - Trac
REBOL Technologies
The Ethical Hacker Network - Metasploit™ Tutorial - A New Day for System Exploit...
Viruslist.com - Information About Viruses, Hackers and Spam
rootkit.com
NEOHAPSIS - Peace of Mind Through Integrity and Insight
The Kevin Mitnick/Tsutomu Shimomura affair
Words and pictures from Silicon Valley by Chris Gulker — www.gulker.com www.gulk...
SystemTools.com - Windows NT/2000/XP/2003 System Management Software
WebScarab - a web application review tool
Flash Cookies explained
WebReaper - Introduction
Ghostery
Information Commissioner"s Office - ICO
How to Keep a Digital Chain of Custody - CSO Online - Security and Risk
IT Security Office | Docs
Rancid - The Easy Tutorial - Tutorial
:: Virus.gr :: | Antivirus programs and protection guide, virus info, antivirus ...
Computer Crime
Windows (In)Security
Custom Manufacturing, Hardware, Rubber and Plastics guides on ThomasNet
Bilboblog, a free micro-blogging php application - Tux-planet
barry | Net Direct Inc.
Job Vacancies in United Nations and International Organizations
State Farm leases 12,000 sf at Teleport II on Staten Island. (State Farm Mutual ...
Staten Island University Hospital to utilize Teleport Communications Group for i...
Sad situation" at struggling Teleport - SILive.com
Borough President Molinaro proposes redevelopment of Staten Island"s Teleport - ...
Commercial Property: The Teleport; Moving Ahead Off the Beaten Path in Staten Is...
Teleport Communications Group Alumni
iLocus: Market Research in Emerging Telecommunications
Google Flu Trends
Yugma, Free Web Conferencing, Online Meetings, Web Collaboration Service, Free D...
LicenseCrawler
Windows Backup With Rsync and FreeNAS
Technology FLOSS: dhcp-lb: Load balance with DHCP links
How to Set Up a "Site Down for Maintenance" Notice with Apache
Make: Online : The making of a flash drive
microISV: a community for independent software developers
MalwareURL.com
IBM - Mail database failover conditions in a Lotus Domino clustered server envir...
Wireless Security 802.11 Security Wirelessdefence.org Index
Differences Between Several Universal Printer Solutions
Canon U.S.A., Inc. Drivers & Downloads imageRUNNER
SAP®:SAP Device Types for Canon Devices
gogglesmm - Project Hosting on Google Code
Organizing feature
gracedm - Project Hosting on Google Code
SVNManager - PHP Subversion Repository Administration - Introduction
Duffbert"s Random Musings :: Guest Post: Worrying is Not a Business Plan by Albe...
Usability Views - 11,002 articles about usability, accessibility, IA, HCI and we...
Simply Google
Beloit College Mindset List
An Abbreviated History of ACP, One of the Oldest Open Source Applications
ICMPTX (IP-over-ICMP) HOWTO
SQL Server Version - SQLTeam.com
NagiosGrapher - Doc - Open Source Data Center Solutions
Jose Barreto"s Blog : Microsoft File Server Migration Toolkit 1.2 available as a...
Jose Barreto"s Blog : Experimenting with PowerShell v2
Ask the Directory Services Team : Which KB articles resolve the most Directory S...
Windows Virtualization Team Blog : Windows Server 2008 R2 Core: Introducing SCON...
» Citrix XenApp ICA Client Installation, Tuning and Troubleshooting Guide - JimM...
Roaming user profiles and FSRM File Screening
AdminSDHolder, Protected Groups and SDPROP
Jose Barreto"s Blog : File Server Capacity Tool (FSCT) Release Candidate availab...
FSCT
Technology Explained: How Does A Hard Drive Work?
Quick and Dirty MySQL Performance Troubleshooting | Linux Magazine
Live Ships Map - AIS - Vessel Traffic and Positions
Bust-A-Drive
HAR2009
SharePoint Business Intelligence : SharePoint in plain English
The Best Way To Effectively Clean LCD Laptop & Monitor Screens
Flexr 1.0.11
SOFA Statistics Open For All - Home Page
FLURB, a Webzine of Astonishing Tales.
How To Download Games Onto Your PSP For Free
Cooking For Engineers - Step by Step Recipes and Food for the Analytically Minde...
Microsoft SMB Community Blog : Windows 7 and Windows Server 2008 R2 Volume Activ...
Tips, Tricks, and Advice from the SQL Server Query Processing Team : Understandi...
Computer Science Teacher - Thoughts and Information from Alfred Thompson : 15 Fr...
Nicholas Allen"s Indigo Blog : Using TCP Analyzer to Debug TCP Performance
Stuart Leeks : PowerShell script to clean and zip a directory
SQL Server Setup : Microsoft Update Guidance for SQL Server
Cesar de la Torre - BLOG : How To Install Windows 7 From a bootable USB Drive
NIL - Data Center Interconnect
uTodo - FREE, simple and fast to-do list and GTD software
Track Tropical Depression Claudette, Track Tropical Storm Ana, Track Tropical St...
Electronics Engineering Video Blog Podcast
Integrating Asterisk with Wireless Technologies: Part 1
Podcasts for Cyber Security Professionals
Tera-bug « Oracle Scratchpad
The Day Before Zero
Chicago Tech News » Blog Archive » Accounting For Twitter and Web 2.0 From a Leg...
Technical Bedtime Stories
Recession-Proof Graduate
mySAP Knowledge Base: Checking on installed Oracle patch collection
Home
Wepawet » Home
Forensically interesting spots in the Windows 7, Vista and XP file system and re...
Tweet Sentiments - Know Who"s Tweeting About What When Where & How
Klout - Twitter Analytics - Measuring Influence Across The Social Web
Homepage of Daniel Roggen - SynScope - Signal Visualization and Alignment Tool
Law Practice Technology Information Sources and Tools | LLRX.com
Tatjana van Vark ~ Main page ~ Welcome
TCP Performance and the Mathis Equation - Terry"s Blog
Academic software for research papers | Mendeley
FTC - SPAM - Home Page
Free owners manuals, user guides & how-to instructions | ManualsOnline
The Holding Pattern: Lessons Learned on Litigation Holds « Bow Tie Law’s Blog
Cheat Sheets - PacketLife.net
Product Configurator - Xorcom
Download details: Remote Server Administration Tools for Windows 7
Five favorite PowerPoint tips | Business Center | Working Mac | Macworld
Tools to Monitor DNS -- Microsoft Certified Professional Magazine Online
Circuit Symbols of Electronic Components
Ten Tips for Domino Administrators - O"Reilly Media
Oleksandr Tymoshenko’s blog » AudioBookBinder
PacNOG: The Pacific Network Operators Group
Hack to Remove/Uninstall Symantec Norton Antivirus (SAV) Client without Password...
GIG Gruber Ingenieurgesellschaft mbH (Hauptseite IT-Bereich)
The Big Picture
Lessons Learned : PowerShell for N00bs 1: Hello, World
Lessons Learned in 10 Years of Supporting Exchange : Understanding and Recoverin...
Lessons Learned in 10 Years of Supporting Exchange : Troubleshooting 101- Defini...
Microsoft Dynamics CRM Team Blog : Configuring Service Principal Names
Nicholas Allen"s Indigo Blog : Windows 7 (and Orcas SP1) SDK Released
SQL Server Setup : SQL Server 2008: “Could not fix registry key” Issue and how t...
FundAdvice.com - The Ultimate Buy-and-Hold Strategy - 2009 Update
List of error codes and error messages for Windows Installer processes
Whitetrash: Dynamic Web Whitelisting for Squid
the back room tech
Keyboard shortcuts for Windows
Installing "Sugar on a stick" (Strawberry Release) On A USB Stick | HowtoForge -...
Writing Flow | Men With Pens
GoldenPod
Piggydb - A knowledge creation system
SQL Benchmark Test Suite in Launchpad
Online Certificate Programs -- O"Reilly School of Technology
There’s No “I” in a Great System Administration Team | Linux Magazine
adx - addressbook.xml
5 Excellent Downloadable eBooks To Teach Yourself Linux
Sweet Home 3D
Mobile Device Management and WLAN Management Software - AirWatch
Nabble - WPKG - Users - More ways of defining hosts in hosts.xml - startup, logo...
Visio Guy » Automatic Chevron Process Shape
IBM - Domino server console command abbreviations
Lotus Sandbox - Lotus Notes Diagnostic Tool
Google Map Buddy
Switch hardening on your network
Celtx - Integrated Media Pre-Production
GanttPV - Open Source Software for Project Management
osTicket:: Open Source Support Ticket System
Large Text Compression Benchmark
Ask the Directory Services Team : Machine Account Password Process
VMware Self-Service- Virtualizing existing domain controllers
Baseline Registry Settings for new Domain Controllers : Brian Desmond"s Blog
Information about TrendMicro | ITStuff is all about Win, VMware, Hyper-V, Server...
Install Windows Components from Command Line - Network Administration & Consulti...
1wire attic cooling at Raging Computer
Dover Projects: How to Insulate Basement Rim Joists
Robert McMurray"s Blog [MSFT] : Automating IIS 7 Backups
"Tuner Blog
Lotus Notes and Domino wiki
Informatik IV: Containing Conficker
The H Security Conficker information site - The H Security: News and features
Emmanuel Bergerat"s blog on SharePoint : The checkbox that saves you hours
Remote Desktop Services (Terminal Services) Team Blog : RD Gateway deployment in...
9 Useful Strategies to Dealing with Difficult People at Work - Dumb Little Man
organic fertilizer: “mid” like functionality in batch script
Wolf Software
SAM - Overview - Redmine
Nozbe - getting things done gtd software task manager and to-do list for project...
Toodledo :: A to-do list to organize your tasks
Download Hulu clips, episodes and videos ( hulu.com ) to your PC, Ipod, Zune, PS...
CoovaAP | coova.org
OpenDNSSEC
Get back the ctrl-alt-backspace behavior in Ubuntu
Beyond the hype: Where open source actually saves you money | The Open Road - CN...
Recovering Catalyst Fixed Configuration Switches from a Corrupted or Missing Ima...
A California city rebuilds network using all open source software - Network Worl...
H.323, Firewalls, NAT, and the Meaning of Life
Firewall ports to open for video conferencing
H.323 Firewall Riddle
H.323 Videoconferencing and Firewalls | Video | Technical Support | MOREnet
Video Conferencing Interoperability Problems
Introduction to H.323 Packet Activity & Troubleshooting
Firewall IP Ports and Protocols used by H.323 video conferencing systems
Asterisk :: The Open Source PBX & Telephony Platform |
Centritech Communications Systems -- Asterisk-Based VoIP PBX Phone Systems
Jared Smith - Asterisk Consultant
Trader"s Little Helper
Make the most of large drives with GPT and Linux
Altiris Blog Site: NS6.0 Common problems for very large environments
Homepage, PDF Tools from Dirk Paehl
Phone Number Comments
How to Convert a VMware Pre-allocated Virtual Disk to a Growable Virtual Disk - ...
Ketarin - keep your setup packages up to date
Audio File Formats Explained in Simple Terms
Documentary Heaven :: Food For Your Brain
msgoodies: A useful Test-Host Function
Steal This Book
Writer"s Café fiction writing software - novels - screenwriting - short stories ...
MirrorBrain | Welcome!
MySQL Sandbox: Treat MySQL Instances like Virtual Machines | Linux Magazine
NetApp Technology Network: vmdkdtool - A tool to create or repair virtual disk h...
VMware Self-Service- VMDK Recovery Tool (ESX 3.5 Update 3)
collectd - The system statistics collection daemon
DNSDusty
khtml2png - Make screenshots from webpages
Fundamentals of Ad Networks: Part 4 of 4 | AdNetworkX
Fundamentals of Ad Networks: Part 3 of 4 | AdNetworkX
Fundamentals of Ad Networks: Part 2 of 4 | AdNetworkX
FUNDAMENTALS OF AD NETWORKS: PART 1 of 4 | AdNetworkX
Top 20 OpenSSH Server Best Security Practices
DNSCAP - DNS traffic capture utility | DNS-OARC
Computer hardware poster 1.7 by *Sonic840 on deviantART
body.tex - Less known Solaris Features - wikis.sun.com
Microsoft SMB Community Blog : Microsoft Word 2007 Training Roadmap
egosoft.com :: View topic - [SCR/MOD] Complex Cleaner v3.20 / Modular Complexes
egosoft.com :: View topic - [Script] A.R.E.S. Station Building Service [ V 0.33 ...
egosoft.com :: View topic - DodaFu"s Universal Complex Tool [V 3.42 Beta][4/1/20...
60+ Absolutely Stunning Space and Planets Wallpapers | Wallpapers
The Simple Dollar
Storynory: Free Audio Stories for Kids
Musopen - Free Public Domain Classical Music
Two ways to upgrade the agents in Migrating to NS7 | Symantec Connect
AT&T Reuse & Recycle | Wireless from AT&T, formerly Cingular
BleachBit: Free much more disk space than localepurge
Open source data quality, data profiling and master data management | DataCleane...
Web-Absence
NASA Ames Open Source Software | Home
Peabody Institute - Ensembles: PCO Concert Recordings
Minnesota Public Radio
WebHome < PERTKB < TWiki
Monitoring
Taskwarrior - Overview - Taskwarrior
Home - www.trust-factory.com
Windows Server
Jim Boyce - Tips and Tricks for Windows, Office, Outlook, software, and hardware
Z-Push - open source push technology
IEEE Spectrum Online: Technology, Engineering, and Science News
Anagran: Total Bandwidth Management | www.anagran.com
Cold cloning without the Enterprise VMware Converter Boot ISO | Ardamis
PlanetVM
sanbarrow.com
Jase’s Place
10 things you should cover in your social networking policy | 10 Things | TechRe...
Bkis Blog » Korea and US DDoS attacks: The attacking source located in United Ki...
Memory Behavior when VM Limits are Set
Daily Hypervisor - Your Daily Dose of Virtualization
Essential Etiquette Advice and Information for Worldwide Travel at Travel Etique...
Workflow SWAT Site - Home
TidBITS Safe Computing: iPhone 3GS Offers Enterprise-Class Security for Everyone
KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-)
PEPPM Multi-State Bid
gnomeDIAicons - Beauty icons on your diagrams
New network icons schema to Gnome Dia « thiagoribeiro
Electricity Around the World
JStock - Free Stock Market Software. Fun. Easy. Simple.
Build a Wi-Fi radio relay using household materials - The H: Security news and O...
Shinobu: Index
Tokyo Made Simple | TokyoTopia | Your Insider Travel Guide
TidBITS Tech News: Double Plus Ungoods: Amazon Unpublishes Orwell
Carpe Datum : SQL Server Licensing De-Mystified (Sort Of)
SharePoint Development Tools - SharePoint Development Wiki - SharePoint Dev Wiki
SciScope
Microsoft Windows SDK Blog : New Win32 Samples in Windows SDK for Windows 7: Win...
ProcDump
PM Skills for Life - Sources of Insight
Nav developer"s blog : Index Usage Information Tool
Canadian Developer Connection : DimeCast.Net’s SOLID Screencasts
Nick MacKechnie : Infrastructure Planning and Design Guides for Windows Server 2...
SQL Server Premier Field Engineer Blog : SQL High CPU scenario troubleshooting u...
Master-PowerShell | With Dr. Tobias Weltner - PowerShell.com
Seth"s Blog: How to make graphs that work
inSSIDer | MetaGeek
Vistumbler.net - Home
NetStumbler.com
TheUserManualSite.com - We found it so you don"t have to!
TSP Solver for Google Maps
EasyGPS - FREE GPS Software for your Garmin, Magellan, or Lowrance GPS
GPS Visualizer
Mike"s Online Ahriman"s Prophecy Strategy Guide
Ride with GPS
Multiplottr.com -- Plot, save and share multiple locations on your own customize...
idealroute.com
International Free and Open Source Software Law Review
VMware vLaunchPad
DIVFIX.MAXELINE.COM - Offical DivFix homepage - divx, avi, video, movie repair, ...
Welcome to vSphere-land!
Adobe PDF Tips Tricks
WikiCrawler - Discover Unmanaged Information Silos
Connecting Geometrica: ISO 9001 Certification With a Wiki
Using a Wiki to Implement a QMS
Stop Spam
Visual Economics - Financial Infographics & More
Home
Windows Update Codes
wsuswiki [WSUSWiki]
Some file types are blocked - Gmail Help
As a security measure to prevent potential viruses, Gmail doesn"t allow you to send or receive executable files (such as files ending in .exe) that could contain damaging executable code.
WiredSafety: the world"s largest Internet safety, help and education resource.
Twitpic - Share photos on Twitter
100 Essential Skills for Geeks | GeekDad | Wired.com
More Nagios, More DAOS - By Ulrich Krause - eknori.de
Nagios, Centreon and DAOS - By Ulrich Krause - eknori.de
Local Harvest / Farmers Markets / Family Farms / CSA / Organic Food
Microsoft Dynamics CRM Team Blog : Rolling with the System Administrator Role
Microsoft Office Project 2007 : Back to Basics: Let"s talk about the critical pa...
Parag"s Weblog : Troubleshooting Web Application Performance
Four Fixes to Common Problems Running iTunes for Windows XP
EricLaw"s IEInternals : Notes on Proxy AutoConfiguration Scripts
7 Excellent Open Courseware Collections for Digital Photographers
U3 Incident Response Switchblade - Hak5
Deleted Domain Names
Fanurio - Time tracking software for freelancers
Summary Of Usenet Links
Cost of living: Compare prices in two cities - CNNMoney.com
Ajaxonomy del.icio.us Spy
Paresh Gandhi"s Blog : Useful links for Microsoft WSS 2.0, 3.0, Search Server 20...
Toolshed | Shows | Channel 9
Computing Education Blog
Rakki Muthukumar : IIS7 – Improving ASP.NET performance (concurrent requests) wh...
Ron Grzywacz"s Blog : PAL Thresholds for MOSS Crawling Performance
CSS SQL Server Engineers : Attach of the Clone (… Databases)
SOPERA - Open Source SOA 
xTuple | Open Source ERP for Mac, Linux and Windows
wissel.net :: Minimizing your server downtime when upgrading
Success & Motivation – If(Cash In < Cash Out)= You are a Consultant « blog maver...
haraldscan - Google Code
PNP4Nagios
SchoolTool: free gradebook, attendance, calendars and more. — The SchoolTool Pro...
Unknown Horizons - Welcome to Unknown Horizons
Join The Revolution! » Sign your Code
KNOVA Software - Knowledge Management for the contact center, web self-service, ...
iorg.com - business aligned web sites - practical workshops and audits
calibre
Thrive For Developers
Cindy Gross - Troubleshooting, tips, and general advice about SQL Server : x64 W...
DNS-BH - Malware Domain Blocklist
BigAdmin Submitted Tech Tip: Setting Up and Debugging SSH Authorized Keys
Basic Parsing (mar 95)
who | perl -ne "@F = split; print "$F[0]\n";"
nexsm
http://www.oneunified.net/files/Defaults.cisco.oneunified
Maxime Bombardier - SharePoint Architecture & Development : Experiences on using...
Performous
Microsoft Hohm
Microsoft UK Schools News Blog : Microsoft licensing for schools – a new option ...
Download details: File Server Migration Toolkit
Bright Side of Government
Asterisk Flash Operator Panel 2
http://www.diyonline.com/servlet/GIB_Base/bobvilabegin?projectName=2714900&first...
Talking to a Wiimote in Ubuntu 8.10
Use a Wii Balance Board with Linux
How To Write A Resume: 12 Steps To Your Next Job | Wise Bread
Nutrition Toolbox | Principal Health News
Thinking problem management!: ATM overview
kotekzot - X-resource
Jackbeat – Trac
OSOR.eu - Open Source Observatory and Repository — Open Source Observatory
IDABC.OSOR.casestudy.LiMux.pdf (application/pdf Object)
Ksplice: Rebootless software updates
Miro HD Video Player | Free internet tv and video podcast player.
Real-Time SQL Monitoring in SQL Developer - Doug"s Oracle Blog
the ultimate team organization software
clearBudget - online personal budget management
Emsco 40 Gal. Waterstone Rain Barrel with Gutter Diverter Rain Water Collection ...
Nagios: Notifications to both impress and convey the message to the recipient « ...
Knight-time Ramblings: How to Demote a Long-Disconnected Domain Controller
How to remove data in Active Directory after an unsuccessful domain controller d...
Domain controllers do not demote gracefully when you use the Active Directory In...
Warning! Volume Shadow Copy Service Sometimes Eats Excess Disk Space
ThreatExpert - Automated Threat Analysis
Collaboration and CRM over Email. Simple and Secure: tgethr
Business Collaboration Software| Small business real time collaboration software...
Configure Bacula for Open Source Backups
Gen-X childhood icons go boom, take the Internet with them | Web Apps News - Bet...
Dropbox - Home - Secure backup, sync and sharing made easy.
Running SAP Applications on SQL Server : New SAP on SQL Server 2008 Whitepaper r...
Clustering and High Availability : PowerShell Remoting and the “Double-Hop” Prob...
Carpe Datum : Use PowerShell to Backup All User Databases
Everything Office - Brent Whichel
Master List of Windows 7 Keyboard Shortcut | Windows 7 News
Tech Tip: Determining What"s Been Changed on RPM Based Systems | Linux Journal
David Wang : HOWTO: Diagnose 401.x HTTP errors on IIS
Welcome to Automotive Vehicle Information Number Check. VIN Validator
Teen Growth, the teen resource for advice, health information, social interactio...
How to lose your data | Ask The Admin
WebCite
Cisco IOS hints and tricks: ADSL reference diagram
Cisco IOS hints and tricks: ATM is like a duck
Unusual Hotels of the World : Online Guide of the World"s most Unusual & Unique ...
Airport Parking Discounts - Cheap Airport Parking at About Airport Parking.com
DNS Bajaj - v0.9.6
How Forcing Password Changes Actually Weakens Security at Helge Klein
Copy & Paste Excel to Wiki Converter
bash String Manipulations Issue 18
Available command-line options for Intelligent Updater versions 4 and 5
http://www.geocities.com/SiliconValley/Garage/5238/Download.html
How to automatically create a backup copy of your Domino Directory
GanttProject Home
Tibor Karaszi"s SQL Server pages
Nick MacKechnie : SQL Server 2008
Game Theory : Intro to Audio Programming, Part 1: How Audio Data is Represented
KontrolPack - Control Your Network
Explaining Defense in Depth
Genetic Testing for Health, Disease & Ancestry; DNA test - 23andMe
Ekahau HeatMapper - The Free Wi-Fi Coverage Mapping Site Survey Tool
Headlamp05to08.pdf (application/pdf Object)
...
NEW: Solaris 10 Security Deep Dive Presentation : Glenn Brunette"s Security Webl...
Remote-Exploit.org - Supplying offensive security products to the world
Bad Peggy
Shorpy Photo Archive | History in HD
Data.gov
How To Deal with Spam and Report Email Scams in The U.S.
Network Backup Software | Enterprise Backup Solutions | Arkeia
DIYbio
wissel.net :: Picking your routing and replication architecture
organic fertilizer: retrieving dell warranty data via powershell
Tim Anderson’s ITWriting - Tech writing blog » Fixing a VirtualBox Windows XP bl...
Repair Tool of the Week: Antivirus Removal Tools | Technibble
How to buy data deduplication :: SearchStorage.com.au
WDVL: Python: Breaking Down a Simple Python App
SSH Is Sexy And Fast Pt2 ~ Linux Fanatics
Perl Tidbits: Annoyances and Surprises « UNIX Administratosphere
Facebook Purity - Removes annoying quiz and application messages from your faceb...
TinyURL Decoder for Greasemonkey
Server Fault
nextstop: Discover Things to Do, Local & Travel Guides, Recommendations and Maps...
AlmostMeet - Online meetings for group collaboration - Web Conferencing
Ninja - A Nagios GUI Project
Everyday Systems: Systematic Moderation for sustainable good habits
Top 10 Most Effective Job Search Websites
PITA
Top 10 Free Genealogy Websites to Find Ancestors
JustTechJobs.com - Search for IT, Tech Jobs - IT Careers for Technology Professi...
Configure Cisco Switches for Easy Server Deployments
Lotus Guru :: Career Advice For the Laid-Off Notes Professional
pmooney.net :: Understanding Engineers
wissel.net :: How does the ideal Notes/Domino 8.5 upgrade looks like
iPhone Configuration Utility 2.0 for Mac OS X
vSphere SDK for Perl
Monitoring VMware ESX 3.x and VMware ESXi
Free Portland WiFi - Free wireless internet in Portland on WifiPDX
How to Use Geolocation in Mobile Safari - Map Scripting
CCJobNet.com
Jobs & Employment | Full & Part Time Job Search | SnagAJob.com
ricklibrarian
NextWorth: Home
ipMonitor :: NOTES-MIB: IBM Domino MIB Specification
Fine Points of Configuring a Cluster
Optimizing server performance: Domino clusters (Part 2)
Optimizing server performance: Domino clusters (Part 1)
IBM - Domino Router notes.ini debug parameters for SMTP
Blackberry Key Tips | Domino @ Symetrik Design
Domino @ Symetrik Design
LZ1 compression on 6.5.6 - Does it replicate? | Domino @ Symetrik Design
IBM - Switches to use with the Compact server task
LNToolBox
IBM Lotus Notes
Lotus Domino Administrator 6.5 Help - Completing the Configuration of the Domino...
Lotus Domino Administrator 6.5 Help - Configuring the Domino SNMP Agent for Wind...
Stephen S. Constantine: Lotus Notes / Domino Administrator - Updated Resume
How Do I Download Songs onto iTunes - A Tutorial
 Amazon Kindle Wireless Reading Device...
Office Furniture with A Higher Form of Function :: Bretford
IBM Lotus Domino and Notes Information Center
Starting the Domino server add-in tasks
Fun writing a maintenance script domino ldd lotus notes nsd application openntf ...
Five Things I Do With Every Ubuntu Installation ~ Linux Fanatics
Piwik - Web analytics - Open source
Piwik › Web Analytics Reports
FREE ESXi Monitor download – VMware vSphere monitoring with Veeam Monitor
Virtual Lifestyle
Sonar
Focused crawler - Combine System Homepage
Wolfram
Tiki Wiki+CMS+Groupware Project - Documentation Wiki : Install on Debian
Clinical Data Interchange Standards Consortium (CDISC)
Support policy for Microsoft SQL Server products that are running in a hardware ...
How to obtain the installation source download and license keys for Backup Exec ...
TED: Ideas worth spreading
The Architecture Issue - Data Center Overload - NYTimes.com
Slide 1 of 10
Institute of Physics - Home of the Institute of Physics
Backing up your BES | ukstokes.com
View Document
Leadership By Numbers :: Quick How-To Test Your Backup Blackberry Enterprise Ser...
VM-sickbay
sanbarrow.com
UltraDefrag - An Open Source Defragmenter
A free CD/DVD emulator for Win32 and Win64
Starting & stopping Domino with a batch - Review
Security Policies
Legal Technology - Get Your Free Case Law on the Web
SQL Server Script to Display Job History
How to Roll Clothes - wikiHow
X3 Reunion Active Map
T2P: Truth to Power Association - Information Governance Research Community
Ease The Pain Of eDiscovery - Electronic Discovery - E-Discovery Forum
"If you give an IT person a horrible task to do one time, he"ll complain," D"Agostino says. "Give it to him 10 times, and he"ll find a way to automate it." E-discovery needs can"t be attacked with "manual, fly-by-the-seat-of-your-pants processes," he says.
T2P: Truth to Power Control & Risk Calculator
Download details: Microsoft Product Support Reports
Antimail : Attack of the clones: how to assign a drive letter or directory to a ...
Antimail : A bit of black magic: How to assign drive letters to VSS shadow copie...
rdiff-backup: Main
openmeetings - Google Code
Aluminium - Home
GeekyBoy.com | IT knowledge base of anything Adam Culp thinks he may want to rem...
Backups using rsync
Jitterbit | freshmeat.net
FreeBASIC compiler (a free BASIC compiler) - official page - News [en]
The Insider"s Guide to Domain Transfers
GeekyBoy.com » Blog Archive » Backup Windows Domain Controller using NTBACKUP vi...
Networking: Protecting your network against rogue DHCP servers
Charles Web Debugging Proxy • HTTP Monitor / HTTP Proxy / HTTPS & SSL Proxy / Re...
Switching Local Toll and Long Distance Carriers | UCAN
By dialing 700-555-4141 from a telephone, a recording of the name of the company who is providing long distance service will be played.
Virtualised Reality
unique
PointSMS.org || the easy way...
SSH for BlackBerry
Resetting AirPort Express
ESXi (ESX 3i) Enable SSH
VMware Communities: ghettoVCB.sh - Free alternative for backing up VM"s for ESX(...
VMware ESX and ESXi Scripts & Resources
Google Desktop Enterprise Edition - Admin Guide
Silent Uninstall Cisco VPN by Installshield
Nettica.com | Articles - Setting up Reverse DNS
Script Repository: DNS Server
grocery list or shopping list - Make a printable grocery list and take your shop...
Realeyes Technology: Good Passwords
How to build a highly available file server using OpenSolaris, iSCSI, ZFS and St...
Download details: SyncToy v2.0
The Many Faces of Mike McBride
nxt-web - Google Code
GlusterFS - GlusterDocumentation
QuickrTemplates: Welcome!
LinuxHardware.org - HOW-TO: Configuring Your Mouse To Work With All 5 Buttons
Lojban : Lojban
Robin Powell"s Home Page
FAI - Fully Automatic Installation - Home Page
Robin"s List Of Good Techno
Free State Project Home [ Free State Project - Liberty in Our Lifetime ]
info.tw.o - Welcome to TikiWiki CMS/Groupware : HomePage
Gaming@TeddyBorg : X3: Reunion
Plantronics Voyager PRO Bluetooth Headset Sounds Like a Winner
Product Review: Verizon"s MiFi™2200 Intelligent Mobile Hotspot (Andrew"s Blog 06...
The Cluetrain Manifesto — Entire Text Index Page
Strange Maps
Cisco DHCP Snooping with ISC DHCPd - TreehouseTechnologies
Catalyst 6500 Release 12.2SXF and Rebuilds Software Configuration Guide - Config...
CCNA Security CCNP BCMSN Exam Tutorial DHCP Snooping
Free things to do in New York City- Time Out New York
SourceForge.net: logdigest
Linux Performance Administration by Mark Rais - reallylinux.com      
Irish and Celtic Music Podcast
How to back up and then restore printers when you upgrade from Windows Server 20...
Microsoft, Intel goof up Windows 7"s "XP Mode" - Ars Technica
Information Technology Writer
Free Online Barcode Generator
The Ultimate ‘Upgrade To Windows 7′ Guide
Bing: The Next Big Thing From Microsoft
4DIAC: About
Computer History Museum | Early Apple Business Documents
Home - Mulesource Community - mulesource.org
Leading Geeks: On the Meaning of Leadership
Bing
Legal Technology - A Modest Solution to E-Discovery Problems
Business Software Alliance - All Tools
JTAGTest: Affordable JTAG testing and development solution
Online Backup from Backblaze
FTA Home Page
2009 Callan Periodic Table of Investment Returns » My Money Blog
NOAH - index
Home: ENERGYguide.com - Lower Your Energy Bills
J.D. Meier"s Blog : Lessons Learned in patterns and practices
osCommerce, Open Source Online Shop E-Commerce Solutions
vbAccelerator - Index of Code
Andrea VB Programming - Visual Basic and VB.NET source code site
Visual Basic Code , VB Code , VB.NET Code
Visual Basic Code at vbcode.com
Master Mitch - whatsnewfm
John W Powell : RV-AIR: A Five-Step Process to Troubleshoot and Fix Just About A...
THE FREEDOM NETWORK AUDIO PORTAL - Free & Easy Access to worldwide Broadcasts on...
Chess Rating Calculator - Home
digitalresearchtools / FrontPage
FilesOverMiles: Easily send large files directly between computers for free
[ file ai ] - Securely Share Files Too Big To E-mail For Free
Recap: Creating Your Own Discovery Team : Lawdable
SQL Server Setup : Creating a SQL Server 2008 Management Studio Express Slipstre...
Nivot Ink - PowerShell v2.0 – Differences Between CTP3/Win7Beta and Win7RC
Random Musings of Jeremy Jameson : Add sysadmin in SQL Server 2008 Using Local A...
Amit"s blog : SQL Server and SAP !!!
Christophe Fiessinger"s Blog : Windows 2008 Server Replication and SharePoint Se...
vii"s teepeedee2 at master - GitHub
Realeyes
So really..if all of this is "secret sauce" how come it"s so googlable? - THE OF...
TheVESI.org – Free Software and Virtualization Community
Carpe Datum : The Role of the DBA in the "Cloud"
You need to be seen more as a business data champion than a bits and bytes kind of person.
http://www.mvps.org/winhelp2002/hosts.txt
Hey, Scripting Guy! How Does Windows PowerShell Make It Easier to Work with SQL ...
UCompareHealthCare - Find Information on Doctors, Hospitals and Nursing Homes
Free PowerPoint Templates and Backgrounds
Sourav Dutta"s SharePoint - All Rounder : Updates Resource Center for SharePoint...
Pointy Haired Dilbert: Charting & Excel Tips - Chandoo.org
Carpe Datum : SQL Server Best Practices: Create a Recovery Plan
Download details: Microsoft SharePoint Administration Toolkit v3.0 x86
mszCool"s thoughts and cents revealed : The .NET Client Profile and a List of In...
NASA Spinoff homepage
Index of /dir2cast
Japanese language support on BlackBerry « Horas and konnichiwa untuk semua
FS_scan: Getting Detailed with Your Data | Linux Magazine
Webacula
developerWorks spaces: The GReen IT Report: Energy, efficiency, and the environm...
Engadget Labs: The best mobile data carrier in America
How to turn a photo into a card with GIMP | Red Row Studio
Kicking the Tires on Your Next CMS
Modify xorg.conf for better performance | TuxRadar
SwissDisk - Secure Online Storage
Windows Hack Cleanup
Galaxy Control Systems - Access Control Security System
Hampton Roads .NET Users Group
Tidewater Area Macintosh Users Group
Using and writing Ghostscript testing scripts
Problems with AVG running Vista - Tech Support Guy Forums
Disable annoying Vista UAC popups with TweakUAC (FREE)
Windows Vista Windows Remote Assistance
Live Mesh Beta
Ramnish Singh"s Weblogs.... : Planning for Windows 7
Project Server 2007 Performance Lab Kit - Home
Detecting Packers in Network Streams with Pynids and Pefile | Malware Forge
Apple - Games - Articles - X3: Reunion
check_openmanage | freshmeat.net
EGOSOFT · Support · FAQs · FAQ: Read answer
GradeL: Gradebook for Linux
DRBD:Management Console
MP3 Diags
Towel Day - Celebrating the life and work of Douglas Adams
May 25
Test the strength of your password policy | Security Central - InfoWorld
SharePod - Download
X-resource
Home - SD Association
How to make a Delicious “plugin” for Chrome - Tip. Trick. Mod.
Svchost Process Analyzer - a svchost.exe file checker
10 Powerpoint Tips for Preparing a Professional Presentation
SD Formatter - SD Association
http://lkcl.net/rtmp/RTMPE.txt
Windows Server 2008 R2 - Home
Terry Zink"s Anti-spam Blog : How virus researchers work
Clustering and High Availability : PowerShell for Failover Clustering: Frequentl...
X3 - Reunion: Online Complex Construction Calculator
OutlookStatView - View general statistics of your Outlook mailbox
Planypus - Make plans with your friends
How to Clean Stuff
Is Due On - Freakin" simple bill tracker!
Matrex Home
UGU: Unix Guru Universe - checksplunk
SAIL - Samba Administration Interface for Ldap
Samba Administration Interface for Ldap The easiest way to manage user groups and shares
Jobless and Less: The Blog for the Employmentally Challenged
John"s CRM Blog : What version is installed again? (Part 2)
Subhajit"s Blog : Tip: The untold story of Audit Logs in SharePoint
Trimauditlog: Stsadm operation (Office SharePoint Server)
FedScoop » One Stop for All Your Government Business News
FedScoop is the only independent aggregator of the most trusted and popular online web sites and blogs on the net that Government IT executives go to every day to stay abreast of trends, best practices, business opportunities and news.
I. M. Testy : Better Bug Reports
Windows PowerShell Blog : Processing Event Logs in PowerShell
The Platform and the Hardman : Tangible Savings of Windows 7 vs. Windows XP
Crabby Office Lady : It’s all about the book
CodeJedi.NET : SharePoint Server 2007 SP2 sets expiry date on servers
FSR Sensor tutorial
HVACMonitor: Web-Enabled Thermostat - Marc Daigneault
Gallup-Healthways Well-Being Index
Alpha Consumer - Money & Business (usnews.com)
SourceSec Security Research » Blog Archive » WPScan & WPSpy Tools
Get Rich Slowly » How to Nail an Interview: 20 Job Interview Tips
Find a lawyer. Free legal advice. Lawyer ratings. - Avvo.com
Container gardens: Growing veggies indoors - dealnews.com
How-To: Backup your Windows iTunes library
abuse.ch ZeuS Tracker BETA :: ZeuS Tracker
Home | Marketcetera
agedu: track down wasted disk space
texts from last night
Complete Beginner’s Guide to Information Architecture | UX Booth
Kill Them With Logic: Rant: Lack of applying scientific method to solve problems
NTCore"s Homepage
Download Likewise Open -- Open Source AD-Based Authentication for Linux, Unix, a...
33 Brilliant Business Card Templates - Vectortuts+
Manageability - Open Source ETL (Extraction, Transform, Load) Written in Java
When pet projects bite back!: Open Source ETL tools vs Commerical ETL tools
Open Source Projects SAP BI Customers Should Know About | Rendition X
The case for open source ETL
LightScribe - Downloads - Windows
Athena -- Goddess of Wisdom
op5 Plugins - check mssql, check oracle, check esx
Open Source Monitoring - Icinga
Protecting the router’s control plane - CT3
Security Center - Cisco Systems
Open WebMail Project
AKB 21270: How do I give a security role rights to delete computers
KSimus - Main
Newtech Recycling Secure Computer and Hard Drive Disposal and Recycling
Unison Wiki - Main - HomePage
GGTSdotNET » Blog Archive » Joining a Windows 7 system to a Samba domain
DIASER - Main
SymmetricDS - SymmetricDS
How To Backup Your Twitter Archive
Tweetake: Download your Twitter Data to your PC
Geek Chart - Show Where You Share
Easy2DIY.com: Home Improvement & Home Repair Help
100 open source gems - part 1 | TuxRadar
The Linux and Unix Menagerie: Recovering Lost Data On Linux Or Unix Using The Co...
Record your Skype Calls for Free with Skype Call Recorder | Kabatology ~ Open So...
Juniper Networks - How Do I Configure a 1-to-1 Mapping of a Public Address to a ...
Juniper Networks - FAQ: Can I modify MIP on the fly without deleting the associa...
VMware Communities: Free ESXi Backup Solution for Windows
Downloads - Virtualization Utilities - VMNetBac | PHD Virtual Technologies |
Downloads - Virtualization Utilities - SnapHunter | PHD Virtual Technologies |
Lotus Notes Domino replication primer
Tips on monitoring Domino statistics and events
NEW MATH by Craig Damrauer
Wolfram|Alpha
How to Alter a SQL Server Database as Single User Mode and as Multi User Mode
EXEC sp_dboption "Works", "single user", "true"
Streamlining the Database Server Recovery Process on SQL Server – Database Journ...
Sort Benchmark Home Page
BBC NEWS | Technology | The accelerator of the modern age
Chad Miller"s Blog - Windows Live
Hewlett-Packard Co.
SourceForge.net: DriverBackup!
Project Euler
Jie Li"s GeekWorld : Upgrade Checker in SP2 – prepare your way to SharePoint Ser...
Visual Studio : Install Window7 from USB Key onto netbook – what worked for me
Bob Duffy"s Blobby Blog : Disk Partition Alignment De-Mystified
Blogs from Suhas : Database Corruption Part 3 :: Differences between CHECKTABLE ...
The Visual Basic Team : CodeRush Xpress Released Today! (Lisa Feigenbaum)
40 Most Useful Travel Websites That Can Save You a Fortune | Wise Bread
OBDII Project Home
» The Great GoogleLapse · Security to the Core | Arbor Networks Security
Andrisoft | IP traffic monitoring and network protection solutions
Protect Your PostScript Files from Being Converted to PDF | Linux Journal
X3 Complex Tips
Babylon 5 Mod for X3 Terran Conflict - News
How To Back Up and Restore IIS
Basic Netscreen Commands | SecManager
DESTINATIONNAT.pdf (application/pdf Object)
A Lightweight SQL Database for Cloud and Web in Launchpad
Disk Alignment Partitioning: The Good, the Bad, the OK and the Not So Ugly - Win...
Disk Alignment
sqlprofiler - Profiler for Microsoft SQL Server 2005/2008 Express Edition
Harry Potter"s World Renaissance Science, Magic, and Medicine
organic fertilizer: dns2003discovery.vbs script or executable failed to run
IIS & Exchange Digest
How to Install IIS Unattended | IIS & Exchange Digest
Sysocmgr.exe /i:%windir%\inf\sysoc.inf /u:%PathToUnattendFile%
Windows Search 4 still throttles itself too much - little known XP / Vista / Win...
More PowerShell Basics « Home of the Scary DBA
SearchMyFiles - Alternative to "Search For Files And Folders" module of Windows
rendeznew - the NEW way to "meet in the middle"
Save Money by Rekindling the Art of Reusing your Stuff | Wise Bread
The Lazy Environmentalist
Konami Code Sites
Do you know another "Konami Code powered" website?
Microsoft CRM Support Tools Downloads - Folder Shared from Box.net - Free Online...
Carpe Datum : Who is Active - a replacement for sp_who2
The Way I See It : IIS 7 Tip # 10 You can generate machine keys from the IIS man...
Clinic 10125: What"s New in Windows 7 for Consumers
Clinic 10088: What"s New in Windows 7 for Information Workers
Clinic 10077: What"s New in Windows 7 for IT Professionals
Cleaning up the Mess Left Behind by Multiple EFS Certificates at Helge Klein
Xobni - Outlook Plugin to Search People, Email, and Attachments Instantly
For Admins: Windows Installer Error Codes (Exit Codes) - DesktopEngineer.com
Productive! Magazine about Getting Things Done and Lifehacks. Edited by Michael ...
The Life Pie « gailvazoxlade.com
Checklist: Ten steps to take if your Domino server crashes
Success & Motivation « blog maverick
Whither Sockets? - ACM Queue
Software - TreehouseTechnologies
the [non]billable hour: Ten Rules for Conference Vendors
Jie Li"s GeekWorld : Upgrade Checker in SP2 – Behind the Scene
Pages - livechat - Microsoft Licensing
Windows 7 Upgrade Advisor
SQL Server Central Management System - Home
PowerShell Basics « Home of the Scary DBA
Tim Anderson’s ITWriting - Tech writing blog » Bytemark failure illustrates valu...
What is it good for?
How to enjoy Kyoto for free › Japan Today: Japan News and Discussion
R. Preston McAfee
BaconMap - IT Resource Relationship Mapper
Campsite
ConcourseConnect | freshmeat.net
LibraryThing | Catalog your books online
Upgrade Debian etch to lenny | Racker Hacker
sudo vim /etc/apt/sources.list [change "etch" -> "lenny"] sudo aptitude update sudo aptitude install apt dpkg aptitude sudo aptitude full-upgrade
Batch vs Real Time Processing and the Emerging Web Culture - O"Reilly Broadcast
Mud Rooms, Red Letters, and Real Priorities | 43 Folders
storeBackup.org--Free, super efficient backup software
SourceForge.net Project:
SourceForge.net: javascriptRRD
git.debian.org Git - collab-maint/upgrade-advisor.git/summary
APWG
What happens when your iPhone overheats
Everything You Need to Know About Personal Finance on One Page | Wise Bread
personal-finance-on-one-page.png (PNG Image, 800x1035 pixels) - Scaled (94%)
Advisory Check | freshmeat.net
A must have
JET 4.7 Now available : JET Stream
Puppet « reductive
Hissohathair: nagios
Salary Calculator, Salary Comparison, Salary Negotiation, SalaryScout.com
Windows Core Networking : QoS Traffic Generator Example Usage
The Way I See It : Setting SMTP RelayIpList from a script.
Welcome to The Clubhouse
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
OraNA :: Oracle News Aggregator
One Div Zero: A Brief, Incomplete, and Mostly Wrong History of Programming Langu...
Why Information Must Be Destroyed, Part Two - CSO Online - Security and Risk
IT UCF: Media Disposal
WCPE - Great Classical Music 24 Hours a Day
Oracle 10g instant client – Hard to make it work « The Tendjee
IFilter dot org - IFilters for Microsoft search technologies
Indexing binary files with IFilters on Windows installations / Tips & Tricks / C...
CodeProject: Your free search engine – Microsoft Indexing Server. Free source co...
desktopsearchifilters | Channel 9
Top 100 Reasons to Work with Us | ReThink Rewards
37. IT has their own mascot - a large stuffed donkey
[SOLVED] Samba log file - Ubuntu Forums
printcap name = /dev/null load printers = no printing = bsd
Woodworking
How Michael Osinski Helped Build the Bomb That Blew Up Wall Street -- New York M...
XMPP Standards Foundation
http://www.lasermonksgreen.com/
Business Card Star - Design business cards for free at Businesscardstar
Cesar de la Torre - BLOG : How to install a Loopback Adapter in Windows 7
14 Tips for Purchasing Life Insurance ∞ Get Rich Slowly
An Introduction to Life Insurance ∞ Get Rich Slowly
Welcome to POA
Index Service Scripts
Windows PowerShell Blog : PowerShell V2 - backward compatibility
How to Find and List Unsigned Executable Files at Helge Klein
Official home of X3: Sector Planner by LordSuch
Ask The Admin » Blog Archive » Group Policy: Desktop Lockdown Part 1
Qipit - Copy and share documents
Tim Anderson’s ITWriting - Tech writing blog » Windows 7: why you should keep Us...
Engineering Windows 7 : Support and Q&A for Solid-State Drives
AsiaTech: Learning by Practice : Why my account is getting locked out every one ...
Windows 7 Training Resources - Canada : New Training Resources on Windows 7
Windows PowerShell Blog : PowerShellToys – WOW!
Active Directory Powershell Blog : HOW TO CREATE A FUNCTION TO VALIDATE THE EXIS...
Active Directory Powershell Blog : ACTIVE DIRECTORY POWERSHELL TO MANAGE SITES –...
Microsoft Bob : SQL Data Warehousing Tips 1 - Building a Period table
Mohd Abubakr"s take on Web Application Performance : SQL Server Blocked Process ...
SQLUnit Project Home Page
How can I mass configure an AP9617 or AP9617 embedded APC-MGE product?
ftp://ftp.apcc.com/apc/public/hardware/nmcard/firmware/
UPS Selector Sizing Applications
get-flash-videos - Google Code
Ignite Realtime: Openfire Server
check_openmanage
skulker2 - Google Code
BizAgi, Business Process Management Software, BPM Software, BPM Suite, BPM
Jack Dorsey on the Twitter ecosystem, journalism and how to reduce reply spam. P...
Twitter creator Jack Dorsey illuminates the site"s founding document. Part I | T...
Mortgage - Refinance Mortgage, Home Equity Loans, Mortgage Loan, Mortgage
Nanda Lella"s WebLog : Windows 7 logo key - Keyboard Shortcuts
All the Groovey news that fits : Jason Campoli on Groove Relay Server performanc...
Green Paws
The Smart Set
Paul Cornell : Kanban: More Kanban Resources
James Shore: Kanban Systems
Corporate Coder
Lean Software Engineering
A Kanban System for Sustaining Engineering
Kanban Process Template for Team Foundation Server - Home
Pipeline
Constant Change » Naked Planning Explained - Kanban in the Small
Kanban in Action
Vijay"s Blog Space : Windows PowerShell and .NET Together (creating the object)
Matthew van Eerde"s web log : Second cousins, cousins once removed; relationship...
Inside Office Online blog : Top 10 Office podcasts (plus 90 more)
100 things you should have learned from Crabby by now - Help and How-to - Micros...
This is one of those that has everything,
There are some that call me...Tim : Powershell: Enumerating a LDAP Group with a ...
Team Individualism : Compendium of Windows 7 Search Connectors
The blog of Rob Margel - Windows Help : Top 10 reasons why you should upgrade to...
Team Individualism : MED-V compared to Windows XP Mode
Canadian Developer Connection : Joel Spolsky: Learning from StackOverflow.com
Windows PowerShell Blog : SE07 Automating Your Infrastructure with Windows Power...
Carpe Datum : And the Winner is - Get SQL Server Error Messages from PowerShell
Microsoft Management Summit 2009 Keynote Demo | Media | TechNet Edge
Download details: Microsoft Dynamics AX 2009 Upgrade Guide
Nicholas Allen"s Indigo Blog : Levels of Tracing, Part 1
Shawn Cicoria : Making a Win7 Bootable USB device.
Microsoft confirms final Windows 7 system requirements
Carpe Datum : Exam 70-432 TS: Microsoft SQL Server 2008, Implementation and Main...
Learn IIS7 : The Official Microsoft IIS Site
Chris Johnson : How we demo…
Microsoft Case Studies
LayerOne 2009
Lockpicking Forensics - Forensic & Investigative Locksmithing, Lockpicking, and ...
Project Kenai — We"re More Than Just a Forge
ZFS Encrypted Backup to S3: Wiki: Home — Project Kenai
Mathias Kettner
Man infects pigs with swine flu on farm in Canada - Times Online
Informal poll suggests nearly 70% of Kindle owners are over 40
Winsted Corporation
Research that will change your life! | CRS
SANS Technology Institute: Pandemic Watch April 2009
GMABooster :: Home
Cricket Liu"s DNS Advisor Pro Tool - Developed by Industry Authority Cricket Liu...
not free but there is a light version
FreeGIS.org
Lessons Learned
SourceForge.net: HashCatalog - Project Web Hosting - Open Source Software
Inside Redbox | Redbox Codes, Redbox News, DVD Rental News, Free DVD Rentals
Making Word documents really read-only - TechForum - TechSpace - Express Compute...
CDC - Influenza (Flu) | Swine Influenza (Flu)
Travelers" Health | CDC
WHO | Swine influenza
Macsimum News - ‘The Twitter Book’ by Tim O’Reilly & Sarah Milstein
Walker of Worlds
jernstrom.org
Video Tutorial: Installation Options for the HP Universal Print Driver and Basic...
HP Universal Print Driver - thoughts? - Topic Powered by Eve For Enterprise
Support & Drivers Search Results | Product: bizhub C353
Xerox Mobile Express Driver: Free Universal Printer Driver
Windows 7 – Learning Portal
My Top 5 SQL Server Indexing Best Practices | SQLServerPedia
For your SAP MM, SAP SD & SAP PP Tips & Tricks
SAP ABAP tutorials, softwares, articles downloads, SAP Jobs, Netweaver, BAPI
SAP Expert
Touchlite for Touch 2 (Metallic Series) [ AP06-007 ]
HackMii — Notes from inside your Wii
The Making Of: PlayStation | Edge Online
Sendpepper
SQL Server Setup : SQL Server 2008 Slipstream Frequently Asked Questions
The blog of Rob Margel - Windows Help : 20 Ways Vista can Improve Your Life
Programming tidbits: store & retrieve : Fix Corrupted Performance Counters
LODCTR /R
Motley Queüe : MSMQ and the Active Directory Recycle Bin
The MossyBlog Times. : Do’s and Don’ts of Video Tutorials.
Engineering Windows 7 : Engineering Windows 7 Graphics Performance
Troubleshooting SharePoint! : PowerShell script to remove all users from a Share...
Hayden Carruth - Poets.org - Poetry, Poems, Bios & More
SpaceSniffer
HackerStorm Report tool for Nessus and OpenVAS
IT & Internet Security, Hacking and Vulnerability Research, Penetration Testing,...
NatWest - Rapport - For safer banking
Network SLAs - Which one to use? - Terry"s Blog
Free Training Content - Legal Holds « LitSupport Trainer’s Blog
Tim Anderson’s ITWriting - Tech writing blog » New in Windows 7 RC: Windows XP M...
TidBITS Tech News: Windows 7 Adds Virtualized XP as Option
gumnut - decentralised organisational software
Get Great Gadgets. And Keep Them. - Last Year"s Model
Network UPS Tools: APC"s smart protocol
Power Line Problems -- An Introduction
Windows PowerShell Blog : V2 Quick Tip: Monitoring Performance Counters with Pow...
CSS SQL Server Engineers : SQL Server and the Bad CPU
Action plans and problem solving : How to optimize the Memory configuration of S...
MSDN Utopia : Best articles from MSDN flash on an ebook format.
Software for Students : The 10/20/30 Rule of PowerPoint
SQL Server Express WebLog : Troubleshooting the corrupt file error when using th...
Microsoft SMB Community Blog : Windows 7 Resources For You
S + S Reality Check : 1+1 Redundancy Just Isn"t Good Enough
The Programmer’s Guide to Getting Hired: Your resume. It’s the little things tha...
Netomata Config Generator (NCG) | Netomata
Free Personal Budget, Online Money Management, Personal Finance Software, Financ...
Watch Free Documentaries - SnagFilms
The History of Credit & Debt
Main Page - Nagios-Portal
10 Ways to Use LinkedIn Effectively
OutWit technologies
TweetDeck: a simple and fast way to experience Twitter
wissel.net :: Building a high performance Domino Server
Yasca - Yet Another Source Code Analyzer
edrm.jpg (JPEG Image, 647x324 pixels)
VMware Communities: Disk alignment on Windows system disk
VMware Communities: old favorite, ESX disk alignment
Disk Alignment « GOING VIRTUAL
VMware Disk Alignment - Welcome to TCPDump!
VMware: Partition/disk aligned or not? « ICT-Freak.nl
The Learning Continuum Company, distance learning training courses for Notes, Do...
Wiring and Cabling: How To Lace Cable Harnesses
JB"s Windows Vista FAQ, Tips, Tricks, and Downloads
Wrok & Joy space: Domino router
Brian Jones: Office Extensibility : Removing Comments from Excel and PowerPoint ...
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Windo...
Untangled
Aaron Stebner"s WebLog : Mailbag: Do I need still need older versions of the .NE...
Geekgirl"s Plain-English computer tutorials
The blog of Rob Margel : Power Management in Windows 7 White Paper now available
Mark Brown"s Blog : How to recycle a IIS6 website in Windows Server 2003 SP1
PVE POP3 Collector
Engineering Windows 7 : Delivering a quality upgrade experience
Visio Guy » Eight Places to Watch Visio Videos
Home: Think Apartments
Oracle Instant Client
SQL Server Setup : Create a merged (slipstream) drop containing SQL Server 2008,...
Windows 7 tips, tricks and tweaks
Debugging Toolbox : [PowerShell Script] PowerDbg v5.2—Using PowerShell to Contro...
Nice things inside SQL Server : How to un install SQL Server 2005
Dave does Data : SQL Server 2008 Jumpstart Materials – very detailed training, n...
Microsoft’s Citizen Safety Architecture Helps Governments Improve Public Safety ...
COFEE
FAQ: Computer Online Forensic Evidence Extractor (COFEE)
Random Thoughts on Technology : Using DelegConfig tool for troubleshooting Kerbe...
Simon Ince"s Blog : Types of Auditing
Varun Dhawan"s Blog : How To: Improve SQL Server 2005 Management Studio Start-up...
agazzeri"s Blog : SharePoint Server 2007 – 10 suggestions for a reliable, low-la...
Erwin van der Valk"s blog: Practicing patterns : sharepoint guidance v2 – drop 7
Microsoft and Oracle Applications and Technology Platform : SQL Server 2008 for ...
Internals Viewer for SQL Server - Home
Another day in the Office : Bending the Ribbon to your will…
Another day in the Office : The Myth of Simplicity
Microsoft SQL Server troubleshooting : SQL Server Resource IsAlive Troubleshooti...
Microsoft SQL Server troubleshooting : Exclusive Session – SQL Server Performanc...
A Visual Guide To Twitter
Install and Configure SQL Server 2008 Express | Symantec Connect
Windows 7 home
The Change Analysis Diagnostic tool for Windows XP is available
Windows 7 2008 2003 XP Vista 2000 Ms Office Tutorials How tos tips and tricks
Windows 7 Forums
SharePoint Knowledge Base
Calendar Time Zone Settings, and My Regional Settings « SharePoint Knowledge Bas...
Amit"s blog : Disk Partitioning Offset
Disk performance may be slower than expected when you use multiple disks in Wind...
SQL Server Best Practices Article
The Best File Backup Scheme
Michael"s Backup Script
Main Page - SecurityForest
xfocus official website
Cross compiling Windows applications under GNU/Linux
Amit"s blog : SQL 2008 Whitepapers
Sanjay Narang"s thoughts on SharePoint : SharePoint (Performance, Stress ) Load ...
Windows Genuine Advantage : The Surprising Risks of Counterfeit Software in Busi...
Dynamics CBM : TFS upgrade from SQL Server 2005 to SQL Server 2008
Ram"s Blog : Sharepoint considerations when configuring AD rights management clu...
Out Of The Box : Windows 7 Features by Version
Dan"s Blog : PCI Compliance and SQL Server 2008
Behind the scenes with Windows 7 › Japan Today: Japan News and Discussion
Yabusame › Japan Today: Japan News and Discussion
50 Ways To Squeeze Value From Your Healthcare Dollar Without Killing Yourself | ...
Life expectancy
DAG: WiiPresent: Giving presentations with your wiimote
Abby"s Closet - Helping Prom Dreams Come True!
SourceForge.net: Advanced Command-line CD ripper/encoder: Advanced Command-line ...
Notes Design Blog
Data storage: RAID, SAN, NAS, Archive and Disaster Recovery by Rorke Data
Windows PowerShell Blog : Differences between the ISE and PowerShell console
Watcher: open source Web security testing tool and PCI compliance auditing tool ...
Viruslist.com - Analyst"s Diary
HDMI
HDMI :: News & Events
Viewing a thread - WSUS Superseded Update Finder Utility 0.1
Digital Photography - RawWorkflow.com - Michael Tapes: photo news and commentary
Don"t Be Afraid Of Customers
The PowerPoint FAQ
Searching, Downloading, and Installing Updates (Windows)
Bristol University | Information Services | Configuring the WSUS Client by Group...
NEbraskaCERT
fsc2 Overview
Giz Village: Concurrent Booting: make full use of your dual-core, multithreaded ...
You can learn a lot about Japanese culture from kindergarten classes › Japan Tod...
Inside Office Online blog : What’s YOUR story? Impress your interviewers with a ...
Scott Hanselman"s Computer Zen - 11 Top Tips for a Successful Technical Presenta...
I know the answer (it"s 42) : Technical Presentation Tip
Canberra PFE : Adding a 2008 Domain controller to your 2003 forest
Bill Ramos on SQL Server : Transact-SQL Debugger for SQL Server 2008 – Part 2
Bill Ramos on SQL Server : Transact-SQL Debugger for SQL Server 2008 – Part 1
Karthick PK "s Blog : Different Status bits of sysdatabases in SQLServer
Bill Ramos on SQL Server : SQL Server Management Studio Tips – Part 4
Josh Gaffey"s Blog : Why cheap developers will cost you
Bill Ramos on SQL Server : SQL Server Management Studio Tips – Part 1
Kirill Osenkov : Remote Desktop: /span across multiple monitors
Esoteric : Rolling upgrade of 1 instance from 2-node, 2-instance sql failover cl...
Karthick PK "s Blog : How to add an IP Address when we Add new NIC to node where...
XMind - Social Brainstorming and Mind Mapping
AT&T Fiber cuts remind us: Location is a Basket too! - O"Reilly Radar
Remember: Don"t put all your eggs in one basket... and Location is a basket too!
McAfee KnowledgeBase - How to use the WinTech CD to remove the encryption and bo...
Full Disk Encryption (Safeboot) - UBCD4Win Forums
SourceForge.net: nVentory
Ask the Directory Services Team : DS Restore Mode Password Maintenance
Matousec - Transparent security: Security software testing, analyses, research a...
Jeet Blog - Internet Marketing, Blogging and New Media
MAKE: Blog: 1000+ Fluorescent lights powered by overhead cables
Cheap Food, Inexpensive Restaurants, New York
Cheap Eats - Ueatcheap.com
Dealfeed – full coverage on Eater
3 Buck Bites | Cheap Eats for Food Lovers!
Grubgirl. | San Francisco Bay Area cheap eats, restaurant reviews, and cooking t...
How Sudden Failures Happen Gradually - Susan Cramm - HarvardBusiness.org
"clean up as you go" aproach
Apricot Mapping Service HQ
Six Steps to Securing an IT Interview
KeyRingThing Cards
Blogs from Suhas : Introduction to Database Corruption in SQL Server
CSS SQL Server Engineers : The 3 Things you Need to Know to Install SQL 2005 on ...
Dgoldman"s WebLog : Full OAB downloads caused by mis-configured anti virus softw...
Microsoft Software Inventory Analyzer
Canadian Developer Connection : Windows 7 Feels the Love
Argonopedia Version 5 - X²: The Threat
accueil [Projet Vigilo]
Family Portraits Do’s and Don’ts
Backup SQL Server Databases
Shape Collage - Download
Free DotNet VersionCheck Utility - TMG Development Ltd
MinGW cross compiling environment
msgoodies: PowerShell, Getting the Value Out of a ScriptBlock
Sharepoint – farm build procedure @ J. Greg’s Brain Corral
WMI_Utility.exe: WMI Search Utility | Symantec Connect
10 Essential Cheat Sheets To Download | MakeUseOf.com
Directory of files/dougj/esx/custominv_esxupdates
Debian Admin--Debian/Ubuntu Linux System Administration Tutorials,Howtos,Tips
HP Universal Print Driver
Universal Print Driver for Ricoh Products
LepoLand - A Blog by Alan Lepofsky - Alan"s blog about software, technology, tra...
LepoLand - A Blog by Alan Lepofsky - Alan"s blog about software, technology, tra...
» DNS Attack Surface · Security to the Core | Arbor Networks Security
How to check the status of VMware Tools per virtual Machine the easy way.
Action plans and problem solving : How to move the WSUS database to a different ...
Action plans and problem solving : How to troubleshoot the “Loading Grid” Projec...
The Deployment guy : Restoring IIS7 Configuration snapshots
Download details: IT Pro poster stencils
List of keyboard shortcuts for Word 2002, Word 2003, and Word 2007
l2admin - One Sys Admins tips, tricks and views on the world.
PXE Magic: Flexible Network Booting with Menus
Conficker Work Group - Main - HomePage
Conficker Eye Chart
VMware ESX SDK SnapShot Perl Script Part 3
Laser Printing Problems using Microsoft Windows Vista - The HP LaserJet blog by ...
Couldnt get a USB HP1200 to be properly recognized by Windows 7 Beta. Universal Print Driver seems to have worked as expected.
Fire Fish
egosoft.com :: View topic - **X3 Player Guides,Tutorials and other Useful Inform...
Money Matters from the Federal Trade Commission
Tim Anderson’s ITWriting - Tech writing blog » Intel network driver 64-bit annoy...
Microsoft SQL Server 2008 Editions
eCycling | Common Wastes & Materials | US EPA
Welcome to InfraGard Awareness
OnGuard Online
Mean Time to Innocence - Terry"s Blog
Mean Time To Innocence
Reflections on Microsoft Dynamics AX : Setting the Max Memory on SQL.
setting the SQL Max memory
Developer hearted / Relational minded : Checking Failover after setting up a Dat...
RecycleBank :: Home
Category Archive for ‘ProfileNurse’ at sepago Community Tools
GPOGUY.COM -- The Definitive Group Policy Resource Site on the Web!
SharePoint Designer Home Page - Microsoft Office Online
Rob"s SQL Server Blog : Performance Dashboard Reports for SQL Server 2008
Phone bill audits, Reduce telecom expenses, Cell phone services reviews
RaProducts - JavaRa documentation
Plangarden Vegetable Garden Plan - Design Software
PXE: Not Just for Server Networks Anymore!
Visual Literacy: An E-Learning Tutorial on Visualization for Communication, Engi...
The Official Blog of Claudia Christian
The Babylon Podcast
ReadWriteThink
smallblueprinter.com :: home of smallblueprinter and garden planner
Bathroom fan FAQ
Action plans and problem solving : SQL Server - Memory Trimming
- Cannot use Large Page Extensions: lock memory privilege was not granted. - A significant part of sql server process memory has been paged out. This may result in a performance degradation.
Evil Genius in Training : Dell Mini 9 NetBook and Windows 7 – Very Cool!
"Obscurum per Obscurius" : Testing Domain Controller Connectivity Using PORTQRY
Virus scanning recommendations for computers that are running Windows Server 200...
Action plans and problem solving : You have just installed SQL Server 2008. So n...
Money Matters NJ
Internet Infomation Services (IIS) : Kerberos SPN Viewer and Helper Tool
Terry Zink"s Anti-spam Blog : What time of the day is worst for spam complaints?
Djigzo Open Source Email Encryption
Dropbox - Home - Secure backup, sync and sharing made easy.
Ask The Admin » Blog Archive » April 1st is coming beware of the Cornflicker wor...
DHS: DHS Releases Conficker/Downadup Computer Worm Detection Tool
Tools, Tools, Tools : DoxPara Research
Informatik IV: Containing Conficker
Cisco VPN Client: Reason 412 - The remote peer is no longer responding | L.A.M.N...
EugeneZ blog : TFS Administrator chores – dealing with the space offender
JExplorer Website Powered by Woo Sik Jung
Glassy Eyes | Deals on Online Eyeglasses. Good eyeglasses. Cheap.
WFMU-FM 91.1/Jersey City, NJ; 90.1/Hudson Valley, NY
SoftHSM – OpenDNSSEC
* TankCalc
RightWebPage - Web Conformance Tool
Observer : Network Management And Monitoring | Main / HomePage
Install Altiris Agent on ESX | Symantec Connect
Nolo: Law Books, Legal Forms and Legal Software
The blog of Rob Margel : 30 New IE8 help articles
Adventures in IIS, Commerce and whatever else comes into my head. : Silverlight ...
Paul Cornell : Autofocus: Adapting Outlook from GTD
Springboard from mortarboard to onboard : Installing Win7 from USB onto Netbook ...
InnovateOn
Terry Zink"s Anti-spam Blog : When do spam outbreaks occur?
Active Directory Powershell Blog : Active Directory Administrative Center for Wi...
ediscovery - Google Code
Schweizer IT Professional und TechNet Blog : Free Windows PowerShell workbook: s...
Effective Windows PowerShell: The Free eBook - Windows Live
Performance Tuning Guidelines for Windows Server 2008
Hacking The Router Patching Conundrum - DarkReading
Backstage at MED : Mobile Forensic Equipment & Software
Tim Sneath : Extending Your Brand to the Desktop with Windows 7
AsiaTech: Learning by Practice : How does client communicate with MSDTC Cluster?
SQL Server Security : Enforce Windows Password Policy on SQL Server Logins
Nota Bene: The OneNote Blog : Lost your job? Let OneNote and Office help!
Carpe Datum : The Effect of Hardware on SQL Server Performance
Fiddler Web Debugger - A free web debugging tool
Carpe Datum : SQL Server Security Links
Random Musings of Jeremy Jameson : Script to Restart SharePoint Services
Running SAP Applications on SQL Server : Measuring Memory Consumption of SAP App...
Macsimum News - Server room setup on a budget: a do-it-yourself guide
CallCatalog.com - Free Reverse Phone Directory - 866 Numbers - reverse phone loo...
BrightScope | 401k Plan Ratings
That’s when I reach for my revolver… « Dan Williams’ blog
Interesting descriptions of the Hardware - Go Dan.
IM3D.net
IM3D.net » Blog Archive » Basis T-Code
OBD GPS Logger
Varun Dhawan"s Blog : How to: Verify path for SQL Server Error Log Files
Kerberos : Kerberos SPN Viewer and Helper Tool
Main Page - CT3
Tech Tips, Comments and Curious Stuff : The way of the whiteboard
SQL Server 2000 Administration in 15 Minutes a Week – Database Journal
Bibliotheca Alexandrina, Front Page
enStratus - Web-based Cloud Infrastructure Management Tools
TalkShoe - Call - ESIBytes - Electronic Discovery Tips
PuTTY Connection Manager
Racketware.info | AFUL
Debian on the SheevaPlug
Microsoft SQL Server Tips & Tricks : SQL Server 2008 Setup fails to Install with...
Ian Palangio"s Business Productivity : Free Screen-cast Video Demonstrations and...
Active Directory Powershell Blog
bert’s blog » Blog Archive » USB sniffing on linux
bluCTRL wireless Bluetooth keyboard and mouse
Heath Stewart"s Blog : How to Safely Delete Orphaned Patches
Co-op America"s National Green Pages: Green Your Spring Cleaning
Marketplace | Spring Cleaning
Cleaning 101
The SSD Project | EFF Surveillance Self-Defense Project
Welcome to Windows 7
» Repair Tool of the Week: Mail PassView - Technibble - A Resource for Computer ...
DomainKeys Identified Mail (DKIM)
Opportunistic Locking | smb, cifs, oplocks, exclusive, batch, level, wafs, cachi...
HOB Techtalk : 3270 - A Brief History
The Crystal Reports® Underground
Language - Kids Web Japan - Web Japan
AsiaTech: Learning by Practice : How to manage my Windows user password through ...
Microsoft | Oracle On Windows Resource Center
One Louder : Saint Patricks Day Haiku
The SQL Server 2008 builds that were released after SQL Server 2008 was released
From Mind To Words : Manually migrating websites from IIS 5.0 to IIS 6.0
Office At Work : Going Green with Office
US ISV Developer Evangelism Team : Windows Version 6.1?
CSS SQL Server Engineers : How to fix your SQL Server 2008 Setup before you run ...
WikiScanner2 - More powerful than you can possibly imagine
Index page – 68k Macintosh Liberation Army Forums
Eucalyptus
IPAudit - Home
Coova.org
Building GTK apps for MS Windows on Linux
Action plans and problem solving : How to use compressed backups in SQL Server 2...
Cisco Validated Designs : Interactive Design Guide
Information Security
Clustering and High Availability : Network Load Balancing (NLB) and Virtual Mach...
The Way I See It : IIS 7 Tip # 4 Application Pool Recycling Events has an UI
Carpe Datum : Finding SQL Servers with PowerShell, Part Deux
Upgrading to Windows 7: what XP and Vista users need to know - Ars Technica
Backing Up and Restoring Databases in SQL Server
Deepak Mittal : .NET framework 3.5 SP1 installation failure with Error 1603
Kirk Evans Blog : Free SharePoint Developer Training
Useful IIS/ASP.NET Information provided by Microsoft Support Teams : Caution whi...
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
contxts - mobile sms business cards
Terminal Services Team Blog : Top 10 RDP Protocol Misconceptions – Part 2
The Way I See It : IIS 7 Tip # 5 Run a command when Rapid Fail Protection is tri...
Windows Management Infrastructure Blog : Let’s troubleshoot WMI (Part 1: Remotin...
Everyone wants SharePoint... : WSS 3.0 Valuable Links.
Developing for Dynamics GP : Great Plains Historical Timeline
Microsoft Excel : Excel VBA Performance Coding Best Practices
Windows PowerShell Blog : dir –a:d
Just Vocabulary - The 2 words a show ESL Podcast
Jon Gallant"s Blog : How to copy tables from one Access database to another
Ashton Office Blog : How to deploy a customized normal.dotm with Office 2007
Janani"s WebLog : Having mobile broadband issues in Windows 7?...
Shiloh , Yukon and Beyond!!! : WMI Basics & Troubleshooting with WMI…
In search of simplicity, quality and tranquility in software engineering : SDLC ...
Aaron Stebner"s WebLog : Steps I use to narrow down an OS update installation fa...
The Microsoft MVP Award Program Blog : Scottish MVP Demystifies IIS 7.0 for ASP....
http://www.blueskills.net/
SAP Help shows only empty sections or blank pages
blindhog.net
iteraplan - Enterprise Architecture Management (EAM) Made Easy | iteraplan Open ...
Network Security for Business Mobility: Napera
Official Website of the National Cherry Blossom Festival - Washington, DC
Ask Dr. Ellie
Email-Reminder
DNSSEC-monitor - .SE DNSSEC - Trac
Slashdot | Suspect Freed After Exposing Cop"s Facebook Status
"Except that trash talk in locker rooms almost never winds up preserved on a digital server somewhere, available for subpoena."
Avoid Big Dental Bills with Safe and Inexpensive Products | Wise Bread
Maarch | Open Source DMS | Electronic Document Management System | IDARS | Integ...
vmktree » About vmktree
Terry Zink"s Anti-spam Blog : スパムフィルターと外国のスパム、第5部 - Japanese
The Deployment guy : Automating SQL Server 2008 installations
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Windows PowerShell Blog : How to Create an Object in PowerShell
2008 - Windows Live
Point Blank - A Blog on SharePoint : 5 Immutable Laws of SharePoint
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Jennifer Marsman : Building Applications with SQL Server 2008
Macsimum News - Macs more expensive? Not if you consider TCO
"The question is, when purchasing technology, do you want to pay now or pay later?"
Main Page - The iPhone Wiki
Vlad Tatarincevs"s Lotus Domino Blog
10 tips for sensible systems administration
Disk Structure, BIOS, DOS Boot Code, Assembly Language.
Investing for Your Future - eXtension
Rutgers NJAES: Personal Finance
IT Certification Community
Head First Labs from O"Reilly Media, Inc.
Very interesting take
Tim Anderson’s ITWriting - Tech writing blog » Hands on with ASP.Net Membership,...
Easy, Illustrated Instructions on How to Repair the Lens Mechanism of a Canon Po...
Arbor Networks | ATLAS Dashboard: Global
Linux Performance Tuning - Linux Forums
ETM
An Analysis of Conficker
GreenPrint :: Saving Money Today, Trees Tomorrow
Stanza: a Revolution in Reading | Lexcycle
Corporate Legal Exchange
Steve Rachui"s Manageability blog - ConfigMgr/OpsMgr : Backing up Hyper-V Virtua...
SQL Connectivity : SQLEXPRESS required as a user instance
Microsoft SQL Server Tips & Tricks : HOW TO DETECT SQL SERVER INSTANCES / FEATUR...
IBM developerWorks : Lotus : Lotus Notes 8.x Tips
Welcome to SPI — Welcome to SPI
Welcome to vm-help.com
SourceForge.net: Main Page - nconf
:: CWSandbox - Automated Malware Analysis ::
Robert Bruckner"s Advanced Reporting Services Blog : Tablix – The Matrix Revolut...
Alik Levin"s : Why My ASP.NET Application"s Performance Is Less Than Optimal?
Architecture + Strategy : Federated Search in Windows 7
Terminal Services Team Blog : Migrating a Windows Server 2003 TS License Server
Bruce Elgort
Basic Analysis and Security Engine (BASE) -- Homepage
More Linux tips every geek should know | TuxRadar
/var/www/peereboom.us/adsuck/index.html
Computer Data Storage Through the Ages -- From Punch Cards to Blu-Ray | Maximum ...
SharePoint Thinks, Links and Clinks : Shared Points for SharePoint... : SharePoi...
Terminal Services Team Blog : Top 10 RDP Protocol Misconceptions – Part 1
Aaron Stebner"s WebLog : How to perform a silent repair and uninstall of the .NE...
American Bar Association - Defending Liberty, Pursuing Justice
Vegetarian restaurants guide and directory of natural health food stores by Happ...
Bill Morein"s Weblog
FastCopy
Attributor: Program the Web
My Apartment Map Apartment Rental Search. Map Based Listings of Apartments for R...
Off-Line Windows Updates With CTUpdate | Symantec Connect
OER Commons
W3Perl - A free logfile analyzer
CMDB: The Key to Jump-Starting iTiL Success
/kevinbehr/home - The Blog of Kevin Behr co-author of Visible Ops
Jaspersoft - Open Source Business Intelligence
Enterprise Open Source Portal, CMS, Web Publishing, Collaboration, and Social Ne...
SharePoint BUZZ - Your SharePoint Community Portal
O3Spaces Workplace | Document Management and Collaboration
US ISV Developer Evangelism Team : Resources Available to Get Started with Windo...
Home-Account.com: Own your home account
Register Domain Names with moniker.com
Me about things... : Installing Windows 7 on a netbook
SharePoint Thinks, Links and Clinks : IIS7: Moving the INETPUB directory to a di...
Delaware Employment Law Blog :: Published by Wilmington, Delaware Employment Law...
Steven Cheng"s MSDN Notes : [ASP.NET]ASP.NET Performance tuning resources
SQL Server Setup : SQL Server 2008, basic slipstream steps
Team Individualism : Go Green with Visio
Microsoft Dynamics CRM - The Danish blog : Windows 7 Feature Walkthroughs
Good-Bye Computer Shopper - Computerworld Blogs
Minneapolis Colocation - St. Paul Colocation - Minneapolis Managed Hosting - St....
Volatility | Memory Forensics | Volatile Systems
RegRipper
B5TECH.COM - The Babylon 5 Tech-Manual.
ODI - Office of Defects Investigation
DeCSS Mirror
OpenDVD.org - DVD for every OS
Ian Palangio"s Business Productivity : SharePoint 2007 Enterprise versus Standar...
10 Papers Every Programmer Should Read (At Least Twice)
Doug Seelinger"s blog (The Agileer) : Win 7 Beta RDC Tease
Time to Work Together on Electronic Discovery - Electronic Discovery - E-Discove...
Things You Need To Know To Become An Apt Guru - Make Tech Easier
ferm - for Easy Rule Making
Carpe Datum : Using PowerShell to Discover Login Failures on SQL Server
MIS Laboratory - Resources for Information Systems Faculty and Students : How to...
From Mind To Words : Rename files using PowerShell ‘a one liner’
Neil Hutson - Windows Server 2008, Visual Studio 2008 and .NET 3.5 for developer...
Slick IT
Slick IT: SQL Server 2008: Self-Destructing Databases
Action plans and problem solving : Useful T-SQL queries for a SQL Server 2008 ad...
NicolBlog : NicolTIP#004: seven new keyboard shortcuts for Window 7
Engineering Windows 7
Lifehacker Top 10: Top 10 Things to Look Forward to in Windows 7
Microsoft SQL Server Tips & Tricks : How to backup SQL Server databases to a map...
Secure world : Why IT Department mandate X days password renewal policy in most ...
Managing IT in a downturn: Beyond cost cutting - The McKinsey Quarterly - managi...
Windows Embedded Standard (NT4e, XPe and beyond) : My first impression of Window...
From Mind To Words : 401.1 – Unauthorized, using Anonymous access (IUSR account)
Steve Clayton: Geek In Disguise : How To Stand Out At Work
KiWi - Knowledge In A Wiki - Home
Thrive
» Repair Tool of the Week: AVG Remover - Technibble - A Resource for Computer Re...
What is Our Email Retention Policy?
If broken it is, fix it you should : .NET Memory Leak reader email: Are you real...
UNIX Administratosphere
How to Change the World: Guest Post: Memo from Kafka"s Castle and What Employers...
SBSC Canada Blog : How do I get Microsoft licensing support?
Interface | matters: Embedding GTD Into My Life Systems
Blackberry, Bluetooth and a group of persons - By Ulrich Krause - eknori.de
Invoice & Estimate Software
VMware KnowledgeBase Article - Tips for configuring Microsoft SQL Server in a vi...
Phenom II x3 gets extra core with BIOS hack - SlashGear
Microsoft Office Project Support Blog : Project Server 2007: The continuing saga...
Office Hours Blog : What every Business Major should know about presentations
SQL Server Setup : How do I service SQL Server 2008
DailyTech - Microsoft Says It Has Fixes for 2,000 Windows 7 Bugs Thanks to Teste...
Tellumar Kampiva: Femto
Cisco: Visual Networking Index Free Application
IBM - Domino Server console and Windows Server 2008 Session 0 Isolation
How to refresh a SQL Server database automatically
LuxPM: The home of LuxPM
Encrypt Removable USB Drives with BitLocker To Go on Windows 7
rainpress - Google Code
Ports used for communication in Symantec AntiVirus Corporate Edition 8.x and 9.x
VisioCafe
Welcome to NJ Vistas
Stubborn Tech Problem Solving: A Linux user"s review of Windows 7 Beta
Windows 7 Feature Walkthroughs
markwilson.it » Active Directory design considerations: part 7 (domain controlle...
markwilson.it » Active Directory design considerations: part 6 (domain controlle...
markwilson.it » Active Directory design considerations: part 5 (security groups)
markwilson.it » Active Directory design considerations: part 4 (group policy obj...
markwilson.it » Active Directory design considerations: part 3 (organizational u...
markwilson.it » Active Directory design considerations: part 2 (forest and domai...
markwilson.it » Active Directory design considerations: part 1 (introduction)
Download details: SQL Server 2005 Best Practices Analyzer
How to use the Microsoft Group Policy Diagnostic Best Practice Analyzer (GPDBPA)...
Active Directory Blog : Group Policy Best Practice Analyzer
Home - Report Surfer by Angry Koala
Ruby on Rails in IIS 7.0 with URL Rewriter | RuslanY Blog
MIS Laboratory - Resources for Information Systems Faculty and Students : How to...
Association of Open Group Enterprise Architects
Developer Support Team Foundation Server : TFS Performance Tips & Tricks - Part ...
TechNet Magazine Homepage
Windows Administration: Designing OU Structures that Work
Download details: Security Compliance Management Toolkit
Real world problems; Real world solutions : IIS Compression failure - compressio...
basketweaving for the mind : IIS7.x, Server Farms and Ruby
InterServer, Inc - Advanced Hosting and Custom Dedicated Servers with Managed² s...
Email Fax and EDI Services from EasyLink
Active Directory Blog : VSS Snapshots and You
How to create custom administrative templates in Windows 2000
GP options not showing up for custom ADM
Group Policy editor by default hides policies that modify registry values outside of the 4 special policy keys. In order for you to see the policy you need to do the following:
Fixing your AD design with GPO Loopback processing
How To: Setting Up Active Directory Group Policies - Security - Network Computin...
12 Tips For Implementing Microsoft Office Project Server 2007
Florian’s Blog
ADM Template Repository
Group Policy
4 Steps Toward Recovering From a Tech Job Loss
SourceForge.net: mrsync (multicast remote sync): mrsync (multicast remote sync)
SharePoint Server 2007 - Training - Microsoft Office Online
MIS Laboratory - Resources for Information Systems Faculty and Students : How to...
SharePoint in Education
Alex Pearce: SharePoint Blog - SharePoint Blogs / SharePoint University
BizTalk Performance
CSS SQL Server Engineers : SQL Server: Is CHECKDB A Necessity?
Office Hours Blog : Office Ninja: Create an instant table (Excel)
Microsoft SMB Community Blog : Second Shot with Career Assist from Microsoft – T...
Microsoft Dynamics CRM Team Blog : Performance Testing using DbPopulator
Team Foundation Server - Setup, Administration and Operations Blog : Move from a...
Windows 7 Friday: Locking Down and Protecting Your Computer With AppLocker
Daniel Egan DotNetDoc : Online Windows 7 Event !!
Developer Support Team Foundation Server : TFS Performance Tips & Tricks - Part ...
MVP Global Summit 2009 Blog : SeaTac to Seattle: A Transportation Guide
Astrometry.net
Quality Software Engineering Strategies : Ever Wanna Know About a CLR Assembly?
Above the Clouds
Download details: Microsoft SQL Server 2008 Management Studio Express
Canadian Developer Connection : The 21st Century Software Development Organizati...
Public Sector Developer Weblog : Windows PowerShell is Awesome
Dave Glover "Down Under (Oz)" : Windows 7 "Remote Server Administration Tools" i...
Explore the UnExpected : FTP Commands Overview
Running SAP Applications on SQL Server : SQL execution plans, part 2: SQL compil...
Hans VB"s WebLog : Learning how to program?
Andrew Coates ::: MSFT : Windows 7 on my Mac Mini
The Personal Branding Blog: The Top 10 Secrets Successful Job Seekers Know
Education.com | An Education & Child Development Site for Parents | Parenting & ...
wissel.net :: Keeping track of events
tcpjunk - Google Code
jTimer - Home
gET iT i sAY .giis - ext3 File Undelete Tool
Take Windows 7 for a spin with VirtualBox
GiSTEQ Corp. TripBook
Coding4Fun : Debug 4 Life
Care, Share and Grow! : Increase the concurrent connections limit for IIS FTP si...
The Way I See It : IIS 7 Tip #1 Finding all the web.configs
Dave does Data : SQL Reporting "How to" - Conditional Color 1/4: The Basics. Rep...
Josh Holmes - Measuring ROI – Moving from Cost Center To Strategic Partner
DirectAccess with Devrim
Bryan Griffin"s Blog : Listing firewall exceptions with PowerShell - yes we can
Aaron Stebner"s WebLog : Repairing the .NET Framework 2.0 SP2 or 3.0 SP2 MSI fro...
SharePoint911 - Home
Windows 7: The Complete Guide
SQL Server Storage Engine
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Canberra PFE : Check your tombstone
Team Individualism : Windows 7 Quick Keys – ZoomIt
mszCool"s thoughts and cents revealed : Cool Security Modules and Tools for IIS ...
New rules for the SAP SD benchmark - c0t0d0s0.org
Mommy Track"d | Managing the Chaos of Modern Motherhood
Wertarbyte EDV-Dienstleistungen - Backup system "Tartarus"
Accounting & Business Software | Free Web-Based NolaPro
Knowledgeroot Project Page
PNGCRUSH
Back Up LVM XEN Guest Containing LVs | HowtoForge - Linux Howtos and Tutorials
EV"s Best Top Rated HDTV Indoor Antenna Review Test Round-Up Guide - AVS Forum
TUAW Tips: Packing your gadgetry for travel to faraway lands - The Unofficial Ap...
SnTT: Notes Mail "Inbox Maintenance" - By Ulrich Krause - eknori.de
Impressive DAOS results - By Ulrich Krause - eknori.de
Available Command-Line Options for Smc.exe
LCD Monitor Repair - A Darker View
jkOnTheRun » Blog Archive Windows 7 Gains Mobile Broadband Support, Partners «
Secure your Visual Basic 6.0
Kirk Evans Blog : Free SharePoint Developer Resources
TechLeaders : Lost heads?
Marcelo"s WebLog : Gorgeous typography in Windows 7
Brendan on Windows Home Server : The most useful feature of Remote Desktop I nev...
Mike Ormond"s Blog : Twitter Script – Who’s following you (or not following you)...
Windows Embedded Standard (NT4e, XPe and beyond) : WES 2009 Tools on Win7
Mike Walker"s Ramblings about Industry Architecture : Massive P&P Compile of Res...
高橋 忍のブログ : Vista /7 の電源関連設定
From Mind To Words : HTTP COMPRESSION in IIS 6 and IIS 7 using Service Account
Chandru"s SharePoint / MCMS Blog ! : SharePoint Size !
60 CSS Tools to reduce your work load. | TheGermz.com
Stephen Kennedy"s musings on the Social Web : What is Twitter?
Nanda Lella"s WebLog : RSS feeds in IE not updating after upgrade from Vista to ...
W7 and Aircards : Windows 7 Hardware Compatibility : Windows 7 Beta : Microsoft ...
Tweak UI For Windows Vista : Ultimate Windows Tweaker From WinVistaClub
Windows 7 and EVDO Modems : EVDOinfo.com
GNUmed » Home
xstress :: xk0derz SMTP Stress Testing Tool
ShmooCon 2009: Chris Paget’s RFID cloning talk - Hack a Day
Ahh, The Ease of Introducing Global Routing Instability | Security to the Core |...
Jailer
SourceForge.net: ccma
Whatever I think of that deserves being posted: Bash Tricks I: (very) Repetitive...
More Fun With SSH
Get Help - DoIT - Stony Brook University
The Tao Of Backup
Aaron Stebner"s WebLog : Unified .NET Framework Troubleshooting Guide
The Linux and Unix Menagerie: The Absorption Of Knowledge In the Computer Age: T...
GutenMark, a Project Gutenberg markup program
Windows 7 Beta : Microsoft TechNet Forums
Active Directory Blog : Gauging Size Differences in AD Databases
Save Money with Regular Home Maintenance ∞ Get Rich Slowly
Open Source Business Resource
Free E2AF Cheat Sheet
Real world problems; Real world solutions : Debugging sSL handshake failure usin...
Alik Levin"s : What Do Solution Architect And Enterprise Architect Do?
Akshay"s Weblog : Custom adm file to enable an IE setting through Group Policy
Dougs Blog... Exchange Server daily : Blackberry without BES?
Windows Online Readiness Kit
CustomGuide - Free Computer Training Quick References, Cheat Sheets
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Certi...
The blog of Rob Margel : Quick Reference Cards for Vista and XP
Real world problems; Real world solutions : installing & configuring debuggi...
monitoring hardware through vmware esxi and nagios | Ubergeek Technical Howtos"
About | Scan Tailor
Nightwing by: Lugro-mesh
Merb Mind Maps - O"Reilly Broadcast
PCI Compliance - Is it important to you that Notes & Domino play nice in this sp...
Waterfall Digital Photography
Free Podcast Interview on Collaboration Tools and Technologies : Lawyer"s Guide ...
CSS SQL Server Engineers : SQLIOSim: Default Testing Pattern
Canberra PFE : Checking the RID Pool
Active Directory Maximum Limits
WER Services : Kernel dump storage and clean up behavior in Windows 7
SharePoint Javascript Utilities - Home
Suresh"s Weblog : Windows 7 Task bar Download Status
Microsoft SharePoint Team Blog : Analyzing Microsoft SharePoint Products and Tec...
bluemind : Windows 7 Benchmarking
Real world problems; Real world solutions : Using Microsoft network monitor to t...
Microsoft on ISVs : Understanding Microsoft Virtualization Solutions from Micros...
Inside Office Online blog : Most popular time savers, starting with two from Exc...
VolkerW"s WebLog : Windows 7 and Server 2008 R2 Application Quality Cookbook
Manifesto for Agile Software Development
50 seriously useful Windows 7 tips | News | TechRadar UK
Action plans and problem solving : How to manage SQL Server 2008 by creating and...
Aaron Stebner"s WebLog : How to perform a silent repair and uninstall of the .NE...
Wi-viz: Wireless network environment visualization by Nathan True
Lotus Notes 8.5 version to version comparison
HDTV Antenna Selection Guide, Reviews and Information
Sweet home 3D interior home designer – design your home without architects | Det...
401(k) Failures: Over Last 20 Years, The Average Investor Did Worse Than Cash » ...
S-Corporations vs. LLC: Income Tax Savings Benefits » My Money Blog
Business Opportunities Weblog | Tweak Your Brain With Colors
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Awarding a medal?
TSM Monitor
MVU CareerForward - Take the Challenge
Download details: ADTD
Catalyst Switched Port Analyzer (SPAN) Configuration Example - Cisco Systems
The blog of Rob Margel : The English Language
Bill Lin"s Blog : DOS Command Script: Use Date/Time in File Names
Health & Education Technology Specialist : The architecture journal publishes gu...
Photography 101.5 - Aperture
diskus - Tools - Scylla and Charybdis
Change Log Manager
Extreme Surface Mount Soldering
Gray Hoverman Antenna build
The Gray-Hoverman Antenna For UHF Television Reception - Digital Home Canada
jkOnTheRun » Blog Archive Customize the Windows 7 “Send To” Menu Option «
OpenedFilesView - View opened/locked files in your system (sharing violation iss...
Piqqem | See how the crowd rates your favorite stocks.
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
How to Calculate the Volatility of Options
trapkit.de - ScoopyNG
Raible Designs | How To Setup Your Own Software Development Company
Easy Payroll for Small Business - Online Payroll Service
svchost viewer - Home
CK - Common Knowledge: to be shared and developed by all - ERP
Tidydoc : documentation organizer - Summary [Savannah]
BleachBit - file and privacy cleaner for Linux
PIE - Property Investment Evaluation
safecopy
SourceForge.net: SquidModel
How to manually add missing podcast episodes so they show up correctly in iTunes...
Doug"s AppleScripts for iTunes ♫ Welcome
Facebook Security | Facebook
PXE Manager
freshmeat.net: Project details for Silktree
Using system rescue CD to scan and delete virus in Windows | Learning On Demand
Great idea if the Hard drive isnt encrypted.
HOWTO: Wii remote in Ubuntu 8.04 - Ubuntu Forums
Cheese
Real Geeks do Peer Clouding - Linux Today Blog
TinyCA
Energy Information
Network Diagram Software
-:: Billy the Kids - Cisco SNMP Tools ::-
DailyTech - Updated: Windows 7 Editions Compared, With Table of Features
How to troubleshoot common Windows Update, Microsoft Update, and Windows Server ...
Finding Information on the Internet: A TUTORIAL - Table of Contents
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
IEEE Spectrum Online: Technology, Engineering, and Science News
Antennapoint.com - Antenna Locator
Marginal Revolution: Japanese cooperation
"technique of cooperation"
Windows 7 versus Linux on netbooks
Neil Hutson - Windows Server 2008, Visual Studio 2008 and .NET 3.5 for developer...
Tribal Knowledge in Software Logistics : Windows Installer 4.5 in Vista SP2 and ...
Virtual PC Guy"s WebLog : Fixed Disks vs. Physical Disks
Blog do Ezequiel : SQL Server 2005 and 2008 System Views Posters
Satisfy Me : Curious about the next Microsoft Windows 7 beta or release date?
US ISV Developer Evangelism Team : Learn About Windows 7 Deployment, Management ...
Useful IIS/ASP.NET Information provided by Microsoft Support Teams : Where is AS...
Microsoft SQL Server Tips & Tricks : How to reapply SQL 2000 SP4 to update all t...
Visual Studio Team System : PsTFS et Bowie : 2 addins pour Team Foundation Serve...
Teaching Ideas and Resources : Personalising learning - Enquiring Minds
James O"Neill"s blog : Managing Windows Update with PowerShell
Joe Sack"s SQL Server WebLog : MERGE Syntax - SQL Server 2008 Transact-SQL Recip...
Note to Fannie Mae: Dealing with Logic Bombs « noFUD - No Fear Uncertainty or Do...
In search of simplicity, quality and tranquility in software engineering : TeamR...
Hans VB"s WebLog : Windows 7 Ecosystem readiness program
Andrew Coates ::: MSFT : Ramp yourself up with Ramp Up
WesleyB"s Blog : Microsoft SQL Server 2008 Books Online - January 2009 Update
Computer Science Teacher - Thoughts and Information from Alfred Thompson : Explo...
Microsoft Office Project 2007 : Project Server + PerformancePoint Server
granth"s blog : Announcing TFS Performance Report Pack
TechLeaders : Change Management
Hanz Blog : How to fix the error when restarting Windows SharePoint Services Sea...
SQL Server Samples : The transition to community based development
Public Sector Developer Weblog : .NET Time Tunnel
Canadian ISV Evangelism Team : Windows 7 Resources
Terminal Services Team Blog : The Windows Server 2008 Terminal Services Resource...
Mike Swanson"s Blog : My Windows 7 Beta 1 Experience
Carpe Datum : Server Consolidation Done Right
Green IT Business Solutions - Green IT Solutions | Microsoft
Fix it for me blog
John R. Durant"s WebLog : Office 2007 (and beyond) Developer Resources: Looking ...
Chris Hopkins" Visilog : Source for Visio Toolbox add-ins released
TBD : Re-Thinking the way we do business in Japan
Virtual PC Guy"s WebLog : Mounting VHDs with Windows 7
Vance Morrison"s Weblog : MeasureIt Update: Tool for doing MicroBenchmarks for ....
Windows(R) Image to Virtual Hard Disk (WIM2VHD) Converter - Home
Christophe Fiessinger"s Blog : SharePoint Diagnostics Tool v1.0 for SharePoint P...
PHPBB Password Analysis - Hacked Off - Dark Reading
istartedsomething
CVE - Common Vulnerabilities and Exposures (CVE)
organic fertilizer: writing event log entries with powershell
Script Repository: Windows Update
The Business Justification for Data Security- Version 1.0 | securosis.com
Mooney"s BES Policy Recommendations
100 Powerful Web Tools to Organize Your Thoughts and Ideas | Online College Blog...
Nikon unveils Fabre Photo EX DSLR-based stereoscopic microscope - Engadget
How to build a powerful distributed computer | News | TechRadar UK
How to Be Faster at the Linux Command Line | HACKTUX
Speed up your Web pages
How to Report and Identify Phishing, E-mail Scams and Bogus IRS Web Sites
Metropolis - Japan"s Number 1 English Magazine
Global recession - where did all the money go? | Business | guardian.co.uk
Best articled Ive seen on this whole mess. mv=pq
EEE PC - The unofficial blog about Asus Eee PC
How To Practice Law Like Abraham Lincoln - Be an e-Discovery Lawyer! « e-Discove...
DNS.NET
DomainKeys Identified Mail (DKIM)
zsu - update serial numbers in DNS zone files - search.cpan.org
NHK WORLD English
Microsoft Access forum, articles, and directory. More than 200,000 Access relate...
Silent noise | - about spam, trojans and other nasty stuff
Capivara - Java FileSync
Twinkle - SIP softphone for Linux
dissy - Google Code
Back In Time | le-Web.org
Lotus Notes: Lotus Notes keyword shortcuts
Domiclipse :: Repton Plugin
GregAshbaugh.com » Blog Archive » How to Remotely Reboot Windows Server
Reboot a hung vertex server
Passport RFIDs cloned wholesale by $250 eBay auction spree • The Register
NearlyFreeSpeech.NET Web Hosting
Nutrient Data : Home
BTR - Break Thru Radio
YouTube - dropoutproductions"s Channel
Patrick Barkham talks to author Peter F Hamilton on life in the 34th-century | B...
"If you"ve enjoyed Battlestar Galactica, you should love my stuff,"
SearchServerVirtualization Blog - A SearchServerVirtualization.com blog
Creating virtual machine clones and templates without vCenter Server
FOSSwire
Recovering servers, virtual machines after power failure - SearchServerVirtualiz...
Love the list of server and applications.
Resolving VMware ESX problems without pulling the plug
JessWatts.com - If Want() Then Do()
VM Tips: VMC fails at 2% sysimage.fault.NfcConnectionFault - JessWatts.com - If ...
Investigating network devices and device settings as a cause of VMware Converter...
Ethics Resource Center: Celebrating 85 Years of Ethics Surveying and Research
Microsoft Dynamics CRM - The Danish blog : Proactive information - SQL Server Be...
Paul Andrew : SPDisposeCheck v1.3.1 is released
The Old New Thing : Games to play at your Battlestar Galactica watching party
Brad Smith"s blog : Don’t recycle the Application Pool for Central Admin site fo...
Running SAP Applications on SQL Server : SAP declares support for SQL Server 200...
Manage SQL Server Services from the Command Line
Monitor SQL Server Performance and Activity with Built-In Functions
Alice.org
Mike Walker"s Ramblings about Industry Architecture : Taking the Data Center to ...
Cyclops
Mike Ormond"s Blog : Updated Twitter PowerShell Script
Jump-Start Your Online Business with FairSoftware
How can companies that rely on technology consistently not pay for it? | Linux J...
Flying Solo, A How-to Guide for Turning Job Loss Into Opportunity
Wireless security - how secure is your data? « Tech Czar
M-Lab | Welcome to Measurement Lab
Use tools running on M-Lab to test your Internet connection. | M-Lab
Jeffrey Tastes
The case against Web apps |Fatal Exception | Neil McAllister | InfoWorld
Sriram"S: How to enable & disable USB ports
USB Glue: Super Endpoint Security Glue
A Nagios plugin for Sun hardware failure detection - Le Seb sur le Ouaibe
Project Galaxies - Full Project Gallery and History - Page 10 - NetworkIsDown
Motion Mountain - The Adventure of Physics : The Free Physics Textbook
SourceForge.net: IPv6 CARE
SPF Query Tool
XPerience ClearBox Enterprise RADIUS Server
Non Free but interesting solution
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Rexiology@MSDN : Self-Signed Certificate and Outlook VSTO Add-in Silent Installa...
Steve Rowe"s Blog : Alan Kay on User Interface Design
Le Café Central de DeVa : Virtualize your Exchange 2007 SP1 environment?
OpenPsa - OpenPsa 2: OpenPsa 2 - Manage Your Consulting Business
The MSDN Australia Blog : Get along to the new SQL User group in Sydney CBD focu...
Breakdown of the roles for managing MSSQL server
Is This Thing On? : Upgrading from SQL Server 2000 / 2005 to SQL Server 2008
 Continuous Data Protection (CDP), Linux Disaster Recovery, Server Backups for L...
No free but interesting
Japan for Sustainability
The SysAdmin Ten Commandments | HACKTUX
My Seagate hard drives are safe now | Steve Maller Photography
Fresh Wasabi - How to Prepare Real Wasabi Root Video - About.com
LS09Blackberry.pdf (application/pdf Object)
IBM - Download the Domino Attachment and Object Service Estimator tool
IBM - Domino Configuration Tuner (DCT) provides easy-to-use self-service configu...
Technical Services News - Cisco Systems
Cisco Support Wiki
WINOLJ-OOW2.0C
A Technological @mosphere
AKB 45023: Remote Altiris Agent Diagnostics
Secure BIND Template v6.6 23 DEC 2008 Rob Thomas noc@cymru.com
The Protocol Informatics Project
Online Backup: Multi-Platform, Multi-Computer | SpiderOak, Inc.
main: The Msgque Project
RefSense - Easy Access to PubMed
SnapCRM - Open Source CRM
PDFjam-README.html
Cloning Linux Systems With CloneZilla Server Edition (CloneZilla SE) | HowtoForg...
The Twitter Value Paradox - O"Reilly Broadcast
Auto Repair Price Estimates | Auto Shop and Mechanic Ratings : RepairPal
80% of Computer LOHAS: Virus-Free Life on a USB Key - Chao-Kuei"s Notes | 資訊.人.權...
Harry Seldon"s blog : Some useful commands in Linux administration when making a...
Jason Winters" Pico-Projects: Real-time Web Based Power Charting
The DomainPatrol Blog
AskDba.org Weblog
OTN Discussion Forums : Forum Home
Browser Test
Lotus/IBM: Domino - Domino Server shutdown automation
Welcome | Matroska
cloudvpn :: exa
SourceForge.net: ccma - Project Web Hosting - Open Source Software
Find "Em All
Play it slowly — 29a.ch - Jonas Wagner"s Blog
Lilith
TCP Banner
Public Radio Tuner
Guide: Windows 7 x64 Build 7000 on a Macbook Pro | Coffeestops!
The blog of Rob Margel : Detox your PC: Making your PC run smoothly
Vincent Belllet"s Blog [MSFT] - EN : Windows 7 : my first feelings with the beta...
Ron Jacobs : Windows 7 Beta 1 Installation Tip
Develop a Complete WMI Inventory Tool in Windows PowerShell
MSDN Virtual Labs
Windows 7 Developer Guide - Home
TechLeaders : Manage by Results - Managing remote employees part 5
Microsoft SharePoint Team Blog : How to create a SharePoint slipstream using the...
Chris Jackson"s Semantic Consonance : Helpdesk Elevation on Windows Vista and Wi...
Download details: Ultrasound - Monitoring and Troubleshooting Tool for File Repl...
Microsoft on ISVs : Welcome to Windows 7
Microsoft Certified Professional Magazine Online | Feature Article: File Replica...
Windows XP Utilities
Vibro.NET : Roles? Those are claiiiiiims!
Jennifer Marsman : My Favorite Feature in Windows 7
Clausl"s Dynamics NAV Blog : Using SQL Server 2008 Express
Varun Dhawan"s Blog : Benefits of Backup Compression - Faster BACKUP / RECOVERY
Satisfy Me : Your questions: what do I like about Windows 7? The Taskbar, saving...
SharePoint Site Configurator Feature - Home
Christophe Fiessinger"s Blog : Inventory of SQL Databases in a Typical Project S...
Microsoft Excel : Printing Envelopes Using Excel and Word
Performance and Capacity Planning Resource Center for Microsoft Office SharePoin...
Microsoft Dynamics CRM Team Blog : Tips for faster and better performance on Mic...
Action plans and problem solving : SQL Server Replication performance and Networ...
Back To Basics: Memory allocation, a walk down the history
Ian Palangio"s Business Productivity : 10 Ways Microsoft Office 2007 Can Save Co...
TJ-RAV : Swapping the disks (for example RAID 5 to RAID 1) using ClusterRecovery...
Tim Sneath : The Bumper List of Windows 7 Secrets
Sujit"s .NET and Windows Ramblings : Windows 7 Beta on a Mac Mini
Nick MacKechnie : Malicious Software Removal Tool removes Win32/Conficker.B
Ultimate List of Free Windows Software from Microsoft - Windows Live
A Short History of the Billable Hour and the Consequences of Its Tyranny : Law P...
Photojojo » Sensor Dust Is Evil. Here’s How to Banish It.
TechnoEsq » PDF Redaction Made Easy
Legal Technology - Five Tips for IT to Survive the Plunge
How to Write a Resume That Will Land an Interview | Dumb Little Man
overview [LBackup]
JBCobb.net » Post Topic » EZRip is dead! Long live DVD Metabase…
SylinkWatcher and SylinkMonitor - tools for real-time debugging of SPA 5.x and S...
Updating Symantec AntiVirus Corporate Edition virus definitions without using Li...
httpry
Around SAP Consultant
Sort IP Addresses with GNU sort
Profiling the Power Usage of a Desktop PC [LWN.net]
Create an Encrypted Samba Share | BeginLinux
Mastering SSH: Connecting, Executing Remote Commands and Using Authorized Keys
17 Telecommuting Pet Peeves - CIO.com - Business Technology Leadership
SourceForge.net: Unattended GUI and managment system
IBM developerWorks: Wikis - PowerVM wiki - lpar2rrd tool
Gnome Chemistry Utils
logdistiller - Overview
freshmeat.net: Project details for raidrec
superpodder - Google Code
storeBackup - Summary [Savannah]
PBS Helpdesk Start
Famous Awk One-Liners Explained, Part I - good coders code, great reuse
Famous Awk One-Liners Explained, Part II - good coders code, great reuse
Famous Awk One-Liners Explained, Part III - good coders code, great reuse
The great window manager speed test.
Tools to delete files securely in ubuntu Linux -- Ubuntu Geek
Computing Tech: What Is SMB?
The Linux and Unix Menagerie: Understanding Perl Variable References On Linux An...
Help For Linux: 5 GIMP Tricks Everyone Should Know!
Graphics from the command line
Setting Up A High-Availability Load Balancer With HAProxy/Wackamole/Spread On De...
Net Direct :: Open Solutions
Learning Haskell - O"Reilly Broadcast
Win Server 2008 Directory Services, Active Directory Snapshots
NetWrix Christmas Gifts: Freeware Tools! Report on AD Changes, Track Inactive Us...
p2vd.com - a virtualization and server consolidation blog
Visio Guy
eee Mac journey
Ecofont | less is more
squidstats - Google Code
:: Cybertelecom ::
Download details: The Services and Service Accounts Security Planning Guide
Nagios single sign-on authentication with Active Directory | ITeF!x
AWC - Aviation Weather Center
Turbulence Forecast - Air turbulence maps and forecasts
FlightTrack - Live international airline flight tracker and real-time flight map...
iFreeBudget
Home
I dont know what this is yet. It looks like some weird Hybrid
pdfposter | Pdfposter
SymmetricDS - SymmetricDS
MyIpTrack - Keep track of your used IP addresses
urlwatch - a tool for monitoring webpages for updates (thpinfo.com)
sshguard - protect from brute force attacks against ssh
UPnP-Inspector - Coherence - a DLNA/UPnP Framework for the Digital Living - Trac
How to use ADPlus to troubleshoot "hangs" and "crashes"
LepoLand - A Blog by Alan Lepofsky - Alan"s blog about software, technology, tra...
The World Question Center 2009
IBM - Running nlnotes.exe in the Domino directory while the Domino server is run...
Stanford School of Engineering - Programming Methodology
Apple iPod Touch - News, Views, Reviews, Accessories, Rumors & more
Vista Forums
Esoteric : SQL Server 2000 / 2005 Failover Cluster Pre-installation Checklist
Internals Viewer for SQL Server - Home
Steve Clayton: Geek In Disguise : Cut Out and Keep Guide to Web 2.0
Building A Web Application Security Program: Part 7, Secure Operations | securos...
TechnoEsq » Electronic Signatures in Legal Documents
I’m an Organizing Junkie » Enjoying life one pile of clutter at a time
securosis.com
macminicolo: Mac Mini colocation | Time Capsule Colocation
How to make Juice 2.2 work in Windows Vista | Chris Pirillo
Via Randall Lind (who sent an email to Todd and myself earlier), here’s how to make Juice 2.2 work in Windows Vista:
Spore - Another Game Using SecuROM - GamingBOB.com
Front Seat - Software for Civic Life
gailvazoxlade.com
Esoteric : Howto: Have a Clustered instance of sql SERVER listen on multiple vir...
Windows to Unix With PuTTY and Xming
Team System: Streamline Team Projects With Process Templates
Inlab Software GmbH - RBridge - A Remote Ethernet Bridge for Linux
MSDN Magazine Homepage
Extensions for Windows - The Unofficial Windows Upgrade
Is This Thing On? : Reducing Data Center Cost with an Air Economizer
Session Destroyer: Automatic Webapp Session Invalidation | Linux Journal
SNAP-Ed Connection: Recipes Finder
How To Repair & Recover Data From Damaged CD’s Or DVD’s | MakeUseOf.com
From Mind To Words : Don’t see enough log in IIS logfiles.
www.hakin9.org - About the mag
the [non]billable hour: Ten Rules for Law Students
DBReplicator | Open Source Database Replication
howtos:lotus_domino_monitoring_using_snmp - Unixclinic
PSP Fanboy
PSP 411 - PlayStation Portable - Reviews, Games, Forum
Nagios Plugins from The Measurement Factory
Nagios Plugin Scripts for TLDmon | DNS-OARC
Terry Zink"s Anti-spam Blog : Cyberwarfare 101: Case Study of a Textbook Attack,...
Terry Zink"s Anti-spam Blog : Cyberwarfare 101: Case Study of a Textbook Attack,...
Notes from SQL Server Premier Field Engineer : Detecting volume/disk partition a...
Notes from SQL Server Premier Field Engineer : Acting on SQL Server errors
Dave Glover "Down Under (Oz)" : My ASUS Eee PC 1000H Netbook and Windows Vista E...
jamesgoulding.com home page
Free Language | Lessons, Podcasts, Courses, Audio, Video, Reviews, Articles, Stu...
aoiko.net - thing related to japan and japanese language
Notes.ini entries -- By Entry
The Taking Notes Podcast
How to properly perform a backup of Lotus Domino with Backup Exec 9.x and 10.x f...
How to perform a local installation of the Backup Exec Remote Agent for Windows ...
The NOC Project
SourceForge.net: hourglass » home
SvOlli"s EeePC hacks
CSS SQL Server Engineers : Using SQLIOSim to Diagnose SQL Server Reported Checks...
CSS SQL Server Engineers : How It Works: SQLIOSim - Checksums
Scott Bellware: Chief Engineer
Esoteric : SQL Server setup log locations and more
SQL Server Storage Engine : Managing TempDB in SQL Server
J.D. Meier"s Blog : Know Your learning Styles
Nice things inside SQL Server : SQL Change Tracking in SQL Server 2008
Using Repadmin.exe to troubleshoot Active Directory replication
IP SLA Monitoring - CT3
HumanLight Home
The Setspn.exe tool incorrectly adds the dollar sign to the host name when you r...
The Power of the Lotusphere Community
GonzoWiki » StartPage
Kroll’s Report and Analysis of the Most Significant e-Discovery Cases in 2008 « ...
Free Utilities from SystemTools Software
nginx
Active Directory Replication Troubleshooting Part 3 - Event Id: 1265 Access Deni...
Active Directory Replication
Error Message "Target Principal Name is Incorrect" When Manually Replicating Dat...
GameFAQs: SimCity 4 (PC) FAQ by thy451
SimCity 4/Walkthrough — StrategyWiki, the free strategy guide and walkthrough wi...
Dana Duncan Photography
Rebel 13"s Sim City Site
SC4EVER.COM"s SimCity 4 Resource Center - Welcome!
TechLeaders : Managing Remote Employees - Part 2
Beth Massi - Sharing the goodness that is VB : Attaching a Local SQL Express Dat...
TechLeaders : How to Manage Remote Employees - Part 1
Anthony Bloesch"s Web Log : SQL Server fragmentation
Habitat ReStores -- Habitat for Humanity Int"l
Resplendence Software - WhoCrashed, automatic crash dump analyzer
Lawyers USA
The Mortgage Professor"s Website
About JRB Software
Phreaking, Caller ID Hacking - Welcome to artofhacking.com!
UNetbootin - Homepage and Downloads
Hot Tips
VMware Communities: ESX_SRRSecure - Script to allow ESX to ...
BarracudaCentral.org - Technical Insight for Security Pros
Ode to eBay « Fractal Folds
resign via poetry, it is, umm, poetic?
Catbird Compliance Enforcer
Bucaro TecHelp Articles : Finding a Job : Job Interview Tips From a Corporate In...
odd site.
Lack of policy adds to e-discovery cost and complexity - Network World
How to track database growth across multiple SQL Server instances
Secure File Transfer - Large File Transfer - Enterprise File Transfer - Accellio...
SharePod
Download details: SQL Server 2005 Books Online (December 2008)
Complemento. Collection of tools.
The Information Technology & Innovation Foundation
The Blog of Ben Rockwood
Ten Common Database Design Mistakes
Brad"s Sure DBA Checklist
Macsimum News - Portables Fast Start: The new user’s guide to Apple notebooks
Concern Worldwide
Stack Overflow
Open Text Summarizer
Law Firm IT
How to Turn Your PSP into a Wireless Digital Photo Frame | Chris Pirillo
Closet Organizers by EasyClosets. Buy Custom Closets Direct Online.
Zibu
HIMSS (Healthcare Information and Management Systems Society)
Healthcare IT News
Limit the size of incoming email attachments to a Lotus Domino server
Limiting Attachment or Email Size - BlackBerryForums.com : Your Number One Black...
Mario Kart Wii Walkthrough - IGN FAQs
mailertable test script
Instructables - Make, How To, and DIY
Sprites mods - Welcome - Welcome!
Ruby for systems administrators
ImagineFX | Home
CYBSEC Security Systems - SAP Security
CYBSEC Security Systems - sapyto
LinuxPlanet - Tutorials - Understanding Tunneling: Hiding Packets In Plain Sight...
EasyLinuxCDs.com » Ubuntu Training Index
Nipper - The Network Infrastructure Parser
PHILLIPS MICROTECHNOLOGY, INC. (ENG)
Security Configuration Guides
Magic Tricks With the Sysreq Key
TestLink - open source Test management
The ELOG Home Page
Get to know your logging options in the Cisco IOS
What is UPR?
Rackwise - Take control of your IT Infrastructure Documentation with Microsoft V...
HVAC-Talk: Heating, Air & Refrigeration Discussion - Powered by vBulletin
South Park Studios
How to make a disallowed-by-default Software Restriction Policy
Ask The Admin » Blog Archive » Guerrilla Event Log archiving: why and how.
Shadowserver Foundation - Main - HomePage
ILTA
The Blawg 100 | ABA Journal - Law News Now
AuditNet SAP Audit Resources
The ORIGINAL HIPAA Training Resource, HIPAA Experts, HIPAA Compliance
davidwatson.org: Asus X83VB-X1 Running Linux 64-bit Kubuntu Intrepid Ibex 8.10
Strawberry Perl
Warranty Validation
wraprancid
Series of DNS Cleanup Scripts | en Passant
Script to Find DNS Server settings - PART I - please check article at MS web for...
dailywireless.org » FiOS: Too Risky?
Jase"s Place: Go Daddy Wildcard Certificate with VI3
Suspect a Performance Problem? Just Call Your PAL | Symantec Juice
Jimmy May, Aspiring Geek: SQL Server Performance, Best Practices, Productivity, ...
Economic Indicators.gov
Underwriters Laboratories Inc.
Download details: 2007 Microsoft Office System Migration Guidance: Microsoft Off...
Awethumb - Unleash the Power of your PDA
Confused by WEP, WPA, TKIP, AES & Other Wireless Security Acronyms? | Darknet - ...
Action plans and problem solving : Windows, SQL Server and the Antivirus don"t g...
Legally Minded - Legal Professionals. Your Community. Your Network.
10 Things You Should Never Write in an E-Mail or Instant Message - CIO - Blogs a...
KeePassX - The Official KeePassX Homepage
jPdf Tweak - Swiss Army Knife for PDF files
JCrypTool
Areca Backup - Home
Remote BHO Scanner: Detecting malware on corporate networks
RedNotebook « digitaldump
E.W.Dijkstra Archive: Home page
Gardeners Supply Company - Garden Supplies, Tools, and Gardening Tips
Interesting Things for ESL/EFL Students (Fun English Study)
The Spamhaus Project - DROP
Katakana - Japan Reference
The OakTable Network: Main
TrendLabs | Malware Blog - by Trend Micro
Oracle DBA Forum, Articles, FAQs, Scripts, OCP Test Papers, Free Blog, DBA Train...
Oramon: Free Oracle Database Monitoring Tool
Carlos’ Corner
MOSSy Business : The Minimal Full-Deployment Infrastructure
Developing for Dynamics GP : Useful SQL Scripts Series
Twitter Grader Badge | Show Off Your Twitter Grade
Silverlight Spy : First Floor
Media And Microcode : Microcode: PowerShell Scripting Tricks: More Joy of Hashta...
Eqonomize! - easy and efficient bookkeeping
Twenty Rules for Amazon Cloud Security - O"Reilly Broadcast
Installing Squid Cache for Windows | Markus Blog
| The Public Domain |
Language Codes - Sorted by Locale
http://msinetpub.vo.llnwd.net/d1/keithcombs/downloads/Add_Users_and_OUs.txt
FireCAT 1.4 : Firefox Catalog of Auditing exTensions
:: Online Monitor test - Your free online TV and monitor test tool - By vanity.d...
SysAdminHell
Virtual PC Guy"s WebLog : The Domain Controller Dilemma
Computer Science Unplugged
Top 60 popular Japanese words/phrases of 2008 ::: Pink Tentacle
10 Tips for More Effective PowerPoint Presentations - Stepcase Lifehack
A Recovery Plan for a Superbad Superblock
Primecell Rechargeable Battery Service
Welcome to d-cubed
Linux.com :: TiddlyWiki derivatives help you get things done
StopDuplicates Copyright(c) Azzam ALNIJRES, Kaesar ALNIJRES
crunchyfrog - Google Code
Installing a Corporate Directory without using OTM / MAT - Nortel: Meridian syst...
IIS troubleshooting, administration, and concepts.
Typealyzer
mylvmbackup
Highly Secure Online Password Keeper
start - Etherboot/gPXE Wiki
The Suretec Blog
Waterloo Community Gardens
TaoSecurity: Digital Asset Scorecards
Print - Demystifying SQL Server Virtualization
Ask H&FJ | Hoefler & Frere-Jones
Pumpkin Pudding ♥ | A Veggie Venture
Red Ramekin: Simple Pumpkin Soup
notify.me - Stay update on the information that matters
Slife Labs, LLC
MS Deploy - Microsoft"s new tool for deploying web sites - InstallSite Blog
The Linux and Unix Menagerie: Bash Cable, Dish and Local TV Listings Script For ...
Kernel oops bugcount
LinuxPlanet - Tips - Tip: Simple Regular Expressions For Reviewing Log Files - C...
Mobius Forensic Toolkit - Summary [Savannah]
slurchin - Google Code
Download details: Active Directory Migration Tool v3.0
PaulDotCom: Archives
perl.com: Automated GUI Testing
Linux.com :: Speed up your Internet access using Squid"s refresh patterns
ProPublica - Journalism in the Public Interest
ike-scan
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
New York Songlines: Virtual Walking Tours of Manhattan Streets
Home
The Japanese Slang Jiko
Language exchange SNS Lang-8
Culture at Work: Home Page
Network Documentation Policy
AIChE Home Page
Linux.com :: Discovering your network with Netdisco
e-Volve Gadget Shoulder Holsters
The Official Site of Game Key Revealer and SoftKey Revealer - SoftKey Revealer
Blog : Brian Desmond"s Blog
Free Online Barcode Generator
The SWIPE Toolkit
Compare My VM
What a Lovely Name, The perfect name for your baby.
PacketLife.net
Agilefant - The Finnish Ferrari for backlog management for the price of a Linux ...
LAMS Foundation
The 1352 Report
Frink
ora2html
Japanwoodworker - Home - The Japan Woodworker Catalog
Microsoft License Advisor
Windows Performance Tools Kit, v.4.1.1 (QFE)
Swingbench
Oracle ORION Downloads
Xirrus: Switching Without Wires - Advanced IT Wi-Fi Networking Tools
Overview of the Microsoft Configuration Capture Utility (MPS_REPORTS)
Glassdoor.com - Company Salaries and Reviews
Welcome to DeepDyve
The Elements of Style
Workstir | Mixing up the marketplace.
Best Buy sheds lost revenue tears, shares holiday fears • Channel Register
"Adjusting" in the biz is usually code for "firing" and "closing"
Main Page - DigitalNomadWhitepaper
Digital Nomad
Welcome to the Society for Technical Communication
ShadowExplorer.com - About
archivemail – a tool for archiving and compressing old email
TechSoup - The Technology Place for Nonprofits
Pantry, command-line nutrient analysis
The Observatory
c0t0d0s0.org
Welcome to CAcert.org
Green Seal
"Green" Hotels Association
Privacy Rights Clearinghouse--privacyrights.org
TravelSmith Travel Clothing, Travel Accessories, and Luggage from TravelSmith Ou...
Radiology Workflow Solutions | RIS PACS | eFilm Workstation | North America | Me...
The Phoenix System for MapReduce Programming
TypeLogic Home Page
Adrian Cockcroft"s Blog
Management by Matrices
IDEAS: Economics and Finance Research
Changing minds and persuasion -- How we change what others think, believe, feel ...
EconPort - Home
Behavioural Finance
The Psychology of Security
dokuwiki [DokuWiki]
http://www.isc.org/sw/bind/docs/dnssec.html
DNSSEC - DNS Security Extensions
Inventory Solution 7.0 Database Schema – Part 1: Operating System Inventory | Sy...
IBM LOTUS ADVISOR -- The Advisor Guide to IBM Lotus Notes, Lotus Domino, Lotus S...
TaoSecurity: Marcus Ranum on Network Security
PSS SQL Server Engineers : Cumulative Update 1 to the RML Utilities for Microsof...
5 Windows tools to remove damaged antivirus programs - Download Squad
Sounds of hard drives needing data recovery - Datacent
MidpSSH | SSH and Telnet client for Mobile devices (MIDP/J2ME)
pmooney.net :: Links / Resources
How to Integrate windows Active Directory and Samba in Ubuntu -- Ubuntu Geek
Microsoft Windows Silent Adhoc Network Advertisement
Enterprise 2.0 Conference: Intellipedia Briefing
OSS Simple Sabotage Manual
A Secure Nagios Server - The Community"s Center for Security
Nagios Business Process AddOns
syonex: Resources
Main Page - NagiosWiki
NagiosForge
The Power of Writing Things Down | Dumb Little Man
Forensics for Handheld Devices
School of Everything | Where Teachers And Students Find Each Other
EduBubble — A site about the book: Beating the College Bubble
securixlive.com :: securix-nsm :: main
BlackBerry Enterprise Server (BES) Compatibility Matrix Download (PDF) | BlackBe...
http://na.blackberry.com/eng/support/software/BES%20-%20DOMINO%20ver%20Oct%2008.pdf
Official Google Mobile Blog
SAGE System Administrators" Code of Ethics
J! Research: A Joomla! Research Management Solution | J! Research
ns4 - Configuration Management Tool - Home
RRDtool - About RRDtool
SparkFun Electronics - News - 2008.11.09
Main Page - Test Anything Protocol
Notes/Tasks
Linux.com :: Automated processing tools for better digital pictures
Trinity Rescue Kit | CPR for your computer
USBDeview - View all installed/connected USB devices on your system
Emergency Management Institute - FEMA Independent Study Program
ICS eTool: Home
The SysAdmin Group - The SysAdmin-BodyOfKnowledge
IVT BlueSoleil
FrOSCon: Home
Configure SSH Access to Cisco Switch and Routers - Associated Content
How To Copy a System Image from One Device to Another - Cisco Systems
mysfitt.net :: Log Minion
Shell scripting: Write message to a syslog / log file
DataCenter Diagram
visualcomplexity.com | A visual exploration on mapping complex networks
netdisco-install-english
Linux.com :: Discovering your network with Netdisco
Netdisco Install Scripts
Bob and the Knowledge Factory / Analyze small memory dump files in Windows 2003
Creating PDF Test-Files « Didier Stevens
League of Professional System Administrators |
San Diego Supercomputer Center
Managing Windows with CFEngine and Perl
Automating Network Administration, Part One | O"Reilly Media
Human Factors Considerations for Passwords and Other User Identification Techniq...
Speeding Up DNS Access In Regions With Very Low Infrastructure | HowtoForge - Li...
Using IPv6 On Debian Etch | HowtoForge - Linux Howtos and Tutorials
5 Things Every Good Linux Administrator Knows
3 More Things Every Good Linux Adminstrator Knows
Linux.com :: Linux print server enhances library printing
Relational Database Technology: A Crash Course - O"Reilly FYI Blog
Open Clip Art Library Drawing Together
Public Domain Clipart optimized for word processors
Clipart Gallery - OpenOffice
Certificate revocation list - Wikipedia, the free encyclopedia
Welcome to Matt"s Web Pages!
VNCcrack
STAsoft.net - webservices and outsourcing for you
Brain Workshop - a Dual N-Back game
SourceForge.net: etch » Introduction
Pining for the Fjords
Ben"s search engine and US postal zip code guide
Articles Index - Home Improvement Articles - Super Home Center
NFS: Overview and Gotchas
LIGO - Laser Interferometer Gravitational Wave Observatory
The Backup Blog: Free Avamar for VMware
Twuffer - Schedule Twitter tweets.
wissel.net :: Domino Server and Domino System Template Versions
Learning to Code Properly | Fri 7 Nov 2008 | Blog | CodeStore
CoRD: Remote Desktop for Mac OS X
Generating New Ideas « .:: computer geek’s diary ::.
Slipstream Microsoft Office 2003 SP3 into Microsoft Office 2003 CD « Be your own...
Make Time with Action Programs « .:: computer geek’s diary ::.
Using UrlScan : Configuring Security : Installing and Configuring IIS 7.0 : The ...
Microsoft Assessment and Planning Toolkit
Vipul Shah"s SQL Blogs : Understanding Perfmon Counters while troubleshooting SQ...
Performance counters
Performance Monitoring - Basic Counters - SQL Server Central
Understanding SQL Server Performance Counters - ExtremeExperts
Greg Miller"s Guide to Lock Picking for Beginners
Access Control: Understanding Windows File And Registry Permissions
9 Useful Sites For Finding People To Follow On Twitter | MakeUseOf.com
KMWorld.com: Records management: BEWARE, PREPARE
Gavin Bollard - Computing and Lotus Domino: How to Retain more than a few Blackb...
World War II Story -  Third Army - Europe - by Robert F. Gallagher
Chapters In Web Security: MultiInjector released - automatic parallel website In...
Altiris Notification Server 6 SP3 - Security Vulnerabilities | Symantec Juice
nSynergy International Pty Ltd
the electric sheep screen-saver
BlackBerryNews.com
BlackBerry Expert Support Center
Kilala.nl - Home of Thomas Sluyter and Marlijne Stek
Main Page - Nagios Wiki
SpyFu
TimeVault - Ubuntu Wiki
Open ...
What Anti-Virus scanning exclusions should be considered for system and servers?...
Multiple symptoms occur if an antivirus scan occurs while the Wsusscan.cab file ...
Virus scanning recommendations for computers that are running Windows Server 200...
Managing Comain Controllers: Active Directory
Up and down scripts for wwwoffle
WWWOFFLE Homepage
Lukas Beeler’s IT Blog
Printers and Network Printing
HP"s History Of Printer Command Language (PCL)
How to use Tor to audit networks :: SearchSecurity.com.au
Infrastructures.Org: Best Practices in Automated Systems Administration and Infr...
Brage - CM Home
Linux
Medibuntu :: Multimedia, Entertainment & Distractions In Ubuntu
http://www.dawnstar.com.au/wpshelp/basics.html
Install all Acrobat 8 patches in one step with Adobe Bootstrapper and patch sequ...
VMware Infrastructure Management Assistent (VIMA)
PocketSOAP
IP Organizer
Photojojo » Photojojo’s Ultimate Guide to Taking Portraits at Night
Microsoft Advanced Windows Debugging and Troubleshooting
LinuxPlanet - Tips - Bash Tips: Speedy Keyboard Shortcuts - Speedy Bash Shortcut...
UBCD for Windows
DbVisualizer - The Universal Database Tool
Using the Dell™ Driver Reset Tool
check_ad | ITeF!x
UTF-8 Cygwin
Dan Silva .org: How to use Lotus Symphony in English
What is 1033 « HowTo
Decode the product GUID for Acrobat or Adobe Reader (Windows)
MSIDIFF - Decompiles Windows Installer Databases (MSI, MSM etc)
MAKEMSI - Make MSI based installation files. Can automatically build new or upda...
Download details: SQL Server Database Publishing Wizard 1.1
IBM - Agents for updating Calendaring and Scheduling entries and Resource Reserv...
UPS: WorldShip
Enterprise Search from Microsoft
Free?
dpkg-diff openDesktop.org
UnusedPkg CLI-Apps.org
daptup openDesktop.org
Ubucleaner openDesktop.org
APT utility openDesktop.org
SecuriTeam - SSHFuZZ - Perl Based SSH Fuzzer
Common threads: Sed by example, Part 2
the [non]billable hour
Law Firm Web Strategy :
The eDiscovery Paradigm Shift: Electronic Data Discovery Workflow and Best Pract...
Linux.com :: Secrets for controlling VirtualBox from the command line
bulletin_ndr.pdf (application/pdf Object)
esXpress
SourceForge.net: Nipper 0.10.3 Released
Configure SSH on your Cisco router
Practice Cisco router configuration using a free emulator | Network Administrato...
How to properly secure your Cisco router with passwords | Network Administrator ...
How to Configure a Cisco Router as a Terminal Server
Learn how PCI affects Cisco network configuration | Network Administrator | Tech...
Happy Router .com
vmprofessional
Tux Training » Blog Archive » How to make Ubuntu extremely fast
Stuff for your Windowmanager - Box-Look.org
Ten Tips for KDE 4.0 Beginners | Tombuntu
Find Open Source Alternatives to commercial software | Open Source Alternative -...
The Linux and Unix Menagerie: Linux/Unix Shell Script To Find Your Google Page R...
MailChannels | Anti-Spam Blog
Deployment Solution for Dell Servers Demo Videos | Symantec Juice
$ClaudioG.Blog = $True : Eseguire WSUS 3.0 Cleanup Manager via Powershell
Cutting with a Scalpel: IT Budget Planning in a Down Economy : VMblog.com - Virt...
The new IT mantra is both pragmatic and progressive: tangible benefits today, while laying the foundation for transformation tomorrow.
Sysprep Script for Automatic Deployment XP and Win2003 | Symantec Juice
Lazy Linux: 11 secrets for lazy cluster admins
TuxArena: 5 Simple APT Tricks for Debian and Ubuntu
ThreatExpert Blog
China Channel Firefox Add-on - Experience the censored Chinese internet at home!
The ipv6calc Homepage
Understand IPv6 Addresses
eDiscovery, Digital Evidence and Information Security Law - Info Tech Law On The...
FedEx Ship Manager Software - FedEx Ship Manager Download
Oracle Database Benchmark
Anti Malware - Comodo BOClean
ZIM - A Desktop Wiki / Note Taking App [Linux, Windows] | MakeUseOf.com
Which communication ports does the Symantec Policy Manager 5.x use?
Symantec Endpoint Protection 11.0 Frequently Asked Questions
How to Obtain the Dell/HP (May be other vendors) service tag in Debian -- Debian...
Dell Client Manager™ - Altiris, Inc.
Minefield Start Page
faster firefox
IBM - Notes/Domino background agent fails to send mail; Errors may occur in logs
Getting Drunk in First Class - Humorous Consulting Stories Published in Rightsiz...
Cheap Flights, Airfare, Airline Tickets, Cheap Travel
XSS-Proxy: A tool for realtime XSS hijacking and control
10 Awk Tips, Tricks and Pitfalls - good coders code, great reuse
Fairly good awk explanation.
mitsubishi.com Mitsubishi Companies
TaoSecurity: Windows Syslog Agents Plus Splunk
TweakXP.com - Access Stored User Names and Passwords with rundll32.exe
Sumatra PDF viewer by Krzysztof Kowalczyk
phpSchedule"Em | News
Running SAP Applications on SQL Server : Analyzing a HANGMAN log file, part 1
ACPI BIOS Guideline for Linux (PDF)
Best Cheap Eats - Best cheap restaurants around the world
Reggy - Home
Yet another reason why I need a Mac
Removing unwanted AutoPlay Handlers in Windows XP and Windows Vista
CDBurnerXP: Introduction and News
stealthpuppy / Aaron Parker’s IT infrastructure blog
[Open XML] PowerTools for Open XML installer , Julien Chable
Tasque - GNOME Live!
InstEd It! - InstEd - Make packaging more productive
Verbose Log Analyzer | Symantec Juice
VoIP Communications Management Specialists - Cypress Communications
Nortel: Meridian systems - i2004 VoIP - Securing the set config?
Linux on a Mikrotik 532a , Part 5 Final - OpenWRT and Custom Scripts | Adam"s Te...
Linux on a Mikrotik 532a, Part 4 - Customization, Debian Scripts, Shaping, Firew...
APNIC Box - Linux on a Mikrotik 532a, Part 3 - Installing Debian, Prebuilt Disk ...
APNIC Box - Linux on a Mikrotik 532a, Part 2 | Adam"s Tech Talk, Linux HOWTOs & ...
APNIC Box - Linux on a Mikrotik 532a, Part 1 | Adam"s Tech Talk, Linux HOWTOs & ...
Blog_ /
SoCRA The Society of Clinical Research Associates, Inc., is a non-profit, profes...
National Electrical Code
AKB 1859: Items to help improve Console and Server performance in Notification S...
AKB 18828: How can I do defrag database indexes on SQL 2000?
lm2ntcrack - Microsoft Windows NT Hash Cracker (MD4 -LM) | Darknet - The Darksid...
Core Configuration Console | Nullsession.com
Inquisitor hardware testing platform: About
Download details: Office Security Guide
Office et SharePoint pour et par les administrateurs : Microsoft Office 2007 Sec...
SharePoint Price Calculator
Microsoft ® Windows Server ™ 2003 Performance Advisor
Commercial News USA - Showcase for American made products and services
Windows 2003 Performance Monitor
Small Business Administration - Free Online Courses
Home - Apatar - Open Source Data Integration & ETL
ASPInsiders
SQL Protocols : Troubleshoot Connectivity Issue with SQL Server Express 2005
SQL Protocols : Troubleshoot Connectivity Issue in SQL Server 2005 - Part II
SQL Protocols : SQL Server 2005 Connectivity Issue Troubleshoot - Part I
SQL Protocols : Named Pipes Provider, error: 40 - Could not open a connection to...
sqldbatips.com blog
Supervision d’Asterisk avec Nagios
Downloads - Switches - Cisco Systems
Roadkil.Net
BooZet Freeware » Products » Double Driver
Ask The Admin » Blog Archive » Rebuilding your Blackberry
LBNL"s Network Research Group
Main Page - Sys admin Wiki - a Wikia wiki
BGPmon.net : Welcome to BGPmon.net, a BGP monitoring and analyses tool
Sysadmin - Scratchpad Wiki Labs - Free wikis from Wikia
Home
Main Page - SysadminHell
Security Stories and Help with Network Documentation — Ogenstad.net
NSIT: Network Documentation and Troubleshooting
Ask The Admin
netdot - Trac
Computer Security For Home and Small Business - Defending The Net
ConsultantCommons.org | Sharing Tools for Nonprofit Technology Support
The Computer Technology Documentation Project
Network Documentation Made Easy with SYDI
Hmm already found this once, must remember to look at it!
Azerblog: Making a Bootable USB from DVD image
Introduction to Algorithms - good coders code, great reuse
Private Virtual LANs
Private VLANs Revisited - CCIE Blog
Understanding Private VLANs - CCIE Blog
Spreed News Home
PasTmon: HomePage
78 Ways for Your Small Business to Save Money in this Economy - Inside CRM
InsideCounsel Homepage
"Obscurum per Obscurius" : Configuring SMS to Work on Workgroup Computers and Co...
LessWatts.org - Saving Power on Intel systems with Linux
The Not So Short Introduction to Getting Into Medical School
The Student Doctor Network
Web-Harvest Project Home Page
Linux.com :: Automatically process new files with fsniper
Varnish - Trac
Transparent Democracy : Ballots
Altiris in an @mosphere
UNIX Secure Erase
ediscoveryinfo
rootkit.com: sonar
ExpressMaint - Home
The NTLM Authentication Protocol and Security Support Provider
AKB 2017: How to use Notification Server with IIS lockdown and URLScan
Altiris info
Maltego » Home
SweepRAM | Computers are fun, right?
ecobee - Programmable Thermostats and Other Green Living Products - Home
An FM Stereo Broadcaster
YaketyStats - Start - Redmine
Manpage of Esar
cobbler - Trac
Dark as Light | Projects/sam
DomainCheck
ACCORD5 | We make awesome stuff for the web
Explore the British Library here
Engrish.com
((MX))
SNMP4tPC - The Getif SNMP Utility
GSX Groupware Solutions Home Page
SRP: Safety Connection
Welcome to Dataoutages.com
DataOutages.com - Blackberry & Carrier Service Outage Information Center
CodeIdol - Thinking about BlackBerry - BES Administration - 74. Test Your SRP Co...
PrintWhatYouLike.com {beta}: Save money and the environment printing only what y...
Cisco CCIE Blog For Internetwork Professionals
Rands In Repose: The Culture Chart
The Parable of the Two Programmers
FastDup - Overview - Dereferenced
wissel.net :: The multi-faced nature of the NSF
Time Tracking Software - actiTIME - Web Based Timesheet
Midnight Research Labs - Depant your network
Twinfluence - Twitter Influence Analyzer
OpenCA Research Labs - OpenCA PKI (v0.9) Project
Mobile Tech Addicts
Install and Configure SQL Server 2008 Express | Symantec Juice
uDig GIS: A First Look | Linux Journal
News lpn
News
Nagios Notify
rthdribl - Real-Time High Dynamic Range Image-Based Lighting 1.2 -
OCCT - OverClock Checking Tool
MSFN - Where People Go To Know
Crystal Reports Book Blog
the complex litigator: e-DISCOVERY: New e-discovery blog offers resources for e-...
Electronic Discovery
piggydb - DevjaVu
POS (Point of Sale) Software from Volanté POS Systems
Linux TuxCards - A notebook for tuxfreaks
Common tips and tricks from a SQL Developer Support perspective : TCP connection...
A guide and tutorial on using ComboFix
BooZet Freeware » Products » Double Driver
Is IT training the poor relation of IT?
Macworld | iPhone Central | Six essential Apple iPhone security tips
MAPLight.org
Tellmatic - Die Newsletter Maschine - freies PHP / Mysql Newsletter Script :: Ha...
GTD-Free Home
BlogMS - Official Microsoft Team Blogs : Resource Guide to Free Microsoft Softwa...
IBM - Notes 8 Preferences settings storage
Making Notes 8.x (including 8.5 beta) in Eclipse feel much faster. (Andrew"s Blo...
Inno Setup
The Tax Foundation - Educating Taxpayers Since 1937
ucsniff
Leading Geeks
JD Supra | Legal Documents, Legal Forms, Court Filings, Articles & Research by t...
ILTA
Bootchart
Lifehacker Top 10: Top 10 Obscure Google Search Tricks
ProjectPier.org
Coding Horror: VNC vs. Remote Desktop
Best practices for using Lotus Notes 8 - Nitix Knowledgebase
Lotus Notes
Lotus Notes: Lotus Notes Replication - Tips
Developers: Legal Tips for Young Players - Record Keeping « Brendan Scott’s Webl...
C H A P T E R 9 - Troubleshooting the Linux PXE Boot Installation
YouTube - Warriors of The .Net
PowerGUI.org - Open Source Windows Powershell Community : WSUS 3.0
SQL Monitor | Symantec Juice
Testing SIP Security on a Budget, Part 1
Ride The Lightning: HE’S BAAACK! MITNICK DETAINED BY FEDS
xpy » About
Vispa
Safarp
CodeProject: NtRegEdit - Native Registry Editor. Free source code and programmin...
Professionalism » Viral Video Wannabe
VoIP (Voice Over IP) Tools | iSEC Partners
Hacking Exposed VoIP: Voice over IP Security Secrets and Solutions by David Endl...
VOIPSA : Resources : VoIP Security Tools
Rebuilding a Laptop Battery | Linux Journal
Examining the Compilation Process. Part 1. | Linux Journal
Collabtive
Index of /~wessels/squid-rrd
Law - The Public Library of Law
SAcc projects: index
SourceForge.net: SquidClamav
Webbasierte Projektzeiterfassung für Dienstleister - openTimetool: Home
Silverlight Chart
Skulker2 Home Page
atvusb-creator - Google Code
atv-bootloader - Google Code
RFC-Ignorant.org Home
Popular Ideas - Dell IdeaStorm
Security to the Core | Arbor Networks Security
Cloud computing is a trap, warns GNU founder | Technology | guardian.co.uk
The Digital Economy in Canada - Stopping Spam: Creating a Stronger, Safer Intern...
dnsscan - a fast scanner for identifying open recursive dns resolvers
Branch Office TechCenter
Postfix Stress Test with smtp-source and top - PostfixMail.com
WinInstall LE, MSI Creator and Configuration Builder
Overview — Approximatrix
FLEXlm Template and script set
Managing Your FLEXlm Licenses with Cacti and phpLicenseWatcher « Nerhood Weblog
Nerhood Weblog
Monitoring Dell Hardware with Nagios « Nerhood Weblog
Dr. BlackBerry: Two Free--and Easy--Ways to Diagnose RIM Smartphone Ailments
Phoenix Labs » PeerGuardian 2
Zapproved.com
pleasenotify.me - Simple Email Based Todo Manager
Vive la France! - World of Psychology
SourceForge.net: Squeak No Operating System
The Fuel That Fed The Subprime Meltdown
Batch Tutorial
DennisKennedy.blog Home
BillP Studios: WinPatrol 2008
IBM Software License Optimization
Delete Failed DCs from Active Directory
Crypto Resync :: Installing Squid with Active Directory Authentication
Understanding Active Directory, part 1
HOWTO: Configure Ubuntu for Active Directory Authentication - DeveloperNet
51 Essential Programs For A Freeware Only PC
Tim Myers" Web Log : Version 3.0 of Windows XP and Windows Server 2003 Guidance ...
Microsoft"s JobsBlog : Get Hired @ MSFT, Episode 1: Write a Killer Resume
SQL Server Data Platform @ MTC : A DL785 has just landed on runway 1 at the Micr...
How to use the SQLIOSim utility to simulate SQL Server activity on a disk subsys...
Shared Points for SharePoint... : Sharepoint Access Checker Web Part V1.3.0
A New Way to Manage Notes User IDs and Passwords
FDIC: The S&L Crisis: A Chrono-Bibliography
FAN: Fully Automated Nagios
dnscacheaudit
Andy"s House O" Blog: InstallShieldTuner Ver.6 and 8.0.2 Standard
5 More Elements of Composition in Photography
Hurricane Ike Flood & Wind Damage Assessment & Damage Repair Recommendations: In...
Septic Protector
VoIP Service Blog | VoIP Provider Reviews & IP Telephony News
Dealing with winmail.dat and unreadable email attachments
Ziproxy homepage
samsclass.info: Sam Bowne Class Information
Alik Levin"s : SharePoint Performance : Design, Implement, Deploy For Fast Exper...
Andy"s House O" Blog: The 8.0.2 Client Wackyness Continues, Kinda
Multiple monitors, quick tip to get missing apps on primary display
5 Elements of Composition in Photography
Jim Jozwiak--A figure of towering obscurity
Whatever Happened to ... Lotus Notes
The Cisco Learning Network: Cisco Learning Home
ohrwurm - RTP Fuzzing Tool (SIP Phones) | Darknet - The Darkside
Google Maps - Voting location info
BoxCycle - Buy and Sell Used Boxes - Help the Environment by Promoting Reuse!
SAP Network Blogs
UMIT | Homepage
GTD-Free Screenshot
Captain Oblivious :: What"s Your Perfect Job? Perfect Employer?
DNS Quick Check - DNS Report Tool, Test your DNS delegation, DNS Servers, Mail a...
not as good as dnsstuff but free
BlackBerry 101 | CrackBerry.com
Captain Oblivious
Uh Clem"s Admin World
Turn on Folder Redirection for the subfolders that receive new email messages
Welcome to SQL Server Central
SQL Server Tips, Techniques and Articles
Database Maintenance Plans and Backup File Management in SQL Server 2005
SQL Server Maintenance Plan - Keeping your database in shape
SAP Help Portal
Resource Kit for National Cyber Security Awareness Month | EDUCAUSE
Stay Safe Online. Your Cyber Security and Safety Resource Provided By The Nation...
Web Hosting Diary
Advertising or good info?
RatproxyDoc - ratproxy - Google Code - Project documentation
Distack - Trac
XMLStarlet Command Line XML Toolkit: Overview
Stubborn Tech Problem Solving: Improving Windows XP guest in VMware Player
Sara Ford"s WebLog
David Ebbo"s blog
Brad Abrams
Scott Hanselman"s Computer Zen
ScottGu"s Blog
AJAX : The Official Microsoft ASP.NET Site
The Official Microsoft ASP.NET Site
PC Assembly Language
Iczelion"s Win32 Assembly Homepage
Assembly Language
ASM Tutorial/Ready to Start!
Gavin"s Guide to 80x86 Assembly
Art of Assembly Language Programming and HLA by Randall Hyde
Maxilla: an OpenGL-based viewer for dentistry-related VRML files
Michael Stapelbergs Website: wiipdf
Swaptree – Trade books like a book swap or trade video games and swap cds or tra...
Netcraft Ltd - Internet Research, Anti-Phishing and PCI Security Services
Web hosting provider - Bluehost.com - domain hosting - PHP Hosting - cheap web h...
Microsoft SQL Server Tips & Tricks : Some useful tips when working with the Serv...
Welcome! (berrystatsadmin)
Enable Parent Paths Is Disabled by Default in IIS 6.0
LaBrea
Information Playground: RAID-5 Rising
Structue of Comcast"s Cable Modem Network
Whistle-Safe: Speak Truth to Power...
Microsoft Advanced Windows Debugging and Troubleshooting : NDIS - Part 1
Search Commands
Download details: Word 2007 Guide: Word 2003 to Word 2007 interactive command re...
Basis challenge #3: Obtaining the SAPGUI version of all computers
Make your graphical text semantic and searchable
About Opsview | opsview.org
SAP Network Blogs - Welcome to NetWeaver SAPSetup...
SAP Network Blogs - NetWeaver SAPSetup Tools and Utilities...
SAP Network Blogs - How to setup a SAP front-end software distribution landscape...
SAP Network Blogs -SAP front-end software distribution methods - An overview
SAP Network Blogs - I have a problem with my SAP software installation. How do I...
SAP Network Blogs - How can I resolve front-end software installation issues?
SAP Network Blogs - New feature: Self-installing packages...
Tripwire ConfigCheck for VMware ESX servers - VMware
VMware: VMware Security Blog
surfjack - Google Code
Free Open Source Thin Client Solution - OpenThinClient : home
Lotus Geek :: SnTT, kinda: Interesting replication problem, and I wanted to get ...
Condor Project Homepage
Translated version of http://www.archoslounge.net/La-Gen5-a-nouveau-craquee,8352...
Stanford School of Engineering
DeviceGuru » Stanford offers free CS, robotics courses
Using Logon Scripts in Pure and Mixed Active Directory Environments
How To Not Hire A Job Applicant - Datamation Blog
Not completely humor but it does tickle the funny bone
apache-scalp - Google Code
PHPIDS » Web Application Security 2.0 » Index
HiTech Recycling Ltd.recyling and safe disposal of computer equipment
Badkey Corner | Lotus Notes 8 and NOMAD installation
Scratch | Home | imagine, program, share
Linux.com :: Implement load-balancing, port forwarding, and rate-limiting with s...
Hoptoad
IBM - What"s new in Lotus Notes 8 client?
Notes Goddess - Work, Food and Life
Home | Sakura Consulting
IBM - Download SwiftFile Mail Assistant for Notes Client 8.x
Mail filing tool
Open DBDiff - Home
Performance Analysis of Logs (PAL) Tool - Home
Wordle - Beautiful Word Clouds
Adaptive Planning :: The world leader in on-demand budgeting, forecasting, and r...
Performance Tuning Notification Server | Symantec Juice
Monitoring SQL Performance for Notification Server | Symantec Juice
Tungsten Replicator
Currently has mysql planning for oracle support
PERFGURU
PERFGURU : Print Spooler Crash Troubleshooting Steps
SQL Server Express WebLog
Microsoft Advanced Windows Debugging and Troubleshooting : Red alert! My Server ...
Microsoft Advanced Windows Debugging and Troubleshooting : Basics of Debugging W...
Nick MacKechnie : My Server is hung - what do I do?
Welcome | The PC Decrapifier
TokenWorks
Talking Stocks « blog maverick
The Art of Troubleshooting
Houston news, entertainment, search and shopping | chron.com - Houston Chronicle
Home
Graphviz
Passive network tap - Hack a Day
DNS Spoofing with Ettercap (and a mention of Pharming)(Hacking Illustrated Serie...
Finding Promiscuous Sniffers and ARP Poisoners on your Network with Ettercap (Ha...
XTest - VoIP Infrastructure Security Testing Tool | Darknet - The Darkside
onesixtyone 0.3.2 - An Efficient SNMP Scanner | Darknet - The Darkside
reDuh - TCP Redirection over HTTP | Darknet - The Darkside
Text to Speech to MP3 with the freeware program DSpeech (Hacking Illustrated Ser...
Fraternal Order of Locksport
Chartgame.com - The time-lapse stock trading game
Defragmenting Indexes in SQL Server 2005
File Growth Settings for SQL Server Databases
The Geek Stuff » Bash Shell: Take Control of PS1, PS2, PS3, PS4 and PROMPT_COMMA...
x2x – Trac
PSS SQL Server Engineers : SQL Server (2000, 2005, 2008): Recovery/Rollback Taki...
Andy"s House O" Blog: SnTT-Text file registration, part deux
Domino Blog - Conduct Your Own Health Check
OptimizeImagePasteSize
Home | tikitag
cheap
The History of Phone Phreaking
ASCII by Jason Scott: The FBI File of Yipl/TAP
Sun xVM Server - Get It
Errdisable Port State Recovery on the Cisco IOS Platforms - Cisco Systems
show interfaces status | inc err
Windows Active Directory Management & Reporting Tools - index
ConfigExamples/WindowsAuthenticationNTLM - Squid Web Proxy Wiki
Workday | Workday provides on-demand HR and Financial Services www.workday.com
Simpletons guide to web server analysis
pmooney.net :: How to change all mail file owner"s access levels
worstpractices2008.pdf (application/pdf Object)
allthingsmail.pdf (application/pdf Object)
nsftools.com - The August 2008 Blog
GetServerFileList.lss
diehard.pdf (application/pdf Object)
adminblastr1topresent.pdf (application/pdf Object)
Prepare for Deployment Server Installation, Part 1 | Symantec Juice
Altiris Notification Server and Green IT | Symantec Juice
HttpWatch: Download
jWorkSheet
PostgreSQL"s Transaction Model
Linux.com :: Kernel tuning with sysctl
Domino Commands
vnStat PHP frontend
Tuning MySQL Performance with MySQLTuner | HowtoForge - Linux Howtos and Tutoria...
Build your own iSCSI SAN appliances, save money
[shell-fu:home]$
dotfiles.org | community for sharing dotfiles like .bashrc, .vimrc, and .bash_pr...
Main Page - Habari Project
MySQLTuner - MySQLTuner
PgFoundry: Ora2Pg: Project Info
phpLogCon :: a syslog data viewer for the web
spindown - Google Code
Configure TCP/IP from the Command Prompt
How to Use the Netsh.exe Tool and Command-Line Switches
Laurent’s Blog » Blog Archive » ORA-01033 and ORA-01113 errors
Laurent’s Blog » Blog Archive » Manage Windows Stored Credentials
rundll32.exe keymgr.dll, KRShowKeyMgr --Stored passwords in windows
SAP For Freshers Information
Useful SAP System Administration Transactions
SAP Transaction Codes
SAP T-Codes
SAP Transactions
Transaction Codes: SAP and Windows
Inspect My SQL - O"Reilly Ruby
How the "Net works: an introduction to peering and transit: Page 1
peering-playbook.pdf (application/pdf Object)
| SWAMP Workflow Administration and Management Platform |
http://kitty.9bis.com
The WSUS Support Team Blog
good info on what is currently happening with wsus
Microsoft SQL Server troubleshooting : SQL Server installation troubleshooting, ...
LatencyTOP
Nikola Dudar"s WebLog : Books on Project Management to start with
PSS SQL Server Engineers : SQL Server 2008 Management Tools Basic vs Complete Ex...
WMI Calls From Linux « An Irishman’s (IT) Diary
SimplePie: Super-fast, easy-to-use, RSS and Atom feed parsing in PHP.
Money Manager Ex - CodeLathe
Managing Users In Active Directory From Linux - adtool « An Irishman’s (IT) Diar...
LinuxPlanet - Tutorials - Networking 101: Understanding (and Using) ICMP - That ...
The Linux and Unix Menagerie: Lists vs. Strings: Perl List Permutations For Linu...
LinuxPlanet - Tutorials - Scripting Best Practices - Treat Your Variables Right
untitled
Finnix
Open Source Workflow & Business Process Management ( BPM ) Management Software, ...
CreditCruncher
Linux on board: Developing for the Nokia N810
TraffStats
Hurricanes
Data Center University by APC
Event ID 11165
Why did SPF cause my mail to be rejected? ✔
Lotus Notes Out of Office Agent, revisited: Part 2
Lotus Notes Out of Office Agent, revisited: Part 1
Troubleshooting agents in Notes/Domino 5 and 6
Minimizing delays in the Agent Manager
Troubleshooting agents in Notes/Domino 5 and 6
Gregg Eldred
IBM - Guide to the Notes/Domino Out of Office. Part 4: Out of Office in Domino W...
IBM - Guide to the Notes/Domino Out of Office. Part 3: Configuration of the Out ...
IBM - Guide to the Notes/Domino Out of Office. Part 2: ACL Access Level and its ...
IBM - Guide to the Notes/Domino Out of Office. Part 1: Out of Office Design and ...
IBM - How to use the Out Of Office (OOO) diagnostic tool.
VI:OPS: Clearspace: VI:OPS
View Your Mind
Thomas Nagy software pages » Semantik
Main Page - FreeMind - free mind mapping software
NoteCase note manager
Reading Native Excel Files in Perl | Linux Journal
PowerShell Team Blog : Speeding Up PowerShell Startup - Updating Update-Gac.ps1
Richard Clayton"s Home Page
CIRT.net | Suspicion Breeds Confidence
Migrating to Asterisk VoIP PBX - Part 3 | Matt G. Watson
Migrating to Asterisk VoIP PBX - Part 2 | Matt G. Watson
Migrating to Asterisk VoIP PBX - Part 1 | Matt G. Watson
SQL Server Compressed Backup
Selecting the best backup strategy for Microsoft SQL Server
Cisco Systems Networking Professionals Magazine - Packet Magazine - Cisco System...
holisticinfosec.org - Home
Techdirt: Internet Traffic Routing Around The US
There"s a famous saying by John Gilmore, that "the internet interprets censorship as damage and routes around it."
Matthew Paul Thomas » Blog Archive » Why Free Software has poor usability, and h...
User Interaction 101
Weblog: Ten Ways to Make More Humane Open Source Software
Free software UI
PSMon - Process Table Monitoring Script
OpenDMTP - The Open Device Monitoring and Tracking Protocol/Program
OpenGTS - The Open GPS Tracking System
Handyman Connection: Handyman Home Services Business by Skilled Craftsman for Ho...
A new Oracle Password cracker that runs inside the database
ExInsight - Real-time monitoring and statistics tool for Microsoft Exchange, MAP...
Welcome to bluebear.
Best Practices Resource Center for SharePoint Server 2007
Aaron Stebner"s WebLog : .NET Framework Cleanup Tool User"s Guide
Penning my thoughts... : Troubleshooting TS Gateway connectivity on Windows 2008...
cx_Freeze
Steve.org.uk: The chronicle Blog Compiler
PhonoRipper
http://openmicroblogger.org/
GNU Virtual Private Ethernet - Summary [Savannah]
DVDStyler - Home
TCExam :: CBA - Computer-Based Assessment
Apt-Cacher NG transfer statistics
sqlmap: a SQL injection tool
Netdude
Combining Maslow’s Hierarchy of Needs & Personal Finance » My Money Blog
Rightmark
Macsimum News - 35 places to download free and legal Mp3s
TaoSecurity: Splunk on Ubuntu 8.04
WikiGenes - Evolutionary Knowledge
Everything You Wanted to Know About Exchange (User, AeXExchPls.exe) Inventory, a...
SetACL - Windows permission management
Grism - an open source stock market observation tool
Linux.com :: Track your investments with Grism
HOWTO: Managing Active Directory users under Linux with adtool « The eternal fig...
adtool Active Directory Utility
Box Backup
Network-Attached Storage With FreeNAS | HowtoForge - Linux Howtos and Tutorials
WSO2 Identity Solution | WSO2 Oxygen Tank
overview [LBackup]
Open Source Time Tracking (not only) For Designers: Kimai
BWFreak
sap » home
SAP GUI 7.10 on Citrix Presentation Server - Application Delivery Infrastructure
something about SAP
Javanotes 5.0.2 -- Title Page
Microsoft SharePoint Team Blog : SharePoint Administration Toolkit 2.0 is Now Av...
Generation X, Y, & ME in Your Law Firm (from ILTA) | Knowledge Management « Lawy...
DataPortability.org - Share and remix data using open standards
Stanford Center for Internet and Society
IEBlog : IE8 Performance
Nick MacKechnie : Office Communications Server 2007 Best Practices Analyzer
pmooney.net :: The funniest Lotus story I have heard in years
IdoNotes (and sleep)
IdoNotes (and sleep) - Technotes for 8.0.2 - yes they are here already
ILTA KM 4: Wikis in Law Firms « The Law Firm Intranet
Project Management Anatomy - Standards, Roles, Responsibilities and Skills (from...
4sysops - Does server virtualization reduce costs? Part III - Software and payro...
IntelliScanner - Organize Everything
How to Save Money by Starting a Fuel Oil Coop
A guide to the Grc.dat file in Symantec AntiVirus Corporate Edition version 10.x
PenguinByte.com - EZEXECUTE
Bots vs Browsers - Public Bots and User Agents Database and Commentary
Home of Sans Digital - Your One-Stop Storage Provider
renrot - Summary [Puszcza]
SmartCruddy! :: Business Intelligence Tool - Aggregation & Reporting (GPL)
ADModify.NET - Release: ADModify.NET Latest Build
Dirteam.com/ActiveDir.org Blogs
GPOGUY.COM -- The Definitive Group Policy Resource Site on the Web!
SQL Server Performance in a VMware Infrastructure 3 Environment
Magic SysRq key - Wikipedia, the free encyclopedia
wissel.net :: How much bandwidth does Sametime need?
The Geek Stuff » 9 Tips to Use Apachectl and Httpd like a Power User
IBM Research | IBM Technical Journals | IBM Systems Journal
Power Outages
outages Info Page
Riverbed Technology -
Riverbed Support Policies
Riverbed Support: KB - SSL Certificate Expiration Results in Degraded State
* For all customers: Remove the expiring certificate. In 5.0 and later, go to Configure > Optimization > General SSL Settings, select the expiring certificate, and click Remove Selected. In 4.x, go to Setup > Optimization Service > Protocol SSL > Certificate Authorities. Select the expiring certificate and click Remove. Note: Removing an expiring certificate may affect current SSL optimization if you are reliant on CA verification for an existing SSL optimization configuration. To confirm this, examine the CA chain for your SSL server certificates and verify that the expiring certificate has not signed any SSL server certificates. From the CLI, you can remove the expiring certificate with these commands: > enable # conf t (config) # no protocol ssl ca name_of_certificate (config) # write mem
5 Things Delegates Should Do In Denver : NPR
Global Neighbourhoods: 7 Tips for new Twitter Users
Ask the Directory Services Team
About Vamps
K9Copy - a Linux DVD shrink
SOLARCYCLE 24.com / Solar Cycle 24 / Spaceweather / Amateur Radio VHF Aurora Web...
totse.com | A Field Guide to Critical Thinking
4sysops - Does server virtualization reduce costs? Part II - Power savings
PDF Split and Merge
Troubleshooting DNS | Daily Cup of Tech
NetApp - The Missing Shade of Blue: Ray Day Pay
The Backup Blog: Deduplication Calculator
Blocks and Files: Blocks and Files
Interesting listing
The Backup Blog
The Backup Blog: Avamar 101 Continued
Storage at OpenSolaris.org
CubitPOS - Point of Sale
Ecasound - multitrack audio processing tool
Chris Linfoot | The return of the mass mailing worm, and why you no longer need ...
Windows Installer Cleanup Utility - Description
PBX-E911.COM - Your complete source for PBX E-911 information
Riverbed Support: KB - SMB signing FAQ
Get tough on telecommuting: 6 questions to ask before you say yes
Internal Threat Encyclopedia
Goto 100 - Development with Visual Basic : Visual Basic and .NET Framework Versi...
another good relationship between .NET and Visual Basic
sipcalc
» Tools frameloss - MyNmap
Nick MacKechnie : Structured Active Directory Schema Management at Microsoft
Java run-time monitoring, Part 2: Postcompilation instrumentation and performanc...
Music Education With Linux Sound Tools, Redux | Linux Journal
Backup SQL Server Databases
Hacking a commercial airport WLAN » Debuggable Ltd
Errata Security - Know for Sure
SiLK
NfSen
PSYCHE
http://voiper.sourceforge.net/
squirtle - Google Code
dradis - Effective Information Sharing for Security Testers
Grendel-Scan
The Web and Microsoft : Microsoft Web Deployment Tool
SharePoint Hosting and Development : Improving SharePoint with SQL Server 2008
projects:check_generic:start [my-plugin.de]
SourceForge.net: bemDB
4sysops - Does server virtualization reduce costs? Part I - hardware expenses
Beholder WIDS Tool
Audio and music videos - 440TV Videos
FCC Search Tools
Radio-Locator
Radio-Locator
How to Remove the iPhone SIM Card | Mac|Life
Securing Mac OS X Leopard (10.5)
delizzy - del.icio.us Bookmarks Search Engine
Wi-Fi tweaks for speed freaks
Data security: What the law requires of IT
KDDI glitch sent e-mail for Japan consulate in H.K. to 3rd parties+
Notes from a dark corner : Uninstalling .NET Framework 3.5 SP1
finally a beautiful visual representation of .Net versions/Service packs
Citrix Visio Stencils for your Datacenter : VMblog.com - Virtualization Technolo...
Elgg.org
constat
How To: Rotate Desktop Backgrounds in Ubuntu
How to get system info in Linux « a non-geek’s linux notes
LinuxPlanet - Tutorials - OpenOffice.org Tips and Tricks Part II - Importing MS ...
ExpenseServices.com
update4U - update4u Software AG (EN)
StorageMojo » StorageMojo.com’s Price Lists
OpenVAS - OpenVAS - Open Vulnerability Assessment System Community Site
EnergyHub Home
Derek Callaway"s Personal Home Page - porkbind
SecuriTeam™ - Multiple Cisco IOS Shellcodes
rootkit.com
Operations Manager Product Team Blog : EventLog Explorer
Architects Rule! : SaaS Maturity Model according to Forrester
Data Dude : Diagnosing Problems
Chris Gray"s blog : ...finding an NTFS volume after accidentally deleting all yo...
Serio IT Service Desk Resources Blog » Top 10 Tips for Surviving a Merger or Tak...
SourceForge.net: nagstamon Nagios status monitor
Main Page - PDune
From Caitlin: "Dad, are the Olympic medals solid gold?" The answer is interestin...
Lotus Sametime Unyte :: Desktop sharing for Skype users and everybody else. Be t...
TOM BIHN Designs - Laptop Bags, Laptop Backpacks, and Laptop Cases
decodeunicode.org . Last Entries
You may experience performance problems when you are working with items in a lar...
How to find duplicate rows with SQL - Xaprb
Anti-Malware Toolkit 1.03.125
Pics and Kicks
Atheros_Regulatory_whitepaper.pdf (application/pdf Object)
A resource for activists using mobile technology worldwide. | MobileActive.org
http://www.miracleas.com/BAARF/
LinuxPlanet - Tutorials - Linux RAID Smackdown: Crush RAID 5 with RAID 10 - Linu...
checkmysap - Google Code
Nintendo Wii - Add DVD support
SteelBlue Open Source Web Application Server
Mindquarry DO - Free Open Source Software Download for Team Collaboration | Mind...
Free web statistics, phpMyVisites web analytics
LimeSurvey.org - The Leading Open Source Survey Tool
Freeway: Home
The Iphone Mine
DominoPower Magazine
Time Machine (INET, Fak. IV)
Sourceforge - ClamSAP
FreeNAC| Take control of your LAN with FreeNAC!
raWPacket » HeX
IBM - What is the difference between Notes.exe and Nlnotes.exe?
CO2Stats - Making websites green
Best practices for large Lotus Notes mail files
A First Ever Look Inside The Defcon Network Operations Center | Threat Level fro...
BlackBerry Freeware Directory | Best and Free Software for RIM BlackBerry Smartp...
Alfresco - Open Source Enterprise Content Management (CMS) including Web Content...
Home - Hampton Roads SQL Server User Group
Ben’s Drivel » Activate Verizon DSL in Linux.
Geek Dinner v0.6 | Louisville, KY | January 26th 2009
J.D. Meier"s Blog : 10 Success Patterns for PMs
The Geek Stuff » 15 Examples To Master Linux Command Line History
LMbench - Tools for Performance Analysis
Phil Dykstra"s nuttcp quick start guide
Image Size For PowerPoint
Über Gööber - Powered by vBulletin
Oncore Power Systems | Notebook Batteries | Chargers | Networking Products
Deltasql - GPU
Beware of the Dog | JoeDog / Siege
http_load
Linux.com :: Stress testing an application with JMeter
Pylot | Open Source Web Performance Tool
Welcome to the httperf homepage
Welcome to curl-loader
Dynamic Colors in the WorkitemView Console | Symantec Juice
O"Reilly Network -- Top Ten Cisco IOS Tips
transport preferred none
Convert Dell Service Tag to Express Service Code - How To - Creativyst: Explored...
Puppet Introduction - puppet - Trac
myLife2.0
How to export your .id file from your domino directory « myLife2.0
IBM - Is It Possible to Attach a User"s ID File to Their Personal Address Book A...
IBM - Roaming User in Notes/Domino 6.0.1 (and Above): User ID Issues To Be Aware...
Nomad Multi-User Installation. : double6.net
Phigment Said What? - Useful INI settings for InstallShield Tuner
What is blist?
The DAVIX Live CD | SecViz
The Art of Software Security Assessment
Global IP Network Home
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Business Intelligence Software - Reporting Tools - BIRT Exchange
Virt-mem
Inkscape tutorial: creating a simple ribbon
Logon Script FAQ
An Illustrated Guide to the Kaminsky DNS Vulnerability
Improve Guest Server Performance Under VMware ESX Server
perihel - closer to the sun
Last Mile Gear
Troubleshooting FAQ: What command-line do I use? -- Siddhartha Rao
Mark"s Blog : Pushing the Limits of Windows: Physical Memory
Andy"s House O" Blog: SnTT - xACL - Secure that Domino Directory!
Gavin Bollard - Computing and Lotus Domino: When Hardware Leasers Try to Kill Yo...
apt-dater – terminal-based remote package update manager
Present Like Jobs
Advanced Clustering | Breakin | Software
File transfer over SSH Authentication Agent
LinuxPlanet - Tutorials - Networking 101: Subnets Realized (Including IPv6) - AR...
Java run-time monitoring, Part 1: Run-time performance and availability monitori...
DeviceGuru » Blog Archive » Tiny, 6-chip ‘open’ computer runs Linux
Altiris
BeagleBoard.org - default
Deep Capture | The Story of Deep Capture | Deep Capture Blog
not sure if this should just be a weird one
John Dixon Technology - Earnings Tracker - Overview
Main Page - Pentabarf
F*EX - File EXchange
open Bmap
Windows XP: Slipstream Service Pack 3 into Your Windows XP Installation CD
WinUpdatesList - View Windows Updates (Service Packs and Hotfixes)
SAP Network Blogs
Tools | Insomnia Security, Auckland New Zealand | PuttyHijack
Lemur CATTA
StartSSL™ Certificates & Public Key Infrastructure
Group Policy Team Blog
SAP - Business Software Solutions Applications and Services, SAP MM, SAP SD, SAP...
SAP Basis Notes
Cain RDP (Remote Desktop Protocol) Sniffer Parser
MadMACs: MAC Address Spoofing And Host Name Randomizing App For Windows
Dsc: A DNS Statistics Collector
SQL Profiler best practices
SourceForge.net: Reverse Snowflake Joins
SafeNet Inc: The Foundation of Information Security
3 - Preventing IE Proxy Changes
Union of Concerned Scientists
ChangeDetection - Know when any web page chages
Versionista.com: Track changes to any Web site
Site Check: Website Test – UITest.com
IE NetRenderer - Browser Compatibility Check -
BerryStats and Useful tools for BlackBerry Administrators
Gargoyle Router Management Utility
Curious Inventor - HowTo Guides, Tools, Parts and Kits for DIY"ers - Make your o...
Curious Inventor - Guides : How to Solder
Deogen - Tiny monitor tester
SAP BASIS ADMINISTRATION: SAP Router Connectivity
SAP R/3 Basis        
SAP Training, SAP Jobs, SAP Help, SAP FAQ, SAP Modules, SAP Tutorials, Questions...
SAP ABAP/4 Programming, Basis Administration, Configuration Hints and Tips
Speex: a free codec for free speech
Quantum Bits
j o n a s . p h | Saprouter: Timeout
757 Labs - PDFResurrect - PDF Analysis and Scrubbing Utility
ProxyCfg.exe, a Proxy Configuration Tool (Windows)
Calizo - Timeline calendar with zoom
757 Labs
Microsoft Active Directory Topology Diagrammer
Lynch Consulting Blog: Pretty network diagrams and flow charts with Open Source ...
Telecom Expense Management, TeleBright Software Corporation
Saving Electricity: How to Save Electricity
Welcome to GreenNow USA
Sungevity solar systems can work for your home
Inventor"s Handbook
Open Innovation | Innovation Management
Group Health Insurance
Find The Best Cell Phone Plan For You | BillShrink
BizBuySell - The Internet"s Largest Business for Sale Marketplace
DShield; Cooperative Network Security Community - Internet Security Highly Predi...
DShield; Cooperative Network Security Community - Internet Security - dshield
Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen...
SourceForge.net: Files
btCrawler - Bluetooth Diagnostic Tool
SourceForge.net: BlueScanner
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Switzerland Network Testing Tool | Electronic Frontier Foundation
Large Hadron Collider nearly ready - The Big Picture - Boston.com
Microsoft SQL Server 2005 Driver for PHP - Home
Aaron Stebner"s WebLog : How to uninstall the components of the .NET Framework 3...
Nick MacKechnie : SQL Server 2008 Training Opportunities
while (alive) { writeCode(); } : Dispelling SharePoint Myths
A Declaration for Independence - Lawrence Lessig
blambi"s page /software/bost/
syren - Trac
fotoxx - kornelix
Henning Mersch
UNIX tips: Learn 10 good UNIX usage habits
Circuit Bending Documentary
10 Ultimate Rules for Effective System Administration
Cornell Notetaking Method Custom PDF Generator
Orwell Diaries «
FOSSWIN - open source software for Windows
Information Security Forum
Ahead of the Curve | Tom Yager | InfoWorld | Your server is wasting your CPU | J...
The performance envelope of a CPU and chipset is cast in silicon, but sculpted in software.
NGDC : Conference & Expo
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 4)
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 3)
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 2)
It"s Spann, not spam : SharePoint SP1 Sandbox Using Windows Server 2008 (part 1)
Knol: a unit of knowledge
United States Secret Service: Best Practices for Siezing Electronic Evidence
DoxPara Research
Sanjiv Jivan"s Blog
Gavin Bollard - Computing and Lotus Domino: Moving a Domino Server onto New Hard...
Gavin Bollard - Computing and Lotus Domino: Moving a Domino Server onto New Hard...
Gavin Bollard - Computing and Lotus Domino: Fun with Blackberries - Moving Serve...
wissel.net :: Explaining the human condition to an eight year old
Musings from a code poet: Disaster Recovery: Knowing what you know
Musings from a code poet: we had a fire at work
IBM Podcast: Notes 8 Migration Success Strategies
TinyNews
Good for outage publication by an IT group?
So You Need to Virtualize a MS-SQL Database Application? But Where Are The Gotch...
Collection NS Database Structure | Symantec Juice
Download Information
IT Power for small business and mid-sized business | bMighty.com
Know Your Stuff Home Inventory Software
Search Engine Land: Must Read News About Search Marketing & Search Engines
Missing Money Free Search for Unclaimed Property - Officially endorsed By The St...
read sendmail entries in the system log - Linux Cluster - Planet Larg
Welcome to coreboot - coreboot
AnySQL.net English -- What"s AUL/MyDUL
KCCoder.com - DBTree (Java Database Tool) - Release 0.8.7
ORA600 | Never a DUL moment with DUDE
Lotus Domino Administrator 8 Help - Setting up client installation and installat...
Lotus Domino Administrator 8 Help - Installing Lotus Notes in a multi-user envir...
Lotus Domino Administrator 8 Help - Considerations before installing Lotus Notes...
Lotus Domino Administrator 8 Help - Automating client installation using a silen...
Lotus Domino Administrator 8 Help - Customizing Notes installation using the ins...
Scripting for Lawyers
Cuil
How to Take Portraits - 19 Portrait Photography Tutorials
Data Center Knowledge: Data centers, design, power, cooling
OpenOffice.org repository for Extensions | Welcome to the home of OpenOffice.org...
GSM Roaming in Japan (and Everywhere Else)
japan-guide.com - Japan Travel and Living Guide
IMSpector - Instant Messenger Proxy Service - IMSpector
Xataface | The fastest way to build a front-end for your Database
thaweekan.com » Service Request Form Template
A Handy Formatting Trick with the Service Request Form Utility | Symantec Juice
Cleaning up the Helpdesk Database | Symantec Juice
Clear-Site.net | Home Page
Xinn.org | Security and Sanity Solutions!
http://www.networkworld.com/chat/archive/2008/072308-snyder-stiennon-nac-debate....
.:: CORE SECURITY TECHNOLOGIES ::.
CANARIE Inc.
CANARIE Network - Library (Customer Owned Dark Fibre)
Brendan Gregg : Weblog
SP800-55-rev1.pdf (application/pdf Object)
..:.:.:: H O G ::.:.:..
Belarc NIST Advisor - Free Personal PC Audit
nUbuntu - Network Ubuntu
System Administrator Appreciation Day
citizen engineer
THOMAS (Library of Congress)
GovTrack.us: Tracking the U.S. Congress
Snare EventLog Agent for Windows - Event Log transfer to Snare & Syslog servers ...
Basics for Securing Terminal Service Environment | Symantec Juice
Auto Project Planner
Magento - Home - Open Source eCommerce Evolved
Windows Wget files
APC UPS Battery Replacement & Upgrade Selector
constat
SupportIncidentTracker: HomePage
Md5Copy - David Mohr"s Homepage - Trac
ClearHealth Inc. - Home
webcheck: website checker
freshmeat.net: Project details for sqlDoInstall
the cluetrain manifesto
Satellite Forum FAQ - dslreports.com
Komodo Laboratories - NEWT® Professional - Download
Komodo Laboratories - NEWT® Freeware
InternetNews Realtime IT News - JUNOS: Open, but Not Open Source
SharePoint Magazine
International SharePoint Professionals Association
Jim Lamb : Best Practices for Shared Virtual Machines
Terry Zink"s Anti-spam Blog : The problem of backscatter, part 14 - Bounce Addre...
MyCat - Home
WikiScanner: List anonymous wikipedia edits from interesting organizations
wolfchild.de
Money Flows: Market & Sector Overview - Markets Data Center - WSJ.com
DBTAC: Mid-Atlantic ADA Center - Welcome to ADAinfo.org
FileCheckMD5 - Free MD5 file check utility for Windows.
DNSstuff: DNS tools, DNS hosting tests, WHOIS, traceroute, ping, and other netwo...
Bill Gates: Looking Back, Moving Ahead
AudioScience - ASI8914
JiWire Wi-Fi Advertising Network, Wi-Fi Finder and Hotspot Directory
VoIP Watch: The Tools of The Global Nomad
Press pack "Texting without borders" - Europe"s Information Society Newsroom
Google Docs Templates
Trisul : Open source network metering and forensics [Trisul]
www.japaninc.com | Japan -- Business People Technology
Consumer Action Handbook - ConsumerAction.gov Main Page
Notification Server Licensing -- Tips From a Customer | Symantec Juice
Mobile Network Speed Testing Solutions | iNetwork Test
Network UPS Tools (NUT) on Ubuntu « Keystone IT Tech
Exile
Replicator
VendorRate - Find a Vendor
SourceForge.net: Firewall Rulebase Audit Automation
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
autonomo.us
Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen...
Ceph | open source distributed storage
Lotus Notes users: your weekly review just got easier... with eProductivity
Labels in an instant with autofillPDF-Labels 1.0
about Scriblio » About Scriblio
RTFM Education » RTFM Guides
Eric Wendelin
grep is a beautiful tool
Solved: TrueVector driver: Driver install or load failure - Tech Support Guy For...
Fixing mouse drift on a Dell Latitude C600 with a Sledgehammer | gimboland
SliTaz GNU/Linux - Home page
Cyberience Project Manager
Club Troppo » Shared Hosting is Doomed (and I have the graphs to prove it)
Uperf - A network performance tool
DNS Quick Check - Online DNS Report Tool - Enter the domain to test realtime, Te...
How Is My DNS?© - Sponsored by Nixu Software©
Domain - reports and all about ips, networks and dns
intoDNS: checks DNS and mail servers health
YSlow for Firebug
Last In - First Out: Ad-Hoc Verses Structured System Management
Data Center Links
Last In - First Out
GLPI - Gestionnaire libre de parc informatique
Standalone Sysadmin: HOWTO: Order a T1
O"Reilly -- Upgrading to BIND 9: The Top Nine Gotchas
DenyHosts Statistical Summary
Automatically Report all SSH Brute Force Attacks to ISPs - Panther Software
Free Tools
Hilltop Lab
ActiveDir.org Home
The Inside Active Directory book
PktAnon - Packet trace anonymization
MokaFive, Virtual Desktops for Businesses and Personal Use
Practical Ideas for Your Home - Workbench Magazine
http://doxpara.com/
Podcasting with Linux Command Line Tools and Audacity
check_oracle_health
OpenID
OpenIDFarm Index
dnsenum - Google Code
Getting the most out of your Apple TV by hacking it :: Hack In The Box :: Keepin...
Zimbra offers Open Source email server software and shared calendar for Linux an...
Internet Mail Consortium
attrition.org
Saving the Net: How to Keep the Carriers from Flushing the Net Down the Tubes
Saving the Net
Saving the Net III: Understanding its Frames | Linux Journal
New Networks / New Services
Active Directory Change Reporter (Freeware and Commercial) - NetWrix Corporation
High Performance Wi-Fi - Xirrus
Internet Topology
Route Views Project Page
LinkRank Visualization
Training Tips for New Linux Users | Works With U
Three Rules of Public Speaking « A Fool and his Words are Soon Parted
NginxGettingStarted - Nginx Wiki
The C10K problem
Download details: Windows Server 2008 Component Posters
SQL Server jobs on production instances
Contactify: It"s email. Without the address.
Dan Lynch"s Blog
Linux.com :: A case for text-based DVD rippers
Add an Auto-Incrementing Build-Number to Your Build Process | Linux Journal
NS 6 Database – Everything You Wanted to Know and Probably More | Symantec Juice
jimtsay - MySysprep
Helpdesk when Helpdesk wasn"t Cool
Andrew Fryer"s Blog : Virtualized SQL Server
WindowsDevCenter.com -- Windows Server Hacks: Restoring Shadow Copies Using the ...
Larry Osterman"s WebLog : Why is the DOS path character "\"?
Bob Plankers, The Lone Sysadmin
Standalone Sysadmin
How to install and run KDE programs in Windows - Simple Help
cool
eComStation :: an OEM Upgrade to IBM OS/2. Right for today"s PC hardware
Main Page - Network Naming Schemes
Electronic Crime Scene Investigation: A Guide for First Responders, Second Editi...
The Center for Password Sanity - exploring realistic site security policies that...
Microsoft SQL Server: SQL Server 2005 Features Comparison
Simple SQL Backup Version
SQL Injection Cheat Sheet
scord
Microsoft SQL Server Support Blog
MSDN Code Gallery - Home
Download details: Microsoft Assessment and Planning
Index of Compute! Magazine Issues
ESXGuide
NetDirector.org - Home
Sprog!
Down for everyone or just me?
Home automation in GNU/Linux
Solid Signal | Digital Converter Boxes, DIRECTV® Systems, HDTV Antennas, DISH Ne...
Download Scrawlr: The SQL Injection Detection Tool
Davis | Automotive | CarChip Products
Third Hand++: A multi-use helping hand for electronics and other delicate work. ...
Context Free Art
Laptoping.com - Notebooks, Tablets, UMPCs, Laptop-Like Devices - News, Reviews, ...
IBM - Upgrade Central: Planning your upgrade to Lotus Notes / Domino 8.0
Lotus Notes and Domino wiki
IBM Redbooks | IBM Lotus Notes and Domino 8 Deployment Guide
Group Policy Resource Center : GPanswers.com
The Secret to Ultra-Sharp Photos
Home | ComboValidation
PDF Editor
Wordle - Create
IBM - Quick guide to securing a Domino server with SSL using the CA process
Fast and inexpensive iPod Repair, Screens, Batteries, and Free Diagnostic Testin...
Davis | Automotive | CarChip Exclusions
Web 2.0 - Everything 2.0 - Big Alphabetical List of Nearly Everything Web 2.0
WWW.STROCAMP.NET
Linux.com :: Expert tip: Print booklets in Scribus
the electric sheep screen-saver
cosmic recursive fractal flames
Bandwidth: a memory bandwidth benchmark
GetHT - A Hinduism Today downloader for GNU/Linux
www.packetfence.org: Home
Human Resource Management Software - OrangeHRM
stats:intro [OpenVISP]
freshmeat.net: Project details for sqlDoInstall
AA B05-Altiris Architecture Overview.pdf (application/pdf Object)
The Lazy Admin
Spam Resource
Visible Ops Blog
Download details: DTCPing.exe
Home ( DNN 2.1.2 )
Detecting SSH tunnels « coderrr
SourceForge.net: SSHgate tunneling daemon
Beeswax - Mind Your Own Beeswax
Time Tracking
SourceForge.net: Free-SA
Main - WebHome - Multi Projectmanagement
Increase Notification Server Performance by Regularly Deleting Temporary and Log...
Tim’s Home Page » portreserve
Hypertext Style: Cool URIs don"t change.
The Long Tailpipe - Shai Agassi"s Blog
You see that is what leadership is all about - you inspire your people to do something bigger than themselves, and then you do everything in your power to help them achieve their goal.
OpenPegasus
8 Free Online Resources For Learning A New Language | The Best Article Every day
The 30 skills every IT person should have | InfoWorld | News | June 02, 2008 | B...
FREE Online Safe Deposit Box(sm) from Keep You Safe and KeepYouSafe.Com
Steganos LockNote: Overview - Steganos GmbH
HRhero.com: Employment Law Resources for HR Managers
Glenn"s Underground Cabin Update
SourceForge.net: KeePassSync
dominoorexchange
Linux.com :: How to save time and traffic upgrading with apt-proxy
packetmischief: Network Monitoring - BIND 9
Sorting it all Out : Font substitution and linking #2
Sorting it all Out : Font substitution and linking #3
Sorting it all Out : Font substitution and linking #1
Faxing tips for fax servers, fax broadcasting and home faxing
Home - MVP: Mike Walsh
SSMSE, Using Views, and SQL Server Express Blog
Slashdot | When Is a Self-Signed SSL Certificate Acceptable?
Computerworld - The A-Z of Programming Languages: C++
Linux.com :: How to scan and OCR like a pro with open source tools
How to Reduce Camera Shake - 6 Techniques
Legal Technology - How IT Is Transforming Legal Services
Policyd v2
Microsoft Windows Server Update Services Tools and Utilities
Shiptool, every carrier for every user
Welcome to Call2Recycle
Norm"s PerformancePoint Server Blog : Managers decide they want BI
IBM - Notes/Domino Best Practices: Master Checklist
IBM - Support information for RIM"s Blackberry Server (BES) for Notes/Domino 8
All about AdminP Part 2
Lotus Domino Administrator 6.5 Help - Administration process requests
Lotus Domino Administrator 6.5 Help - The Administration Process
IBM - Frequently Asked Questions - The Administration Process (AdminP)
wissel.net :: Securing your CxO"s mail file
Single Sign-On Solutions in a Mixed Computing Environment
Applying the Fishbone diagram and Pareto Principle to Domino
Applying the Fishbone diagram and Pareto principle to Domino
Syslog - Main - Syslog Home
Eventlog to Syslog Service - Engineering Computer Network, Purdue University
Andy"s House O" Blog: ND8 Upgrade Step 1 - Upgrade the design of the Domino Dire...
Download Free PDF Unlocker - Techtrends
LexMonitor : Law Blogs - Legal Blogs : Prominent Discussion & Lawyer Participant...
Browser Security Test
[INFOCON] NIST SP 800-42, Guideline on Network Security Testing
ISSAF Overview Page - Open Information Systems Security Group
ISECOM - Making Sense of Security
The Best-ever Freeware Utilities List | Gizmo"s Tech Support Alert
JkDefrag v3.34
Open-source Forensics Tools for Network and System Administrators
Find_SSNs - A program that searches files for U.S. Social Security Numbers.
Senf - Trac
Technitium FREE MAC Address Changer v5 Released | Darknet - The Darkside
Your Money - A Primer for Young People Starting Their First Job - NYTimes.com
ConVirt - OpenSource Virtualization Management
now does KVM as well
Welcome to EPEAT
Application Availability
Virtual Geek
VI Client Open Console Attempt Fails | VM /ETC
“error connecting: can not connect to host x.x.x.x: a connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.”
WWoIT - Wayne"s World of IT
CmB IT
Mail merge in OpenOffice.org
Automation for the people: Pushbutton documentation
DecaffeinatID: A Very Simple IDS / Log Watching App / ARPWatch For Windows
How to uninstall the Adobe Flash Player plug-in and ActiveX control
Version test for Adobe Flash Player
Main Page - Altiris Wiki
Altirigos
clive - download tool for youtube and other video hosts
ext3undel - Trac
IP Bandwidth Watchdog
Yellow Bricks
Some Dell computers cannot start in normal mode after installing Symantec AntiVi...
Nonprofit Operations Manual Template | Aspiration
NDEmag.com HOME - ISSUES - NEWS - BLOG - CONTACT
blackbag
Open eGov — City of Newport News
OpenProj | Projity Open Source and Hosted Project Management Software
.::ArpON::.
Working Productively in Bash’s Vi Command Line Editing Mode (with Cheat Sheet) -...
TrendSecure | Trend Micro™ RUBotted (Beta)
Macrium Reflect FREE Edition - Information and download
SELF | Sharing Knowledge about Free Software
Augeas — Main
Installing Oracle XE on Debian
Pbx Info
VMware Infrastructure (VI) Toolkit (for Windows) Release Notes
PowerShell Commands for Active Directory by Quest Software
PowerGUI.org - Open Source Windows Powershell Community : Main
SnapLogic Open Source Data Integration
Troubleshooting Performance Problems in SQL Server 2005
Marco Pontello"s Home - Software - TrID
TrID is an utility designed to identify file types from their binary signatures.
4sysops - SolarWinds Exchange Monitor
virtualization.info Industry Radar: Your virtualization industry tracking system
IBM - Understanding the Full Access Administrator Feature in Domino Release 6
HotPads.com - Search for Real Estate, Homes for Sale, Apartments for Rent, Renta...
ATOP System & Process Monitor
ChironFS - A filesystem must go on, even if it is hurt
Callbutton :: Click-to-Call, SMART Toll Free Numbers, SMS Text Messaging
The Breach Blog
VMmark Virtualization Benchmarks - VMware
Ian Palangio"s Business Productivity : Office 2007 Deployment Resources for End ...
Harvard Business Online"s Susan Cramm
Valuedance - Home
More of a company/group?
Search Engine Optimization & Web Hosting Solution
iPhone Alley
To do list, simple, easy, fast, sharable: Ta-da List
VBinDiff - Visual Binary Diff
North-by-South : Software development by open source programmers in San Francisc...
Main Page - IOS Crash Analysis and Rootkit Wiki
Server-based License File Checker - VMware
Windows Vista cannot obtain an IP address from certain routers or from certain n...
Welcome to VTE
Plant Maintenance Resource Center - Industrial Maintenance information source
Flexcrypt: Automatic Email Encryption and Decryption
Log Tools | Russell Coker"s Documents
QNAP Systems, Inc.- NAS storage and Surveillance products provider
Tech_ReviewCisco Networks Routers Switches Tim Hogan
GNU Zebra -- routing software
Office of Computing and Communications Services
Documents @ Made IT
All about AdminP Part 2
All about AdminP Part 1
A Solaris Administrator Looks at OpenSolaris
Data Retention Effectively Changes the Behavior of Citizens in Germany « Creatio...
Vatata : next-generation advanced p2p streaming system <<
Amahi Linux Home Server
pdfrecycle
Home Inspector - InterNACHI: home inspection/inspector
goosh.org - the unofficial google shell.
sinfo - a monitoring tool for networked computers
MisterHouse
http://www.thenorth.com/
Interview: Howard Chu, OpenLDAP chief architect - Blogs – ComputerworldUK blogs ...
keyTouch
IBM - What information replicates to the roamed Notes Client from the roaming se...
IBM - How to set up local databases to replicate for Roaming users
Raiden"s Realm: Remote Backups for Linux and BSD
Sysprof - A System-wide Linux Profiler
Doing a Reverse Hex Dump | Linux Journal
How to be a good (and lazy) System Administrator | Linux Journal
Troubleshooting agents in Notes/Domino 5 and 6
tell amgr cancel "database name" "agent name"
nsftools.com - Tools, Tips, and a Weblog about Lotus Notes, Domino, and Java
User Administration Utility
Lotus Notes Ninjas
LotusUserGroup.org Group Blog | Get rid of those CD to MIME Conversion entries i...
THC-AMAP - fast and reliable application fingerprint mapper
sipflanker - Google Code
Zfone Project Home Page
Main Page - Forensics Wiki
inurl:hp/device/this.LCDispatcher - Google Search
google search for HP printers on the Internet
ImportGenius.com : U.S. Customs Database and Competitive Intelligence Tools
Getting Ubuntu Linux to connect to a PPTP Cisco VPN 3000 Concentrator
Emsa Register Dll Tool: Information and Dll Registration Tool for Windows
GUI for the commandline adverse
Main Page - WiiBrew
DriverSide | Car Help for Buying, Owning, Car Repair & Maintenance
NNMA - NNSquad Network Measurement Agent
YouTube - VMwareELearning"s Channel
Nick MacKechnie : You receive a “Stop 0x0000007E” error message after you upgrad...
Legal Technology - Technology Management Is Not for Lawyers
IT Service Desk and Helpdesk Blog
ATF-Cleaner.exe - www.atribune.org
DoubleKiller - find and remove duplicate files (Big Bang enterprises)
Legal Technology - When to Dump Stale Electronic Data
Four tips for crafting a document retention policy
Battling Botnets and Online Mobs: Estonia’s Defense Efforts during the Internet ...
gPodder: A media aggregator written in Python/GTK
freshmeat.net: Project details for check_websites
Client Software Update Status - Free Troubleshooting Tool | Altiris Juice
Best Practices for Optimizing SQL Server in SAN Environments Using Altiris Produ...
The Linux and Unix Menagerie: Simple Shell One-Liner To Enumerate File Types In ...
Peak 10 Data Center Solutions :: Web Hosting, Web Site Hosting, Managed Hosting,...
Dedicated Servers & Web Hosting | Managed Web Hosting Services | The Planet
Daily Cup of Tech » Server Failure Lesson #4: A Server Isn"t Dead Until It"s Dea...
Server Failure Lesson #2: Linux is Your Friend | Daily Cup of Tech
Server Failure Lesson #3: Purge a Dead DC | Daily Cup of Tech
Server Failure Lesson #8: Gig NICs Need AutoConfig | Daily Cup of Tech
Server Failure Lesson #7: Be Redundant, Be Redundant | Daily Cup of Tech
Server Failure Lesson #5: Server Tendrils Go Deep | Daily Cup of Tech
Server Failure Lesson #2: Linux is Your Friend | Daily Cup of Tech
Daily Cup of Tech » Server Failure Lesson #4: A Server Isn"t Dead Until It"s Dea...
Server Failure Lesson #1: Poop Happens | Daily Cup of Tech
AutoPatcher.com
Server Failure Lesson #10: Useful Active Directory Tools | Daily Cup of Tech
GreenSQL | Open Source Database Firewall Solution
How-To: Expand your camera with CHDK - Hack a Day
Federal Desktop Core Configuration : Utilities for automating Local Group Policy...
(FDCC) Federal Desktop Core Configuration software and solutions
Security: The Great Debate: Security by Obscurity
Download details: Sonar.exe: File Replication Service (FRS) Status Viewer
Download details: Active Directory Performance Testing Tool (ADTest.exe)
Active Directory
APC - Software / Firmware
Dragon Forged
InformIT: Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1...
InformIT: Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 2...
VIA OpenBook - Home
Course Packs - Coursepacks - Course Packets - Course Readers - University Reader...
the back room tech
Proto Co Networking: Proto Balance Advanced
SecureNix.org - Louisville, KY Linux & BSD Users Group
Fiddler HTTP Debugger - A free web debugging tool
Home ( DNN 2.1.2 )
GANYMEDE: GASH2
SourceForge.net: The dnswalk DNS database debugger
Automate Creation of Active Directory User Accounts
Automate Active Directory tasks with scripts
Nicehacks
Piggy Market Squeak
msn-proxy: the msn connection control
Auto Project Planner - Introduction
research!rsc: Lessons from the Debian/OpenSSL Fiasco
Welcome - Bazaar Version Control
John W Powell : The 7 Habits of Highly Effective Developers
FreewareGeeks :: Download UltimateDefrag Freeware Edition 1.72 : UltimateDefrag ...
dirsynch: DirSynch Project Home Page
Iotop"s homepage
Security Resources
You’re Going To Be Sued! The Role of EDD IT | Complex Discovery
Royal Pingdom » Gallery of Network Operations Centers
Data Center Knowledge: Data centers, design, power, cooling
Email Security and Data Loss Prevention for the Enterprise by Proofpoint
The Secret History of Star Wars
50 Awesome Open Source Resources for Online Writers
Project: Starfighter
Glest Free RTS Open Source
The Spring Project
PSS SQL Server Engineers : How It Works: SQL Server 2005 - Possible data recover...
[How To] Multi-boot DVD Guide - MSFN Forums
Does your AMD-based computer boot after installing XP SP3? - Jesper"s Blog
MSInfluentials
Finding Promiscuous Sniffers and ARP Poisoners on your Network with Ettercap (Ha...
ASP.NET Debugging : ASP.NET Tips: What to gather to troubleshoot
Unbound
nlnetlabs.nl - Name Server Daemon (NSD)
nlnetlabs.nl - News and updates
Working Smart: The Master Task List
Phone Scoop
Sprintusers.com - The Place for Sprint Phone Reviews, Sprint Tools, and Sprint R...
Top 10 Security Settings to make directly after Installing Active Directory
SPTU - SharePoint Tools and Utilities - Home
SharePoint Inspector - Home
http://vmetc.com home page
RFME.com
What do companies of similar size pay for the same item you are purchasing?
Vision For Hire: Some parameters that I have added which have really help out an...
Rawstudio
Creating a Multi-Boot DVD - MSFN.org
GOsa - Trac
Manage everything in LDAP
EUSecWest Applied Security Conference: London, U.K.
Remotis Technologies - Home
Anatomy of a Note ID
Best practices for large Lotus Notes mail files
WoonBlog
FastNSF.com | Dedicated To Practical Domino Performance
Children"s Internet Protection Act
HOWTO: Remove mail from postfix queue based on from email or rcpto email address
Your Resume"s 4 Audiences | Advice and Opinion
Consumers CHECKBOOK
Marketing Your Business - Factsheet: Speed up Outlook 2007 - performance tips
iPhone Backups Part 2 - O"Reilly Digital Media Blog
iPhone Backups: Part 1 - O"Reilly Digital Media Blog
The OpenISES Project: Home
OpenNetAdmin/home
GrandCentral: The New Way to Use Your Phones
Rick"s Pit - Lockdown
Cash for Your Used, New, and Broken iPods, Cell Phones, Smart Phones, iPhones, G...
Intermediate Classes - Office
CompuCom Systems - Home
Grid Net | Home
inno:script - The makers of Porcupine Web Application Server - FileTrack v0.1-RC...
Luigi Auriemma
StorYBook - Summary-based software for novelists and authors.
MSLG - Multi Switch Looking Glass for PHP
daa2iso
Activist coders aim to deafen Phorm with white noise | The Register
BadPhorm - When good ISPs go bad!: Welcome
Antiphorm
Chris Sanders » WSUS Clients Not Connecting
USDA Telecommunications Program
blindhog.net » PEMU
Implementing and Managing Windows Server 2008 Clustering: Course 6423A: Three da...
wissel.net :: Culture Snippets.
OS Templates
DNS Tracer
DataCleaner - eobjects
Salary, Job Search, Minimum Wage, Salary Calculator, Salary Survey, Income Tax, ...
CanonCam plugin for FAR manager
TechSelect
Bugtraq: Debian generated SSH-Keys working exploit
very nifty. The shortness of the code is impressive.
Notification Server: A Refresher on File and Folder Permissions | Altiris Juice
Remotely Change the Altiris Agent to Point to a Different Notification Server | ...
Windows XP SP3 is Out - Time to Rebuild Those Base Images! | Altiris Juice
Driver Backup | Personal website of Dave Hope
Squid Top-Site Report Generator | Personal website of Dave Hope
browserrecon project
LinMin™ | Bare Metal System Provisioning of Physical and Virtual Machines
Home | Soothsayer
MySQL Backup and Recovery - The Open Source Backup Wiki (Amanda, MySQL Backup)
Recover a MySQL Table with Zmanda Recovery Manager | Linux Journal
check_ssl_cert - nagios_plugins - Trac
Xplico Internet Traffic Decoder
www.packetfence.org: Home
oCERT.org - Open Source CERT
Zenity - GNOME Live!
Perimeter Institute for Theoretical Physics
Security Configuration Guides
RVTools
upgrade VMware tools installed on all machines.
virtualization.info Rent-A-Lab: The on-demand data center for virtualization pro...
nifty, rent a lab.
RTFM Education » Blog Archive » Video Podcast: Mike on the “Myths of Virtualizat...
BlackBerry Shortcut Collection | BlackBerryInsight
Five Essential BlackBerry Keyboard Tips and Tricks | BlackBerryInsight
Anti Protect - Powered by Web Wiz Forums™
EPE Basic Desoldering Guide Photo Gallery
Electronics and Radio Today :: Constructional techniques
Soldering Guide - Learn how to Solder
Proxmox VE
Laptop Repair Help » DC power jack repair guide. Do-it-yourself instructions.
dimension6 - Replacing and/or Upgrading the Hard Disk Drive in the Toshiba 1115-...
Linux.com :: Synchronize your databases with SqlSync
SILVERCODERS - Quality and Competence - SqlSync
Oral Fixation Mints / Get Your Fix
Love these had them in Dallas, TX.
SourceForge.net: SendmailAnalyzer
rrdutils
Ask Laptop Freak
YouAtNotes Blog über Lotus Notes, Domino, CRM, CMS / Web Content Management, Wor...
some german some english.
Tomboy : Simple note taking
(IN)SECURE Magazine
WebDot Home Page
Blackberry Blog
Main Page - NagiosCommunity
Supercharge Your Camera with Open-Source CHDK Firmware - Wired How-To Wiki
MSFN"s Unattended Windows : Unattended Windows Introduction
Blogs - SharePoint Blogs
Penetration Testing Framework 0.50
In Recovery... - Paul S. Randal on SQL Server
How to properly check for data corruption via a SQL job
Migrating to ext4
CHDK - CHDK Wiki
Canon additional firmware
pactester - Google Code
Pac file tester
sorttable: Make all your tables sortable
Microsoft TechNet: Tweakomatic Scripting Tool
Download details: System Administration Scripting Guide Scripts
TechNet Scripts all in one place. Yum
Scripting Tools and Utilities
NJN - New Jersey Public Television and Radio
WHYY
WFUV 90.7 FM Public Radio from Fordham University in New York City
EERE Consumer"s Guide: Your Home
UpdateStar - Simplify your software life
The Prefix WhoIs Project - Greetings
SQL Server Survey - Report various aspects of your SQL servers
Notes Password Recovery - Recover passwords from Lotus Notes ID files
Sandman
reading the hiberfil.sys in a jif
Salasaga - Introduction
sshpass - Non-interactive ssh password authentication -- Debian Admin
drraw
Twin Wan VPN Gateway XC-DPG503: XiNCOM
The Psychogeography of the USA - World of Psychology
well a sick kinda humor
9xmedia - Multiple displays
Max Power Soft Products
check_oracle_health
HOWTO: Identify the version of BES you"re running - BlackBerryForums.com : Your ...
Welcome to OpenVPN
Ripoff Report: By Consumers, For Consumers
Geeks to Go! - Tech experts answer your questions
OSSIM (Open Source Security Information Management)
MySQL Workbench
vmbackup
GNetWatch project official home page
Free YouTube Downloader+ - download videos from youtube for free
CDPSnarf - CDP Packet Sniffer | Darknet - The Darkside
fsniper - Trac
VNC Thumbnail Viewer « TheTechnologyTeacher’s Blog
The VIEW ADMIN2008
Sandbox - JPing diagnostic tool
Jarrod Creer Limited - Clustering
Notes from Support: Domino Replication
Repcat for Notes
pay tool for cluster replication
Tardy 1.16
Asunder: Home
Nipper - The Network Infrastructure Parser
PWGen Project Homepage
DemocraKey
Shellter
Viralator virus protection via your proxy server
P3Scan - Transparent POP3 proxy
National Fiber Council
DocumentBurster - Java Report Bursting Library
Technitium MAC Address Changer v5 (FREEWARE)
SourceForge.net: TaskForest Job Scheduler
System Administration
Plat"Home
FYI: OpenDNS and T-Mobile Hotspots Don"t Mix | OgasaWalrus.com
SIMILE | Timeline
So very cool
Casino Royale, James Bond : VisitBritain
MilaX » MilaX
How To Make a Screencast | Linux Journal
Planit Technology Group
Linux.com :: Installing and tracking software updates with toast
Introduction to Forensics | Linux Journal
Welcome to CrossLoop
PaperCut - Print Logger - a free print job logger for Windows.
GENSORTIUM full service web agency - Windows Remote Control Programs
WifiZoo
JouleSort
benchmark based on power
Buying a LCD monitor for photo editing | Void Pointer
SNMP4Nagios::Home
ZFS Evil Tuning Guide - Siwiki
AutoRuns for Windows
I, Cringely . The Pulpit . The Truth About IT Consultants | PBS
Love it, love it, love it
WSGW :: The Web Security Gateway
sqlninja - a SQL Server injection & takeover tool
ComplexDiscovery-Computer Forensics and Electronic Discovery - Fullscreen
EDD Blog Online: Forensic Accounting: Finding the smoking e-mail
Two New Articles of Interest on e-Discovery Teams « e-Discovery Team
Linux.com :: sSMTP: A simple alternative to Sendmail
GNU Telephony - GNU Telephony
SmartSynchronize - File/Directory Compare
bist
Bist stands for bidimensional structures (in italian it sounds like "beast" in english ) and is a chemical drawing tool. It is focused on organic chemistry but it may be useful also for chemists or teacher as well.
GALACTICA SITREP
SourceForge.net: Ignoramus- A Nagios Config Generator
WinSplit Revolution
RegCast - IT culture under the microscope | The Register
Creating a winning IT support culture
Chris Sanders » Using ARP Cache Poisoning for Packet Analysis
cain & abel
Lessons in secure messaging using Domino 6
Lotus Notes 6 Help - Using dual Internet certificates for encryption and signatu...
S/MIME X.509 Certificates
Using S/MIME e-mail
E-mail Client Testing for S/MIME Compliance
What is Roaming in Lotus Notes?
IBM - How to create a Roaming User in Notes/Domino 6.x
Lotus Notes 6 Help - Setting up as a roaming user
SourceForge.net: ODESSA
Check to see if a script was run as root | Linux Journal
script snippet
SourceForge.net: SnmpB
du2rrd - OETIKER+PARTNER AG Tools - Trac
Home - BackupManager
stroy: stroy
DisplayFusion : Binary Fortress Software
thought this was opened sourced
Oscar"s Multi-Monitor taskBar
Personal E-mail Certificates - secure e-mail communications
S/MIME - Wikipedia, the free encyclopedia
SMIME.org
How to find the level of SharePoint you are running
BACnet stack - open source BACnet protocol stack
autossh
Liliputing: Guide to overclocking an Eee PC, or how to shorten your battery life
Change the local administrator password on LOTS of domain machines. ~ Ask The Ad...
The Contiki Operating System - Home
The eDiscovery Paradigm Shift
DNS for Newbies
good basic explanation
Ask the Directory Services Team : Documenting Active Directory Infrastructure th...
Full of I.T.
Full of I.T. : Webcast Resources: Best Practices for designing the Active Direct...
SMTPUtils | The Open Source tool for tuning your SMTP server
Autism Speaks, Home Page
Ron Grzywacz"s Blog : SharePoint Anti-virus scanning exclusions
WebHome < Main < TWiki
www.viruspool.net - Homepage
Syslog Fuzzer
Vaughan Rivett"s Blog
RegScanner Tool: Alternative to RegEdit find/search of Windows
The Watering Hole
Common Wireless Antenna Connectors - Gumph
inquiry
Great tool from EMC for inquirying scsi subsystems
Mike"s Hardware
Widelands.org - homepage of a free realtime strategy game
Advanced Strategic Command - Headquarter
Mozilla Firefox, Portable Edition 3 Beta 5 | PortableApps.com - Portable softwar...
RCE Directory
Welcome :: openpacket[.]org
Japanese for Nerds (I) || kuro5hin.org
d3vscan
Welcome to DominoFiles.com - Compare Lotus Notes Domino Solutions by Category
YouTube - AtGoogleTalks"s Channel
Fix Unix
Referencer
Computer Incident Detection, Response, and Forensics: the Basics - CSO Online - ...
Computing Educators Oral History Project
The History of Numerical Analysis and Scientific Computing
Silicon Genesis : Interviews
Lemelson Center: Archives: Computer Oral History Collection
Charles Babbage Institute
Computer History Museum
History of Computing
SIGCIS | The SHOT Special Interest Group for Computers, Information, and Society
IT History Society
hied_northeast.. Cool stuff and happenings for HiEd : Remote Server Administrati...
CoreConfigurator - MS Israel Community
ONLamp.com -- Step by Step: Using Samba to join a Windows Domain
FreeOTFE
USB drive letter manager - USBDLM
Ultimate WRT54G Hacking
IBM - General overview of how to perform a Silent Install of Notes 6.x or 7.x Cl...
Chilling Effects Clearinghouse
netstiff
fromly webdiff
IBM - General overview of how to perform a Silent Install of Notes 6.x or 7.x Cl...
Lotus Notes Unattended Install - MSFN Forums
IBM - Is the InstallShield Tuner for Notes available for download?
EventID.Net
Windows Volume Shadowcopy Services (VSS) Problem Determination
VMFAQ.com / Knowledgebase
Online Technical Writing: Online Textbook--Contents
Welcome to itSMFBOOKS bookshop
httprecon project
Webshag
Linux.com :: Creating a Home Inventory with F-Spot (video)
ITidiots - MCSE training video screencasts
Tobu Tutorial
Nagios Aggregator
VMBK v.3.0 Rev 11
reCareered
Coding Horror: Adventures in Rechargeable Batteries
gubb.net
Security Management And Risk Tracking (SMART)
Inspectd.com - Training Tools for Traders
Wild Bill"s Blog :: SnTT: Out of Office and the importantance of Full Server Nam...
Printer Sharing - DD-WRT Wiki
Upgrading Nagios
» Repair Tool of the Week: WinBubble - Technibble - A Resource for Computer Repa...
Hinx Software.
OpenEMR - Free Medical Records Software - Open Source EMR and Practice Managemen...
Welcome to Schoorbs
Schoorbs is a free room/resource booking system licensed under the GPLv2 which is served as a web application using PHP and MySQL/PostgreSQL.
Error -1018 (JET_errReadVerifyFailure) in Exchange Server 4.0, in Exchange Serve...
Listed as specific for Exchange but will work with any Jet database
Description of the Isinteg utility
Microsoft Exchange Mailbox Merge program (Exmerge.exe) information
Monocle - Blue Gecko Open Source - Trac
www.thinserverarchitecture.com - Thin Server Architecture Working Group
Firing with Dignity
PE Builder, BartPE Plugins, 911 Rescue CD, ERD Commander 2003 Multi bootable CDs...
Create Your Own Font - Wired How-To Wiki
Chris" Realm
Iometer project
Michael Brown - Blogging for Dominos
KoreLogic, Inc. Security Services, Tools
ddp seems to be the most interesting
Autenticating SQUID in Active Directory « Menelkir Hedlund
PaperCut KB | Configuring Squid on Linux to authenticate with Active Directory
America"s Test Kitchen
Cedar Backup
BlackBerryInsight » Howto: Remove BlackBerry’s IT Policy
KwikByte - KB9260
Hardmac.com : Le "Macbidouille" in English
Diagnose, troubleshoot, and resolve Windows performance from Quest Software
Please Note: Spotlight on Windows is unsupported freeware. The license key is provided in the download package and expires one year after installation. To renew, please revisit this website. An activation key will be made available prior to the expiratio
GoDaddy Silences Police-Watchdog Site RateMyCop.com | Threat Level from Wired.co...
interstellar.pdf (application/pdf Object)
Dmitri Tymoczko, Composer and Music Theorist
SCHED: SXSW 2008 Schedule for Tuesday March 11 in Austin, TX
Ultimate GMail Collection: over 80 Tools and Tips | MakeUseOf.com
SourceForge.net: Openbravo POS
Installing Fonts on Linux | Linux Journal
In Unix, how do I remove files with names that contain strange characters, such ...
Space Exploration
Minicomputer
WinDirStat - Windows Directory Statistics
VPN 3000 Series Concentrator
BlackBerry - BlackBerry | Wireless Handheld Devices, Software & Services from Re...
Writing a Windows Installation script
PowerGUI - Administrative Powershell Console : Main
OnPATH Technologies, leader in physical layer switch technology
WinAudit v2.27 - Free Computer Audit Software
SourceForge.net: PHP Point Of Sale
John"s Excel Website
Open Source Point-of-Sale Systems: Worth A Look? | The VAR Guy
Openbravo POS Features
O"Reilly Network -- Top Ten Cisco IOS Tips
Information Systems Security Association
PeaZip: free RAR 7Z ACE PAQ TAR ZIP archiver utility
ONLamp.com -- Step by Step: Configuring SSL Under Apache
Data Center Asset Management, Inventory Control and Configuration Management Dat...
TransProCalc - financial calculator for translators, translation agencies and pr...
McGrew Security Blog
thing for USB flash drives.
Burp Suite v1.1 Available for Download | Darknet - The Darkside
Pushing a CD Key with a Windows Installer Installation | Altiris Juice
Debugging Expect
Concurring Opinions:Battlestar Galactica Interview
NTop-XTRA: The Easy-to-install NTop Flow Analyzer Distribution for Microsoft Win...
Some Things to Know Before Negotiating Salary with a New Employer - George’s Emp...
Server Racks | Rack Shelves | Rackmount Monitors
IT Resource Center - warranty check
International Warranty check.
Warranty lookup - HP Business Support Center
HP Care Pack services
Top 10 Amazing Chemistry Videos | Wired Science from Wired.com
Bos Wars
POWDER
nsftools.com - Notes 8.0.1 Huge Fonts
Canada Goose Control from Geese Police, Inc. Call Us to Get the Flock Out
Reducing the Size of an MSI File | Altiris Juice
Linux.com :: Adding a UPS to a desktop Linux machine
Main Page • d3vscan
http://nopcode.org/0xFFFF/
Spam Haters and Spam Friends: Per User (or Per Domain) Spam Control with access_...
Night"s Dawn
Peter F Hamilton - Unofficial Website
Home
The Unisphere | Forums | A Peter F Hamilton Fan Site - Home
HTTPTunnel - Tunnel Connections Through Restrictive Proxies
Domino for Unix/Linux Start-Script
HTTrack Website Copier - Offline Browser
Distributed Nagios Executor (DNX)
SourceForge.net: NetworkMiner packet analyzer
Applying Group Policy causes Userenv errors and events to occur on your computer...
OpenEMM Home
Secure File Transfer Solutions by Standard Networks - MOVEit Freely - Overview
Zip Cracking - by Crashtest
Lotus Notes ACL Manager | Lotus Notes ACL Administration | Lotus Notes ACL Secur...
Mk-boot-usb: a Script to Create Multiple-Bootable USB Sticks
Network Diagnostic Tool (NDT) On Ubuntu 7.10 Server | HowtoForge - Linux Howtos ...
RadialNet - A Network Visualization Tool
Linux.com :: Get broadband wireless with Verizon EVDO and Linux
ViewGuard™ Privacy Filters & Screen Protectors for Laptop, Notebook & Desktop Co...
The Definitive Guide to Bash Command Line History - good coders code, great reus...
Robert"s Perl Tutorial
Perl regular expressions for the common man
Hobo Copy
DelinvFile - Utility for Deleting Invalid Files and Folders
Batfiles: The DOS batch file programming handbook & Tutorial
Optimize PDF Files - tips on pdf optimization to compress file size & optimizing...
LibTIFF - TIFF Library and Utilities
Just Enough Governance for Notes Blog
My blog has no name.... | Agent Data
IBM developerWorks : Lotus : Lotus Domino Wiki
Windows Server 2003, Exchange advice. Help solving computer problems. VBScript
aTunes
Welcome Listeners !
MRTG OIDs for every device we have!
ProjectPier.org
Anton Chuvakin Blog - "Security Warrior"
pci_dss_v1-1.pdf (application/pdf Object)
Free Software Page
Outport - Welcome
Home of the MD5summer
Ed Brill - Domino as a POP3 server?
Active Directory and Firewall Ports
JSI Tip 9734. How can a script return the local, remote, or all printer names av...
The Ipod Hacker: 100 Ways to Use Your iPod to Learn and Study Better
* popularity dialer
SBA
Five Ways To Get a Free Credit Score (No Trials) » My Money Blog
rootkit.com - Software Firewall: uncommon truth
Tech Buyer"s Guide to Return Policies - dealnews.com
The Inside Track on Recruiters – Top 10 Tips | Advice and Opinion
Dual Career Couples
- Spoogenet: Workarounds - Hacks - Scripts - Soultions - for real world PC and N...
Windows specific?
VbScript Examples SiteMap
A script for everything and everything in a script. Even if it is VBS.
Kernel Mode Drivers are blocking on the target machine
Error when trying to restore printers via print migrator
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks o...
LasCon Storage - Lotus Notes Management
Domino clustering, how does it work?
Lotus Domino Administrator 6.5 Help - Using Tell commands to display cluster rep...
good thinking
bb_lotus_troubleshoot.pdf (application/pdf Object)
myGreenElectronics
GUI Printer Management Utility (Perl)
Whois lookup and Domain name search
Copytechnet Home
Online Community for Copier, Printer, Fax Technicians
Vendor/Ethernet MAC Address Lookup and Search
The ISB Group - IT Services and Solutions
Interesting scripts
PrinterAudit Script v2
Network Printing Tools and Settings
JSI Tip 5379. How do I programmatically create a printer and printer port by usi...
Additional Resources for Designing and Deploying Print Servers
HTA Makes Installing Shared Printers Easy
Microsoft: Windows XP Pro - Automatic installation of "local" printer
Script to automate TCP/IP printer installs
HOW TO: Programmatically Create a Printer and Printer Port by Using PrinterAdmin...
AutoHotkey - Free Mouse and Keyboard Macro Program with Hotkeys and AutoText
Linux.com :: Create a backup server with Restore
All About DVI
The Castle
About Inquisitor
::.. Recycle Your Media - Home Page ..::
Asset Recovery & IT Asset Management (ITAM) Leader: Redemtech
Intechra
DMD Systems Recovery
Russix
Windows Update Agent force script, email results version 2.3 by -- Rob Dunn [WSU...
Microsoft TechNet column: Tales from the Script - July 2005: I’ll Get You, My Pr...
Multi-Monitor Compatibility Database
Multi-Monitor FAQ
ACM Classic: Reflections on Trusting Trust
nms - web programs written by experts
Inside Architecture : Introducing the "Double Iron Triangle" of Enterprise Archi...
"Iron Triangle"
word07shortcuts.pdf (application/pdf Object)
GeekDinners.com - Welcome to GeekDinners.com
TuxWordSmith
FAPG
Unnoc
Radio DavidByrne.com
RogueSynapse
TaoSecurity: First They Came for Bandwidth...
A Guide to Different Kinds of Honeypots
SAP Insider Online
The Mitsubishi Monitor
KeepVid: Download videos from Google, Youtube, iFilm, Putfile, Metacafe, DailyMo...
Download details: Office Update Inventory Tool Version 2.1
BlackBerry Forums at CrackBerry.com
Pinstack.com
BES Admin"s Friend: Complete BES Troubleshooting - PinStack.com
List of Must Read BES Threads for Admins - PinStack.com
Slipstick Systems Exchange and Outlook Solutions Center
Application for U.S. Passport
Diet Tracker
W3Perl - A free web/ftp/email and squid logfile analyzer
Rapid Composition - How to Compose a Photo Quickly
Macro Photography - It"s the Little Things That Count » Curbly | DIY Design Comm...
physical to virtual backup and restore
Digital Television 101
Linux.com :: Scripting Scribus
SSHWindows.SourceForge.Net: OpenSSH for Windows
metromap
Duplicate Files Finder homepage
Tavern Side Room :: View Forum - Patrician III
Badkey Corner
d y n e : b o l i c -- a free multimedia studio in a GNU/Linux live CD
Costco - Costco.com Trade-In & Recycle Program
Transform Your Classic Xbox into a Killer Media Center | Lifehacker Australia
When and Why Should You Start an e-Discovery Team? « e-Discovery Team
Twilight Photography Tips
, but for those photographers with a rock steady tripod, a fully charged battery in the camera, and a good amount of patience, rather creative images can be created in some of the most unlikely of places. For the sake of this article, I’m using a series
JSI Tip 4160. How can I determine the installed software from the command-line?
DABCC | Citrix / Terminal Services Utilities Downloads Page
Ask The Admin | Free Tech Support With A Touch Of Geeky Humor
NASA Workmanship Technical Committee
Network Magic – Easily Setup, Manage, Repair and Protect Your Home Network
Could be very interesting for small networks.
GPU-Z Video card GPU Information Utility
Blog O’ Matty » Blog Archive » Resources from my Java performance presentation
Uninstalling Altiris Agents | Altiris Juice
Remove U3 from a USB Device (Storage) - TACKtech Corp.
StopBadware.org
Linux.com :: sudo, or not sudo: that is the question
Overview
CD and DVD media keep their data only for a finite time (typically for many years). After that time, data loss
Profit - Tantalus Games | Google Groups
T1 Glossary 2000: Glossary of Telecommunications Terms
www.BiggMatt.com
HandBrakeGTK
Welcome to AMTSO - The Anti Malware Testing Standards Organization
Altiris Knowledgebase
NTP Debugging Techniques
Welcome to ASCARON Entertainment UK Ltd - IE
Patrician III - Patrician Gold - Alderman of the Hanseatic League
md5deep
Geek to Live: Hard drive janitor
Remove files after a certain number of days
Automatic installations of SAP on each User PC
INaccess
replacementdocs: The original web archive of game manuals
A Beginner"s Garden of Chess Openings
Album Cover Art Downloader
fcca - Free Conquest & Colonizator of America
The Noegruts Blog: Seagate FreeAgent Pro eSATA problems
Welcome to WhosOff - Staff Holiday Planning Made Easy
mp3check -- a sanity-saving script for rippers.
alvrobot.com
ediscoveryinfo
Net Tools
swiss file knife - free command line text file processor
Delete 0kb files - alt.msdos.batch.nt | Google Groups
ChilliSpot - Open Source Wireless LAN Access Point Controller. Spice up your Hot...
HeadsUp Home Page
Display Acceptable Internet Usage Policy
FINDDUPE: Duplicate file detector and eliminator
Linux Command Line Tips
Project management quick reference guide for Project 2007 - Templates - Microsof...
Sun Presentation Minimizer | OpenOffice.org repository for Extensions
SourceForge.net: PMtool
Castellini on Computers Radio Show with Rick and Adam | The #1 Computer Radio Ta...
Interpage Network Services Inc.(TM) Free Web to Fax and EMail OutFax Service
IBM - The Architecture of Unread Marks in Lotus Notes
The Depenguinator, version 2.0
Relieving the systems management burden | The Register
Phone Call Comments
svnauthcheck
Do More With Less: Port-Based VLANs
Do More With Less: Build a Linux VLAN
Ignite Realtime: Openfire Server
SANS Institute - Building a Secure Nagios Server
vmprofessional
Ken Schaefer : IIS syncronisation tool - tech preview released
zCI _ Unpredictable Simplicity
Acoustic Server Cabinets | Portable Server Environments | Air-cooled acoustic se...
Racks right in the office, cooling?
Active Directory: Learn the Basics and Master Advanced Concepts
Microsoft Windows Server Update Services 3.0 Operations Guide
Knowledge Base : Support - Engineering Computer Network
W2K AD planning at University of Michigan
Georgia Institute of Technology :: Windows Active Directory
Windows at the University of Michigan
Georgia Tech Active Directory Policy
Campus Active Directory Project
ITS Academic Media & Technology - Yale"s Active Directory
Rice IT
Setting up Active Directory at Rutgers
Microsoft Windows Active Directory® Service at Penn State - Overview
UIUC Active Directory
Hack that Phone - Accidentally update to 1.1.3?
Clonezilla-SysRescCD
BYPsoft - Cross Database Comparison
Water droplets - Digital Photography School
Open Source Web Design - Download free web design templates.
VMware Communities: Moving VM form one ESX server to Another ...
XPTracker.org
SourceForge.net: JTTSlite
SourceForge.net: PortWatcher
Home Network Security
robot wisdom weblog
The beginning of all things.
Cogent Communications, global top 10 internet service provider
virtualization.info: Tech: VMware Best Practices for SAP virtualization
A Step-by-Step Guide to Silently Installing and Configuring Adobe Reader 8 | So ...
Software Update Monitor
SUMo
Wink - [Homepage]
Achievo Project Management Software
SSH: Best Practices | HowtoForge - Linux Howtos and Tutorials
http://db.gamefaqs.com/computer/doswin/file/afterlife.txt
WinShares - Home
UEFI - Home
Docstoc.com – free legal forms and business templates
The Open Computer Forensics Architecture
Terminal Services Team Blog
Windows Server Division WebLog
La bodeguita de Nacho : How to rebuild your master database in MSDE when it beca...
USB Pendrivelinux install from Windows | USB Pen Drive Linux
Recycle Your Cell Phone. It"s an Easy Call. | Plug-In To eCycling | US EPA
Soup Recipes | Soup
How to Begin IT Risk Management: Five Steps to Getting What You Want
Hacking and Pen-Testing With The Nokia 770/800/810 Notes
4sysops - EventSentry Light - Centralized real-time event log monitoring
Body Language During An Interview ~ IT Professionals
Educating IT, Legal and CIOs can help control costs and bridge departments - DCI...
Legal risk management requires a corporate strategy, mindset and commitment - DC...
How to create your own Windows file sharing server to share large files
ACM Classic Books Series
Namexif™ (Rename EXIF Photos)
AutoScan Network - Network Monitoring And Management Tool For Windows And Linux ...
Personal Telco Project
FOG :: A Free Computer Imaging Solution - Home
Spider – Keyboard and Mouse not working on Red Hat Enterprise Linux 3 and 4
A Windows Server 2003 computer cannot join a domain after you upgrade it to SP1 ...
Microsoft Office Migration Planning Manager
Dcpromo Demotion of Last Domain Controller in Child Domain Does Not Succeed
Flexible Single Master Operation Transfer and Seizure Process
VoIP Hopper - VLAN Hopping Tool | Darknet - The Darkside
FOSSline » The Root of it All: The meanings of the folders in the / directory
GNU Radio - GNU FSF Project
Podcast directory for educators, schools and colleges
Ronalus : stsadmWin 2007 is here
reStructuredText
SourceForge.net: nipper - network infrastructure parser
nipper
Free Vst’s, Sound Samples, Audio Editors, Sequencers ...
HubbleSite -- Out of the ordinary...out of this world.
Open IT Works
Linux Solutions | Linux Hosting | Linux News and Reviews
The Outpost Universe
TiddlyTasks - v0.2.5 for FireFox - based on TiddlyWiki v2.1.2
Son of Service free volunteer management database software for non-profit organi...
RegLookup Home
Wolfpack Empire
freshmeat.net: Project details for logmover
Keeping your screen clean - The Unofficial Apple Weblog (TUAW)
A Mean Clean For A Glossy Screen - The Apple Blog
Visual Studio 2008 Express Editions
Domino Blog
PLANET LOTUS.org
Lotus Notes documentation: Version 8.0
Curious Inventor - Guides : Surface Mount Soldering
Reusable Bags - Eco-friendly reusable bags, plus facts & news on plastic bag iss...
I"m experiencing difficulty with the maps while using Microsoft Internet Explore...
Catalog Choice - Eliminate unwanted catalogs you receive in the mail
Track Flight Status, Airport Delays and other Flight and Airport Information
Default Limit to Number of Workstations a User Can Join to the Domain
NTLast
Config Manager
Jorge "s Quest For Knowledge!
ns-3 project
Kwok Information Server
David Sudjiman
:: scan.coverity.com : Accelerating Open Source Quality :
Linux Reviews
BerryReview
NotesBerry
.clay - osmo
SourceForge.net: Contact Grabber
Thinking Faster
How to remove data in Active Directory after an unsuccessful domain controller d...
How to Install a Replica DC in an Existing AD Domain on Windows Server 2003
MPlayer - The Movie Player
Troubleshooting Dcpromo Errors
Fix an Unsuccessful DC Demotion
Forcibly Removing Active Directory from a DC - Retire a Domain Controller
Planning FSMO Roles in Active Directory
How to Install Active Directory on Windows 2003
Understanding FSMO Roles in Active Directory
MarkMonitor - Home
How to remove orphaned domains from Active Directory
Corporation Service Company: Trademarks, Domains and Brand Monitoring
[rancid] Re: Migrating from CVS to SVN on different server
[rancid] Re: wrancid/vpn3k additions
NoScript - JavaScript/Java/Flash blocker for a safer Firefox experience! - what ...
nurpawiki - Google Code
WebHome < Gnumed < TWiki
Linux4n6.be
yaGTD - Yet Another Getting Things Done. - Summary [Gna!]
GMnext Home
Sarvant
Unix Server Monitoring Scripts
Simple System Thermometer (systher)
Argus - System and Network Monitoring Software
SYSSTAT
Unix System Monitoring
Wireless: How to enable/disable your wireless connection for stability
Cisco IOS hints and tricks
[oucs] Active Directory Workshops: 4. Presentations
ITsafe
Druid, The Database Manager
Laptop SCSI upgrade via ATA bridge
2.5 scsi
Rants on technology: Checking your round-robin DNS with nagios
Discovery of Employee-Owned Computer Equipment : Internet Business Law
BRL-CAD Home Page
Jobs, Employers, and Job Search Resources - Job-Hunt.org
NetSPoC: a Network Security Policy Compiler
The Personal MBA Manifesto: Mastering Business Through Self-Education (Recommend...
SAGE: Open Source Mathematics Software
check_mysql_perf
the moneygardener
Recovering VMware snapshot after parent changed - Drive:Activated
Transparency in an IT support organization | Yald - Patrick Grote"s Technology N...
Harvard Extension School"s Computer Science E-1: Understanding Computers and the...
Amazon.com: The Fairy Tales of J.K. Rowling
arcwelder - Google Code
Rifters.com: Peter Watts" Backlist
The Squid Web Proxy/Cache Blog
symantec
Computer RAM | Laptop Memory | Memory Card | Secure Digital | Compact Flash | Me...
Willowhayes - Windows 2000 Unattended Installations and related utilities
4sysops - compname.exe - query and rename computers
perihel - closer to the sun
The Sound Of Linux 2007 | Linux Journal
IT Interview Questions Open Database - GeekInterview.com
moleskinerie
Notebook and Laptop Reviews
SecurityCartoon.com
i-doit - News
EC2 or Not -- is your favorite site running on ec2?
ganeti - Google Code
How To Make Yourself Do Anything
http://ser2net.sourceforge.net/
Wikibon - Home
Could be interesting. Lets see where it goes.
http://kovaya.com/perl/hpsetdisp.pl
X-Wrt - Web interface and more for OpenWrt
Hmm need to remember I saw this
Storage Sanity
Zerowait High Availability Blog
Storagezilla’s blog - Vox
Network Appliance, Inc. - DaveBlog : : : : :
The Storage Forum: blog
the storage anarchist
DrunkenData.com
MonoPrice.com - Best quality products at the lowest price
DNS Lookup tool, Reverse DNS lookup tool - www.DNSWatch.info
Free for now?
Find out DNS Server Version With DNS Server Fingeprinting tool
Ian C. Blenke :: Computer Engineer
http://www.db-everywhere.com/
Emerging Threats - Home
Takes the place of bleedingthreats.net
HOW TO: Use Wfetch.exe to Troubleshoot HTTP Connections
Open Source Living
Open CRS Network - CRS Reports for the People
The Megapixel Myth
VMware Communities: Community: VMware Server
sanbarrow.com
Welcome to VMware-land! - Sponsored by Vizioncore
Deluge BitTorrent Client
sanbarrow.com
VMware Communities: What to do in moments of crisis
Creating Encrypted FTP Backups With duplicity And ftplicity On Debian Etch | How...
Linux.com :: Syncing your BlackBerry on Linux
Calculating Subnets with "ipcalc"
BloggingStocks
BBHub
no longer being updated 1/31/07
How to peform a clean uninstall of BlackBerry Desktop Software - BBHub
BES Disaster Recovery
BlackBerryInsight
Kid Icarus FAQ/Walkthrough Final - hosted by Neoseeker
MDAC Downloads
BlackBerry Technical Solution Center
BlackBerry - BlackBerry | Lotus Domino: BlackBerry Enterprise Server Pre Install...
BlackBerry Enterprise Server on Domino Discussion
Kid Icarus Shrine
Skulker2 Home Page
IpodPatcher < Main < TWiki
Chris Sanders » Packet School 201 - Part 1 (ARP)
DUPLICATE FILES SEARCHER - Find duplicate files and calculate MD5 or SHA hashes
UrJTAG - Universal JTAG library, server and tools
dell1600n-net-scan
PSP-Vault :: PSP downloads, community, news
Stuck Pixel Fixer :: PSP-Vault :: PSP downloads, community, news
Windows Cygwin Binary Toolchain Installation - GameOver
hField Technologies, Inc.
THC-HYDRA - fast and flexible network login hacker
http://membres.lycos.fr/mdcrack/
Verizonpathetic.com - Billing issues, overcharging practices and general problem...
Attacking DHCP, and mitigating the threat with a Cisco Switch
Download - PDF Split and Merge
SourceForge.net: OpenUHS
J! Archive
Love it. :)
Chris Sanders » Packet School 101 - Part 4
Chris Sanders » Packet School 101 - Part 3
Chris Sanders » Packet School 101 - Part 2
Chris Sanders » Packet School 101 - Part 1
freshmeat.net: Project details for cmdiag
Download details: RML Utilities for SQL Server (x86)
mst software - maintenance - security - tuning! Windows Tools, Defragmentation, ...
[[kahvi collective audio sculptors - 2k+V] V2.1
Nmap Hackers: Seclists.Org shut down by Myspace and GoDaddy
Why not to use godaddy
Magic Garden | Artificial Plants Laboratory
maemo.org - maemo.org: Maemo is the application development platform for Interne...
Automated Logic - Domino Resources - Team Mailbox v3.25
Cook"s Illustrated-Recipe Resource
LISA "07 man
Hacking the Nokia N810
High-Speed wireless connectivity for mobile devices | AT&T wireless services
Changing local admin password? - Windows Server - Networking
Windows Server 2003 Active Directory Domain Rename Tools
DNS, BIND Nameserver, DHCP, LDAP and Directory Services
How to keep DNS Errors from slowing you down!
AnandTech: Getting the Most Out Of Your Hardware: Motherboard/CPU Utility Roundu...
http://www.galciv1.com/docs/qa.html
JavaScout"s Galactic Civilizations Database - Constructor
Realms Beyond Galactic Civilizations - Tips
Hackito Ergo Sum: The Library Problem
JSI Tip 8649. The PrintDriverInfo.exe utility.
Independent Computer Consultants Association
Free Help Desk Software
MAKE PVC FURNITURE and other PVC projects for home, garden, kids, pets, shop and...
CD Recycling Center - Home
BuildItSolar: Solar energy projects for Do It Yourselfers to save money and redu...
SAGE: Open Source Mathematics Software
NetMBA Business Knowledge Center
S-video out with laptop not working - Ubuntu Forums
sudo aticonfig --tvf=PAL-B #change this to your local TV-format sudo aticonfig --tvs=VIDEO #for S-video output sudo aticonfig --force-monitor=tv #force TV-out, even if TV is not detected
Linux.com :: Manage your documents with Knowledge Tree
USB HDTV Tuner Stick for Windows & Linux (Hauppauge WinTV-HVR-950) : Lunapark6
HVR-950
Computer Recycling of Virginia | Reuse. Refurbish. Recycle.
Welcome to Dell Auction
KisKis - Keep It Secret! Keep It Safe! 0.23
Diane Trout - FreeAgent Drives
Sambascan2 - Asturio Kee
Renaissance Art Leather Journals
10 Tips to Make Your Exchange Server a Good Net Neighbor
Martial Arts of Japan: Koryu.com
Piedmont Distillers, Inc
KnowledgeTree | Electronic Document Management Software | Hosted and On-premise ...
ted: torrent episode downloader
Ross Barkman"s Home Page
The man for Modem Scripts
Mother Earth News: The Original Guide to Living Wisely
How to Learn Computers ~ Chris Pirillo
CoffeeGeek - News, Reviews, Opinion and Community for Coffee and Espresso
HubbleSite - Entire Collection:
DNS Oversimplified: How to check your DNS
Overview | Likewise Open | Products | Likewise Software
An Unofficial ASUS Eee PC EeePC 701 Community
Tokyo Cabinet: a modern implementation of DBM
DataVision Home
Digital autopsy - heise Security
Command Line One-Liners - Blog - SAPIEN Technologies - Scripting Solutions for W...
Cisco - Using PortFast and Other Commands to Fix Workstation Startup Connectivit...
ITT Wiki : Spanning-Tree And Portfast
Altirigos
PuTTY Tray - now portable too!
8 Lessons I Learned From The Cheapest Family In The Nation
What is UltraVnc SC
Tweaking your system to get the most out of BitTorrent
H.E.A.R. | Hearing Education and Awareness for Rockers | www.hearnet.com
IPCop.org :: The bad packets stop here!
Intelligent Insight on PerformancePoint : The road to business/IT alignment
Sharepoint Logging Spy - Home
Windows is !easy, Linux is !hard.
getsnmp
Specops Gpupdate - Remote gpupdate / Wake on lan (WOL) / restart / shutdown
A Lotus Notes Domino database replication primer for administrators
Sarg Reports | InitZero S.r.l. - IT Solutions
The Story of Prince Yamato Take
Computer Security Day
Scientific American: The Secret to Raising Smart Kids
Caring.com: Helping you help your parents
Help Net Security
Terminals - Home
4sysops - FullArmor ADMX Migrator 1.2: Migrate and edit Group Policy templates w...
Chaosreader
Overcoming USB (In)Security - Michael Boman
ediscoveryinfo
Welcome to MapServer — UMN MapServer
Synscan - Programs
GLPI - Gestionnaire libre de parc informatique
A California city rebuilds network using all open source software - Network Worl...
Linux.com :: CLI Magic: Video conversion with mencoder
How to solve Windows system crashes in minutes - Network World
CodeGuru: FTPS vs. SFTP: What to Choose
Startup Manager
Security & Privacy Complete
storageim Home
webkeepass
SANS Institute - The SANS Security Policy Project
USB Hacks: Endpoint Insecurity
VoIP Call Monitoring Demonstrator
Welcome to CE-Infosys
[Resolved] smitfraud-c.msvps with security warning pop-ups - What the Tech
SmitFraudFix
DeltaCopy - Rsync for Windows
About | John J Thomas
IntelliAdmin.com: Remotely Enable Remote Desktop
ManagePC - PC Management .NET application for Windows
ShareWatch Home Page
UaMainPage - EU Edge Open Source - Trac
Aakre Technologies - TimeTrack
Download details: Windows NT Backup - Restore Utility
Classic Cat - the free classical music directory
EDUCAUSE Home Page | About EDUCAUSE | EDUCAUSE
» Active Directory
» Blog Archive » What is the Global Catalog Server?
IBM - Changing the Out Of Office agent schedule
Compiling Perl Scripts into Standalone Executables
Belegarth - Home
Cambridge Computer. Artists in Data Storage.
Absolutely amazing CTO.
Ask The Admin: Useful Windows Keyboard Shortcuts for IT Pros - Part 1
IBM - Keyboard shortcuts in Notes 6.x and Notes 7.x
Quick fix for corrupt view in local database
SourceForge.net: ASTRES
http://www.oracle.com/pls/db10g/db10g.show_toc?which=main&partno=b10825&maxlevel...
The Tendjee
How-To: Where to find parts for your projects - Hack a Day
Unix Admin Corner
Welcome to Battery University
ProClip Mounting System - Device Holders and Dashboard Vehicle Mounts
TabletBlog.com by ThoughtFix
Argus - Home
NVisionIP Download page
Red Hat Magazine
perlcast.com
10 things we hate about laptops
CCNA cheatsheet
What Happens If Your Broker Fails? SIPC Brokerage Insurance Info » My Money Blog
Road, Travel, and Financial Services - AAA
Extreme energy makeover: Home office edition
Example: Backup Exec job status monitoring - Intellipool Network Monitor - Forum
IBM - Troubleshooting Internet HTML e-mails with images appearing as red Xs
SurveyMonkey.com - Powerful tool for creating web surveys. Online survey softwar...
Sarbens Oxley (SOX): Does Your Help Desk Comply?
Ask The Admin: Question: Do I need to have AntiVirus Software running on my Linu...
Ask The Admin: Need to Rip Dvds to files? Use VLC Media Player!
Eight Essential Tips to Overcoming Shyness and Making a Good Impression | zen ha...
Meet and greet
LaTeX project: LaTeX – A document preparation system
Kile - an integrated LaTeX environment
The Many Faces of Mike McBride
Software update for Nokia N800 tablet leaks, fans go gaga | Surveillance State -...
001d6e9c
Creative Commons
TechIQ » Archive » Point-of-Sale Systems Going Open Source?
trixbox CE, an Asterisk-based PBX Phone System (formerly Asterisk@Home) | trixbo...
VirtualBox
Lynis
polishlinux.org » The art of using manuals
syonex: Resources
phpaga
project management and practice management
Support - VMware
VMware Appliance: Unnoc
Main Page - Free-reading
Rands In Repose: The Nerd Handbook
LCFG: A large scale UNIX configuration system
automatically installing
Tips and Tricks - BlackBerryFAQ
Gavin Bollard - Computing and Lotus Domino: Scheduling Cleanup Jobs for your Ser...
RTFM Education
http://www.vmware.com/vmtn/resources/esx_resources.html
How to reset the ILO password on your ESX server - NTPRO.NL
NTPRO.NL
Windows Administration: Disaster Recovery: Active Directory Users and Groups -- ...
Active Directory Components
SolutionBase: Recovering Active Directory when you don"t have a backup
Lifehacker Top 10: Top 10 Free Video Rippers, Encoders, and Converters
pws [pws - passwordsafe]
The Simple Dollar » How to Construct a Killer Resume, From Start to Finish
Organized Home | Clean house, cut clutter and get organized at home!
Yawcam - Yet Another Webcam Software
Password Safe
Helping Your Children Use the Internet - World of Psychology
Disable the RunAs Command
check_oracle - ITeF!x Consulting
OraNails - TSMap - Oracle tablespace map photographer
check_ad - ITeF!x Consulting
Customer Support, Products Repair, Manuals & Troubleshooting on Any Product
Nagios NRPE Plugins for Windows - ITeF!x Consulting
HEYMONitor™ "Oracle Database Monitoring & Alerting Solution"
The Art of Worldly Wisdom by Balthasar Gracian. Search, Read, Study, Discuss.
Gracian manual
Reconnecting a Domain Controller After a Long-Term Disconnection
Verify successful replication to a domain controller
Best Practices for Adding Domain Controllers in Remote Sites
9 creative staircases | The Best Article Every day
Tracker Software Products Ltd - Homepage - Products for End-Users - PDF-XChange ...
Insight for Active Directory v1.0
Altiris Blog Site
Dump your legacy CRM system for Salesforce.com using open source tools - LinuxWo...
Palimpsest: the guide to a (mostly) paperless life | 43 Folders
Wireless resources, Geelong, Victoria, Australia and other places 802.11 (even s...
Main Page - BlackBerryFAQ
Luma - LDAP utiliy, browser and more...
TidBITS : What"s a Firewall, and Why Should You Care?
Absolutely love it
Engcom
Linux.com :: Simplify backups with Synbak
Nagios Monitoring Windows Servers
English - OpenKM
Photos: The history of the digital camera - Crave at CNET.co.uk
STIX Fonts Project Website
4sysops - Comparison of six free RDP client tools
FSlint - Duplicate file finder for linux
Network Security Blog
vulcan
OTRS::Email Management::Trouble Ticket System::Welcome!
IBM - Basic steps for installing Lotus Notes on a Citrix MetaFrame server
Citrix VS Terminal Services
Lotus Notes/Domino Server
DominoBaloney - Lotus Domino, Lotus Notes, Quickplace,Quickr,Sametime and other ...
MuPO
VMware Tips
Blog.thecheapdba.com
Blog.thecheapdba.com » Blog Archive » Oracle alert log scraper in Windows .BAT
OverCR
HowardForums: Your Mobile Phone Community & Resource - How to enable EVDO DUN on...
iPod Video Soldering Tips and Solder Techniques | Video Soldering Tip Downloads ...
How-To: Introduction to soldering - Hack a Day
SambaScanner - A Tool for scanning Samba networks for files
Core 2 Motherboard Complete List - With Hardware Recommendations for a HD HTPC -...
Method Suppot Framework
NS2HTML - The Netscreen to HTML file converter
newbie.blog » The Legend of the ‘Punctured Stripe’
Home
Motley Queüe : Unattended MSMQ installation on Windows Server 2003
SharePoint Hosting and Development : Installing a SharePoint DR farm.
bashcritic - Trac
nrg4iso - Google Code
Getting started with pre-release Angstrom on Collie (Zaurus SL-5500) | Realm of ...
OGC Best Management Practice - It Service Management - Itil
PoorMan"sSMS: Project Home
WSUS Information
QCC Information Security UK - Casenotes
Saving and restoring existing Windows shares
Kwok Information Server
Interesting.
Main Page - SystemImager
heise Security - c"t Projekte - Offline-Update
English ctupdate
Active Directory Script Center - VBScript Samples
This American Life - Podcast
Monitoring Active Directory
SB EventLog Monitor
Frank Heyne Software: FAQ: Windows Eventlog
Windows AD Free Tools
Multi-router looking-glass for PHP
Icrontic.com: Home of the Big Beef Burrito
Beating brownouts: building a super UPS - Icrontic.com
Maximum CPU Temperature | Hardware Secrets
sk1project.org - Home of the sK1 vector graphics editor and UniConvertor
Main Page - OpenStreetMap
iPhone 101: Hacks Vocabulary Primer - The Unofficial Apple Weblog (TUAW)
starcorp - Google Code
Helping Aussie Partners Get Ready for the 2008 Wave Launch : Windows Server 2008...
Tips for creating a security policy - Network World
4sysops - USB memory stick lifespan - The different service lives of SLC- and ML...
How-To: Make a surface mount soldering iron - Engadget
EDD Blog Online: How Changes to the Federal Rules of Civil Procedure Affect Your...
DennisKennedy.blog: Electronic Discovery Trends and Blogs: Thinking Aloud about ...
Law Department Management: An in-house guide to e-discovery practices and resour...
The Cable Guy - Column Archives
lsd.jpg (image)
Best4c beta, Best for chart, The best online diagram tool on earth
SharePoint Beagle Newsletter
SourceForge.net: remoot » home
sipvicious - Google Code
SmallNetBuilder - How To Fix Your Wireless Network - Part 1
DBAzine.com: Welcome! Portal for Database Industry
Aaron Stebner"s WebLog : Mailbag: How to install Microsoft Report Viewer 2005 in...
ReportViewer.exe /q:a /c:"install.exe /q"
Justniffer
ios7crypt.rb - Ruby - Snipplr
DosMan Drivel
Command Line Warriors : /
ZoneMinder: Linux Video Camera and CCTV Security with Motion Detection
Secret Windows command line tools can boost security
Compact Fluorescent Screw In Light Bulbs : 1000Bulbs.com The Light Bulb Supersto...
GNU Solfege - free ear training software | Main / GNU Solfege - Smarten your ear...
PXES HOWTO: M$ only environment
Lanshark - Lan filesharing tool
JTAG Tools
JTAG Finder - Chaostreff Augsburg - Wiki
Twelve Essential Photographic Rules - - PopPhotoSeptember 2007
How To Work 9 to 5 and Enjoy It - Dumb Little Man
Zenview Multi-Screen LCD Displays: Multiple Monitors: Digital Tigers
SQL Injection Cheat Sheet
AutoIt Malware Revisited « Didier Stevens
PatchAholic...The WSUS Blog!
WSUS - View Release
Your Arguing Style Has Health Effects - World of Psychology
SourceKibitzer - Recognizing Contributions to Open Source Software
Linux.com :: A script to tell which workstations are using Samba shares
Excellent walkthrough on scripting process
RESTORE - Trac
The AudioFile: Understanding MP3 compression: Page 1
Videos: Sting Op Of 10 Different Computer Repair Companies Finds 70% Don"t Know ...
How To Keep Good Posture When In Front Of A Computer at Personal Development wit...
GNS3 (Graphical Network Simulator)
Loop-based Music Composition With Linux, Pt. 2 | Linux Journal
Computer Hope"s free computer help
HR Geeks
About openCOD
Opensource Blackberry apps
cfguy - Syncing Lotus Notes with Google Calendar
A simple Plan [PDF]
WindowsSecrets.com - Microsoft Windows XP, Vista, Internet Explorer, Firefox, Wi...
Quick & Dirty Tips :: Legal Lad
¡Yay-me! file » Slacker Manager
How to create, mount, and burn ISO image files for free
Jeff Bigler"s "tact filter" theory | 43 Folders
Web Hosting Dedicated Server Linux Windows Security Managed Articles Tutorials |...
nsftools - Lotus Notes Performance Tips
http://www.networkworld.com/cgi-bin/mailto/x.cgi?pagetosend=/export/home/httpd/h...
Providing Active Directory authentication via Kerberos protocol in Apache
Perl Buzz: Perl News, Blogs and More
The Career Manifesto (Andy Lester"s Blog)
USAIL: Unix system administration independent learning
Twelve items to leave off your resume and cover letter (Andy Lester"s Blog)
photo_falletta5.jpg (JPEG Image, 2430x2823 pixels) - Scaled (28%)
USBVirusScan « Didier Stevens
Re: [squid-users] How to cache Windows Update files? from Andreas Pettersson on ...
refresh_pattern windowsupdate.com/.*\.(cab|exe) 4320 100% 43200 reload-into-ims refresh_pattern download.microsoft.com/.*\.(cab|exe) 4320 100% 43200 reload-into-ims
Home | Projity
Opens MS project files. Finally found it. :0)
Jing Project: Visual conversation starts here. Mac or Windows.
FORTIFY YOUR OASIS: Controlling your job-hunt
CPSR - Computer Professionals for Social Responsibility
Microsoft Biztalk.NET SAP Adapter : Validating SAP Client Libraries ...
How to catch a mouse without a mousetrap
Welcome to www.pelican.com Pelican™ Products - Manufacturer of high-impact, wate...
NextComputing, LLC
Gary Voth Photography: The Forgotten Lens
vixy.net : Online FLV Converter : Download online videos direct to PC / iPod / P...
The Heinlein Archives
LessWatts.org - Saving Power on Intel systems with Linux
Linuxkidd.com
Jott.com - Mobile Note Taking and Hands-Free Messaging
Whatsup
Cyberience Project Manager
SCAN » Home
Im In Your Leenucks Box Changing Your Password | Darknet - The Darkside
The Looney Tunes SoundSource
Getting Started - Symantec Corp.
House M.D. Guide: Fox TV Show Episodes, Characters, Quotes, DVDs
xkcd - A webcomic of romance, sarcasm, math, and language - By Randall Munroe
DRU Disc Remastering Utility - DellLinuxWiki
Debian Administration :: Network Administration : Installation of Tacacs+, Ranci...
Stay Safe Online. National Cyber Security Alliance. Events.
Transcode_Wiki: Transcode Wiki
polishlinux.org » UNIX Pipes, Streams and Redirections Explained
AdmiNotes by Christopher Harvey
NoteMesh - collaborate to graduate
Notecentric - A Place For Your Class Notes
RubyForge: websitary - Webpage/RSS Monitor: Project Info
exscript - Google Code
YouTube - Classic Chris Pirillo
Linux.com :: The dangers of automatic updates
the point of making things idiotproof is that we can all be idiots sometimes
SimManTools
home [Octopussy]
Senuti - Download
Demystifying the Out of Office agent
IBM - Guide to the Notes/Domino Out of Office. Part 3: Configuration of the Out ...
Lotus Notes Out of Office Agent, revisited: Part 1
ThreatSTOP - Internet.Security.Community - Home
Modifying PDF Files With PDFedit On Ubuntu Feisty Fawn | HowtoForge - Linux Howt...
Home | GNUCITIZEN
How to Connect to and Shadow the Console Session with Windows Server 2003 Termin...
Support Alert Newsletter Issue 149, Free Edition
Cornell Notetaking Method Custom PDF Generator
ONLamp.com -- Quick and Clean PHP Forms
win-get Repository
Adaptive Planning - Budgeting Forecasting Applications and Financial Reporting A...
Wing Commander Saga - Home
t
arpalert.org: arpalert modules page
SourceForge.net: Checklist
Love it. This is what Ive been looking for forever.
MyRatePlan.com - Unbiased Comparison Shopping for Services
Open Virtual Machine Tools
HP Jetdirect Download Manager
PickupLine Official Website
SourceForge.net: EarToner
Techm4sters
Home & Home Office - Symantec Corp.
WDS Forum
Backup Exec 11d Best Practices Guides - Backup Exec 11d - STN Peer-to-Peer Discu...
Backup Exec License Assessment Tool - Backup Exec 11d - STN Peer-to-Peer Discuss...
SourceForge.net: FOG - Free, Open-Source Ghost
Heath Stewart"s Blog : Find the Product
How to find de Product code for de uninstallations
ADQueueLoop freeware is a command line tool to watch the Active Directory Replic...
JkDefrag v3.24
safeboot safe?
Network Documentation - Home
Rate My Network Diagram
Windows PowerShell
PowerShell Community Extensions - Home
SharePoint Explorer for WSS3
DirectoryPass - Open source password protection, web site security and Apache .h...
Active Healthy Lifestyles
TapeOp.com
SLB: Motorola RAZR V3 – How to charge and transfer files to your PC!
Bugmenot.com - login with these free web passwords to bypass compulsory registra...
CalNetAD Documentation
Jackson Technical - How to Move Symantec Clients from one parent Server to Anoth...
CompilerBenchmarks" Page
update-zoneinfo
Linux.com :: Keep your laptop and PC in Unison
Where Work Is a Religion, Work Burnout Is Its Crisis of Faith -- New York Magazi...
PC PitStop - value leader in SCSI and SATA enclosures and accessories!
hackers @ microsoft
The Ethical Hacker Network - Nmap from an Ethical Hacker"s View Part 1
WEB HOSTING Reviews: Over 5,000 User Reviews, Search And Compare Tools, and Coup...
Welcome To Creative Loafing
Coding Horror: Screencasting for Windows
Checkstyle - Checkstyle 4.3
vm4all.com
Solaris Jumpstart Automated Install
How can I improve performance using 3ware controllers with the Linux 2.6 kernel?
Clonezilla
Download details: SyncToy v1.4
techPresident – Fact-Checking the Candidates: PolitiFact
UKSatelliteHelp.co.uk » Satellite Alignment Calculator 2.0
Tactical Leadership : Weblog
Michael Wilde (the Wilde)
phpLogCon :: a syslog data viewer for the web
Solaris Troubleshooting and Performance Tuning
Fall, 2005 Troubleshooting Professional Magazine: Shotgunning
Troubleshooting Methodology
disktype - disk format detection
Open1X.org
BlueProximity - GNOME Bluetooth device distance detection and automatic locking ...
g
HANSA International: HANSACANYON
Hampton Roads Technology Council - Technology Center for Southeastern Virginia
Test your web design in different browsers - Browsershots
Vischeck: VischeckURL
Stratus Technologies : Ultra High Availability Servers by Stratus Technologies,a...
Leak-tests results - matousec.com
For personal firewalls
Coldwatt, Inc
iSuppli Corporation : Applied Market Intelligence
indii.org » Tint Photo Editor
Optimize XP
utbound TCP connection attempts per second to 10 from an "unlimited" number (16777214) in SP1. With the new implementation, if a P2P or some other network program attempts to connect to 100 sites at once, it would only be able to connect to 10 per second,
FTP Clients & Servers at All About Jake
pm411.org
Wakefield Peanut Company LLC
cinnamon toasted almonds - yummy
WebHome < Main < TWiki
ntains all current rules, added as each is put into the main tarball and cvs repository. The rule author if available is primarily responsible for the documentation of a rule, however the entire community is encouraged and welcomed to contribute or docume
Ultimate Deployment
Metasploit/Contents - Wikibooks, collection of open-content textbooks
Individual Income Tax Rates-2007
ISECOM - Institute for Security and Open Methodologies
The ISO 17799 Directory.
The Information Security Forum - The Forum"s Standard of Good Practice for Infor...
Python Package Index : Liten 0.1a
RT mailgate - O"Reilly Linux DevCenter Blog
The Many Faces of Mike McBride
WXPNews
The Internet Review of Science Fiction
University of Delaware Library: Special Collections - From Verne to Vonnegut
mirmon - monitor the status of mirrors
Energy Prices State by State - Data Center Knowledge
Building a (fast) Wikipedia offline reader
Anatomy of the Linux networking stack
obby - Trac
Jackson Technical - Tulsa Computer Service and Repair, Networking and Support - ...
How-To Central: Home Clinic - Popular Mechanics
DNS Resources Directory (DNSRD)
The Appliance Blog
Appliance411 - Appliance Purchasing, Appliance Service and Appliance Repair Part...
PatientOS - an open source healthcare information system
PatientOS is a free clinical information management system for hospitals and healthcare practitioners. This software is for physicians, nursing, pharmacy, the laboratory and eventually all hospital departments.
EtreeWiki - Etree Wiki
WANem: The WAN emulator
Free network nightmare.
FreePOPs
Revolution Systems Blog: A Guide to Hiring Programmers: The High Cost of Low Qua...
How to Give Instructions - lifehack.org
Pantry, command-line nutrient analyzer
puppet - Trac
Hard Token Mamagment Framework - Welcome
Network Equipment & Resources Database - Homepage
DRAM latency explained
CCNA Certification, CCNP Certification, CCNA Training, CCNP Training, Cisco Trai...
Configuring VLANs
http://attrition.org/dataloss/dataloss.csv
Are you SURE you want to do this?
OpenCiphers
Midnight Research Labs - wicrawl
RIA-Media Software - Overview
It"s not always malware: How to fix the top 10 Internet Explorer issues
Red X
LinuxDevCenter.com -- An Introduction to Linux Audio
Imperialists :: View Forum - Imperialism 1
Macenterprise.org
AFP548 - Changing the world one server at a time.
Mac Manager
RegAlyzer - The home of Spybot-S&D!
NPR : Support Group Strengthens Mother-Daughter Bond
FreeIPMI - Home
BotHunter Free Internet Distribution Page
Bflow_Home
Trend Micro
CustomizeGoogle: Improve Your Google Experience -- Firefox Extension
A Defcon survival guide | The Register
tcptrack homepage
Home - load testing tool - stress testing tool - WebLOAD
The Perltidy Home Page
Home - PCI Security Standards Council
Cropper - Home
Windows SteadyState: What Is It?
Migratr - move your photos to and from Flickr and other services - The Red Ferre...
FEBE Firefox Extension
About
IronKey
Food Network: Baked Macaroni and Cheese
Phone-man"s Home Phone Wiring Advice Page - Wire Color Codes
Launchy: The Open Source Keystroke Launcher for Windows
mkisofs and cdrecord 2.01 for Windows (Cygwin) (Updated binaries) | smithii.com
InfraRecorder
cdrtfe - cdrtools/Mode2CDMaker/VCDImager Frontend (GUI)
Documenting a virtualization project
Personal Software Inspector (PSI) - Secunia
How To Get Out Of A Speeding Ticket ~ usrbingeek’s musings
MySQL Commands
WeedIT
Rex Swain"s HTTP Viewer
The Garden Monitor Project
VirusTotal - Free Online Virus and Malware Scan
HelpDeskNotes - Help Desk and Technical Support
Forensic Incident Response
Telephone Script: By Reader Request
VMmark - VMware
SME Server Inc. - Home
SMB IT in a box
zsync
Cliend-side rsync. No special server needed.
FastNSF.com | Dedicated To Practical Domino Performance
The Elder Geek on Windows XP
Exploiting the iPhone
Free-SA - statistic analyzer
Cisco Tips & Tricks
HardInfo: System Profiler and Benchmark
Joel Oleson"s SharePoint Land : IISReset is bruteforce, there are civilized alte...
SystemTools.com - Windows NT/2000/XP/2003 System Management Software
Linux.com :: A beginner"s guide to IRC
The IRC Prelude
Great Firewall of China | Home
Microsoft SharedView Beta
FTester - Firewall Tester and IDS Testing tool | Darknet - The Darkside
iTWire - Hacking the TomTom ONE through Open Source
SourceForge.net: TraffStats
PING (Partimage Is Not Ghost)
Reed Media Services -- sendmail_stats -- sendmail log analyzer
T-1 Versus ISDN-PRI ~ IT Professionals
Active Directory Explorer v1.0
Insure your iPhone, because AT&T won"t - The Unofficial Apple Weblog (TUAW)
Print Server Migration using Print Migrator 3.1 - microsoft.public.windows.serve...
Getting Started: Table of Contents[SAP for MIT Documentation on the Web]
polishlinux.org » Screen: Tips & Tricks
SAP R/3 Interview Questions
About recordMyDesktop
jeff"s WebLog : how to cleanly start and stop explorer.exe
Appendix E: Configuring BITS 2.0 and 3.0 for Download Performance
Force installation of WSUS or Windows Updates, email results - WSUS Forums
Microsoft SharePoint Products and Technologies Team Blog : Tons of New SharePoin...
How to submit your firewall logs to DShield | DShield; Cooperative Network Secur...
J.K.Rowling Official Site - Harry Potter and more
The Leaky Cauldron - Harry Potter and the Deathly Hallows (book 7), Harry Potter...
MuggleNet | The ULTIMATE Harry Potter Site - Harry Potter and the Deathly Hallow...
UserAssist « Didier Stevens
A Periodic Table of Visualization Methods
eXtreme Power Supply Calculator Lite v2.5
Kraft - Software für kleines Business
Welcome to EasyUbuntu
Install all the good stuff with no fuss
Tech/libsmbios livecd - DellLinuxWiki
O"Reilly Network -- Getting Started with MySQL Proxy
Free Cisco Documentation & Tutorials
Cisco - IOS Tutorial
Linux Postfix mail server SSL certificate installations and configuration | nixC...
The Japan Times Online -- National News, Business News, Opinion, Sports, Enterta...
qLabels
All About Circuits: Free Electric Circuits Textbooks
~stevenf: W2: A Little Wiki
Elf | Your Personal Email Library Reminder Service
Ultimate WRT54G Hacking
Freeware MagicISO Virtual CD/DVD-ROM(MagicDisc) Overview
gumstix - way small computing
Sys Admin
CATS Applicant Tracking System - Home
Veeam - tools for VMware virtual machines management
PHD Help Desk
WirelessAdvisor.com Forums Wireless Phone Service Plans & Reviews
American Tower Home
Learning Center Home - HTML Version
Verizon Learning Center - How Cell Phones Work - Page 1 of 8
More secret iPhone codes - The Unofficial Apple Weblog (TUAW)
Smart Shopper"s Fish Picks
Download details: Virtual Machine Remote Control Client Plus (VMRCplus)
Tech ARP - PC Power Management Guide Rev. 2.0
System Administrator Appreciation Day
VirtualBox
Dynagen
Main Page - VNUML-WIKI
Dynamips / Dynagen Tutorial
A Server Primer for the Channel | TG Daily
How to Get Rid of Things
FlyLady.net: Declutter 15 Minutes per Day
Unclutterer: Tips
Ubuntu Geek -- Tips,Howtos,Tutorials and Articles about Ubuntu Linux (Dapper - E...
Twibright Optar
Decoding the Golay code by hand
CIDR Report
Secure IOS Template v4.7 23 MAY 2007 Rob Thomas robt@cymru.com
Center for Internet Security - Standards
iPhoneSecuritySettings
Laugh along with GNU - GNU Project - Free Software Foundation (FSF)
The Team Cymru Darknet Project
Chess.com - Learn. Share. Play.
iSubwayMaps.com
Amigo.Net: Modem Init Strings
exPhone — clever ways to responsibly reuse or recycle your old cell phone
Webshell
Pixy: XSS and SQLI Scanner for PHP
70-291 - IP Address Lease Process ~ IT Professionals
rsync.net - Secure Offsite Backups, Offsite Data Storage and Remote Encrypted Fi...
Iptables Tutorial 1.2.2
syslogd supporting MySQL and TCP :: rsyslog
APTonCD
Linux.com :: Burning Debian packages and repositories to disc with APTonCD and a...
Manual:Contents - MediaWiki
Manual:Installation - MediaWiki
F7 MediaWiki
LocalSettings.php file is moved from the config directory, you can click on the "this link" to go to your Wiki. Do so now.
BlackBerry Cool | The voice of the BlackBerry community
Exchange Server 2003 Performance Tools
Prepaid iPhone in a Nutshell - The Unofficial Apple Weblog (TUAW)
SnortSMS Project
Welcome to M Senthil Kumar"s Blog : SharePoint 2007 Developers Resources
ExampleAdultSite.com
OAPScan - Oracle Application Server Scanner | Darknet - The Darkside
WebHome < Motion < TWiki
Eli"s Homepage
Age of Empires Heaven
OpenSS7 Project
Configuring Samba 3.0 To Use The ADS Security Mode (CentOS) | HowtoForge - Linux...
TidBITS: Securing Communications with SSL/TLS: A High-Level Overview
Viewing American class divisions through Facebook and MySpace
HeidiSQL - MySQL made easy
Training Home Page - Microsoft Office Online
Help and How-to Home Page - Microsoft Office Online
SecureLinx Spider - The Next Generation KVM over IP
zero U IP KVM
JA-SIG Central Authentication Service (CAS)
The Ultimate Free Guide to Stop Viruses and Spyware ~ Chris Pirillo
Love it.
Home - OpenSourceCMS
Gadmintools - Home
Fundamentals of Personal Financial Planning
sqlninja 0.1.2 Released for Download - SQL Injection Tool »
Freeware Tools and Utilities for Windows
Marketcircle: iPhoney
iPhone webpage display simulator
Agile Product Management
CamStudio - Free Screen Recording Software
Traceroute, Ping, Domain Name Server (DNS) Lookup, WHOIS, and DNS Records Lookup
Snuffle 2005
http://cr.yp.to/publicfile.html
pyAwale - A simple Awale game. - Summary [Gna!]
Denver Water - Main Page
Cancerbero Project: What"s Cancerbero
Yatsuhashi - Wikipedia, the free encyclopedia
Cisco Information
E-cycling Central: Find a Recycler
IPTraf - An IP Network Monitor
Open Source Two-factor authentication: The WiKID Community Edition — WiKID Open ...
WiKID Commercial Open Source Two-Factor Authentication — WiKID Strong Authentica...
Home | NetMRG
WSUS Forums (Powered by Invision Power Board)
SlimTimer - Time Tracking without the Timesheet
Marcus J. Ranum - What Sun Tzu Would Say
A+ Class Info
Connected: An Internet Encyclopedia
Marcus J. Ranum, Computer Security
The Six Dumbest Ideas in Computer Security
stumbler dot net
Geekcorps
Mirek"s Free Windows Software
Password Chart
Information Governance Engagement Area: A Data Discovery Department? | Legal Tec...
Should a Litigation Hold Include Backup Tapes? « e-Discovery Team
The scope of a party’s preservation obligation can be described as follows: Once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a litigation hold to ensure the preservation o
Laptop Repair Help
aphpkb website
Router as DNS Server
Main Page - Forensics Wiki
GPS Time Server T1000 Precision Clock
101 Most Commonly Asked iPhone Questions - iPhone Forum
Lotus Geek :: Unable to delete Blackberry emails? Here"s a solution...
John R. Durant"s WebLog : Time/Resources/Features
The triangle
Jason Fried on The Project Triangle | 43 Folders
The Triangle
PIPE Networks DC3
Building a datacenter in over 60days
Chris Sanders » The Vulnerability/Exposure Model
Love it
AutoScan - Network Monitoring And Management Tool
How to use automatic TCP/IP addressing without a DHCP server
Linux News: Software: It"s Time to Consider Open Source Software, Part 1
Linux News: Software: It"s Time to Consider Open Source Software, Part 2
CIDR SUBNET MASK CHEATSHEET & ICMP TYPE CODES
5.192
Access Database Corruption Repair Guide
v14, i03: SNMP Trap Handling with Nagios
BlackBerryForums.com : Your Number One BlackBerry Community
SourceForge.net: phpberrystats
Free Firewall Software - Comodo™ Firewall
Case Dissection: General Electric - Does GE Have the Best I.T.?
Ian Bell"s Elite pages
New Page 1
RTsoft - Dink Smallwood
Wing Commander - Privateer Gemini Gold
Dune II The Maker - Home
Babylon 5: I’ve Found Her — Space Dream Factory
MIT ECAP -- e-commerce architecture program
Bluediving - Next generation bluetooth security tool
Women Employed : Welcome
National Association for the Self-Employed
IT Security @ CIS @ Brown
manybooks.net - Free eBooks for your PDA, iPod, or eBook Reader
100 Words Every High School Graduate Should Know published by Houghton Mifflin C...
nettee home page, created Apr 28, 2005, at 15:03
How Hard Drives Work... - Icrontic.com
Nerd Vittles » Introducing Telephone Reminders 3.0: The Free Asterisk Telephone ...
GTKO
pyvnc2swf
vncrec - simple VNC session recorder and player
Association of Information Technology Professionals -- AITP
Welcome to Dirvish
PDFBox - Java PDF Library
OVAL - Downloads
Mightycare Solutions GmbH
VMTSPatchManager
Structured Wiring Systems
Structured Wiring - Smart home wiring resources, panels, DIY networking kits and...
Getting Connected: Structured Wiring Basics
ACM Queue - DNS Complexity: A journey into the sublime complexity of the domain ...
IT Resource Center forums - JetDirect 615n
Calendar Of Updates Calendar
Download details: Group Policy Inventory (GPInventory.exe)
Collectors Universe Forums
Free CMMS Home Page
Facility management software - facility maintenance management is easy and affor...
Vertex42 - Excel Templates, Tutorials, and Software
Foundstone Blast - TCP Network Service Stress Test Tool »
powershell book
Cogito - Home
Automount USB drives in Debian | mattfleming.com
SlySoft Virtual CloneDrive
CIO Newsletters
QoS And Traffic Shaping For VoIP Users Using iproute2 And Asterisk | HowtoForge ...
Tuning LAMP systems, Part 2: Optimizing Apache and PHP
How to secure VNC remote access with two-factor authentication | HowtoForge - Li...
RT Scratches a Trouble-Ticketing Itch
Ubuntu-Watch » Blog Archive » More than I ever wanted to know about chroot jails
The String Theory of How to Retain Geeks? - O"Reilly ONLamp Blog
The Dnssec-Tools Project
Introduction-The Internet Protocol Journal - Cisco Systems
All about qmailrocks.org
VirusKeeper anti virus and anti spyware for Windows
Home | Ubuntu Studio
ardour | the new digital audio workstation
Ardour is a digital audio workstation. You can use it to record, edit and mix multi-track audio. You can produce your own CDs, mix video soundtracks, or just experiment with new ideas about music and sound.
FirstPartner: The Proposition Development Company
lgsp documentation
complete freeware collection » xtort.net
ACPI - Advanced Configuration and Power Interface
ipMonitor Support Portal :: SNMP Center
very handy, good layout to snmp
TalentSpring Candidates
acm.geer.0704.pdf (application/pdf Object)
pwdump6: Pissing Off McAfee Since 2005
fgdump: Take *THAT* LSASS!
Coding Horror: Remote Desktop Tips and Tricks
IT Procurement: Worst Practices | Advice and Opinion
GnuWin32
Structured Wiring - How To - wire your own home network, video and telephone
Webjeweller.com Remove Watch Links
Panda Anti-Rootkit
Drive Manager
AVG Anti-Virus and Internet Security - AVG Anti-Rootkit Free Edition
Neal"s Admin.Notes.: Calculating real-time throughput between endpoints in a LAN...
Sambascan2 - Asturio Kee
Linux system auditing by example
tinc
UWB the The WiMedia Way
AnandTech - Consolidated Security Thread | Windows Vista / 2K / XP
Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites
Main Page - BlackBerryFAQ
SHPEGS - Solar Heat Pump Electrical Generation System
Statisticians in History
wicd - Home
project-lockdown.pdf (application/pdf Object)
Network security articles and hacking prevention resources for the government an...
SpeckProducts
About - IPython
Elektron
Make your own Ethernet Loopback connector | www.TikkiWeb.net
PENNsound
Open Management Consortium - Home
The Metasploit Project
Microsoft Windows Server Update Services
Download details: ADMX Migrator
IBM developerWorks : Lotus : Notes from Lotus Support
SQLBuster
PhotoRec: Digital Camera Recovery and File Recovery
LogFS - LogFS
TightProjector Software
Linux.com | Turn your Linux box into a PDF-making machine
http://sbd.sourceforge.net/
IndeView - Independent Presentation Viewer (Free Software)
lcdtest: LCD Monitor Test Pattern Generator
with win32 compile
An Educators Guide to School Networks
CCNA Articles
Faculty of Science : Vrije Universiteit
SuTree - free video "how to" lessons and tutorials
ardour | the new digital audio workstation
Inferential Statistics
How To Keep Your Computer Free From Pests And Predators ~ Web Developers
]project-open[ - Open-Source Based Project Management Software
Copy Handler home page - Home
Keywatch - an open source, OSGI-based monitoring system
O"Reilly Network -- Top 7 Things System Administrators Forget to Do
ConMan: The Console Manager
SSL-Explorer: The World"s First Browser-Based, Open Source SSL VPN
CheckDNS - Internet Domain Name Server analysis and reporter
http://home.hetnet.nl/~riky44/s/simcity_4_a.txt
zone
Max The Battery Life Of Your New BlackBerry - BlackBerryForums.com : Your Number...
BlackBerry Thumb Touch Typist Guide (Typing 60 WPM without looking!) - BlackBerr...
[User] HOWTO: Use BlackBerry As Modem For Laptop! - BlackBerryForums.com : Your ...
Blackberry Tips and Tricks - BlackBerryForums.com : Your Number One BlackBerry C...
How to Use the Net User Command
TacVoIP: Hardcore VoIP Security
Linux.com | OpenOffice.org Password Cracker is what you make of it
GameFAQs: SimCity 4 (PC) FAQ/Strategy Guide by PyroFalkon
GameFAQs: SimCity 4 (PC) FAQ by thy451
SimCity Central - SimCity 4 and SimCity 5 Coverage
How to Align Exchange I/O with Storage Track Boundaries
SQLIO Disk Subsystem Benchmark Tool
Tracks
O"Reilly Network -- Five Basic Mistakes Not to Make in DNS
Shashank"s etc log
Simtropolis - The Largest Online SimCity 4 Community
200704251931.jpg (JPEG Image, 1965x1417 pixels)
Internet Public Library:
O"Reilly Open Books Project
UnixTextProcessing.pdf (application/pdf Object)
TinyUML Wiki: Mission
Blood, Bullets, Bombs and Bandwidth
New Scientist Technology Blog: Seeing through walls
Linux.com | Put your OpenSSH server in SSHjail
SSHjail for openSSH
Vidavee Open Source Projects: NVentory
SRecord 1.32
fpschultze - Howto - Batch Howto - How To Automate Windows DHCP Server Configura...
Tech Heads Incorporated
nagios:pnp_en [Ederdrom.de]
Out of the Frying Pan, and into the Cube
OpenRCE
Auto Project Planner - Introduction
An insider"s guide to writing robust, understandable, maintainable, state-of-the...
3 Steps to Creating Ringtones with Ubuntu
ITerating: Wiki-Based Software Guide
TraffStats
System Information Data Collector for HP-UX
Business Plans and Profiles Index, Carnegie Library of Pittsburgh
REDUCE.ORG
Michael S. Dell - Chairman of the Board
Hacking Ubuntu to Improve Performance
Record Editor
Record Editor
Dealing with winmail.dat and unreadable email attachments
Bandwidth Monitoring Tools For Linux -- Ubuntu Geek
Free Windows Management Software Tools by Quest Software
GroupStudy.com - CCIE, CCNA, CCNP and other Cisco Certifications
VirtualPod Downloads
Cool Solutions: Getting USB Devices to work under Windows XP
Cyber-Defense.org : DAD Log Analyzer
FILExt - The File Extension Source
Paint Touch-up Techniques
SplendidCRM | Enterprise CRM Software for System Integrators - Microsoft Open So...
vnStat - network traffic monitor for Linux
mailsend - send mail via SMTP Protocol
CYBSEC Security Systems - Research
Linux News: Software: Free Software Foundation"s Richard Stallman: "Live Cheaply...
"Live cheaply, Don"t buy a house, a car or have children. The problem is they"re expensive and you have to spend all your time making money to pay for them." - rms
displayport-side-by-side-dvi-and-vga.jpg (JPEG Image, 440x192 pixels)
packetfence / news
GCALDaemon - Project Home
aircrack-ptw
Much improved variant of aircrack
Peter"s Solaris Zone
Clocking IT
ISDN Cause Codes
World History for Us All
BYTE.com
The Windows File Shredder - Lifehacker
Guide to Deploying Mozilla Firefox in an Enterprise Published - MozillaZine Talk...
www.dwipal.com - JMIBBrowser, Java Based SNMP MIB Browser
GrokEVT Home
Connections no longer use Local Area Network automatic configuration and proxy s...
Fix to use Local Area Network proxy settings to apply to dialup connections
WindowsDevCenter.com -- PC Deployment with WinPE
ASPN : Python Cookbook : Hex-dump port-forwarding network proxy server
Twisted – Trac
Task Spooler
http://crossroads.e-tunity.com/
Parallelize applications for faster Linux booting
VoIPong - Voice over IP ( VoIP ) sniffer and call detector
CCleaner.com
CA Virus Signature Updates
Monilog - Windows Event Log Analysis
Dia a drawing program
Bandwidthmeter - a speed test script
ADN - Win32 Active Directory Navigator »
ecoIron - All these whirring boxes.: Emergy-C, The Low Wattage Palette
OpenIPMI
wsus - Windows Server Update Services Wiki
Google Sitemap Generator for Windows :: GSiteCrawler
sitemaps.org - Home
Primeleaf Consulting :: Enterprise Document Management & Workflow Systems
no free but interesting
Roadnav
bit-tech.net | Introduction to hard drive technology
OpenCongress
Project Observer Wiki | Main / HomePage
Will do network diagrams??
SmartronixStore: Welcome to the SmartronixStore!
Yost Serial Device Wiring Standard
the 5-in-1 network admin"s cable
Im in love
Guarantee of Service support over MPLS using active techniques.
BGP and MPLS-Based VPNs
MPLS and Related technolgies tutorial and links
Lines to VoIP Bandwidth Calculator
iFAX Solutions: Where HylaFAX Means Business - About HylaSAP
Chris"s Wiki :: blog/sysadmin/MachineRoomArchaeology
Download details: Hotfix Scan Tool for Windows Server 2003 Service Pack 2 Deploy...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
SANS Internet Storm Center; Cooperative Network Security Community - Internet Se...
Hardening Linux Web Servers
IP subnetting made easy
Year 2007 problem - Wikipedia, the free encyclopedia
Virtrix - Virtual Tricks
Virtrix - Virtual Tricks: VMware: (Auto)patching your ESX host
Daylight Saving Time - Technical Chats
RTO Discover
.:: linux howtos ~ linux howtos home ::.
The trouble with MPLS
Argus - System and Network Monitoring Software
dhcp_probe
PwdHash
File Taxes Online - Do Taxes FREE - File Taxes With TaxACT
SourceForge.net: TaxGeek
Juniper Networks : Customer Support Center : SSG 5 Secure Services Gateway
Spoonfed Hacking - How to Crack WEP (Local Hacking) Tutorial
PReplay - A pcap Network Traffic Replay Tool for Windows »
Information about Daylight Saving Time (DST) and NIST Time Services
Documeron Home Page. Download Advanced Recent Documents Manager. Freeware. Worth...
watchmycell.com | Home
Find your minutes
NagiosCommunity.org
Computor Companion - The Practical Guide to Computing - Winter 2006/2007
Disc Space Reporter
Simple DST Fix - How Come Nobody Has Mentioned This? « The Blade by Ron Schenone...
BerliOS Developer: Project Info - Iso9600 Analyzer Tool
LibriVox
2007 DST Changes And Impacts on Computers
UC Santa Cruz - Information Technology Services - Daylight Savings Changes for 2...
Switching your Linux systems to the new DST
Timezone data
Jeff Hayes’ Security Blog » Blog Archive » Daylight Savings Time
Computing Facilities - School of Computer Science - Carnegie Mellon
Ferret
SourceForge.net: sshguard
KeePassX - The Official KeePassX Homepage
Cisco Blog
TFTPD32 : a free TFTP server and a free GPL DHCP server for windows
Elemental Network Consulting - Undocumented Cisco Commands
Squidguard
dl_smarter_customers.pdf (application/pdf Object)
U.S. Daylight Saving Time (DST) Changes for 2007 [IP Application Services] - Ci...
OpenPrinting - The Linux Foundation
eHour -
Structured Wiring - How To - wire your own home network, video and telephone
Copper in Your Home: Electrical & Communications Wiring
Home Wiring and Electrical Installation Projects for the Do-it-Yourself"er
Rands In Repose: A Glimpse and a Hook
SpyBye
Short Message Service / SMS Tutorial
Linux.com | Using squidGuard for content filtering
GNUJersey
Time Management for *this* System Administrator « Musings of an anonymous geek
Tom Limoncelli"s time management taken from paper to digital.
onboard audio not working w/ubuntu on M2NPV-VM
ATSlog - about the program.
NOPworklog | nopdesign.sk
Tokyoahead - Better Awstats
Amazon S3 tools - Command line S3 client
Filesystem Hierarchy Standard
Debian/Ubuntu Tips & Tricks | Debuntu.org: .deb packages, Unix/Linux Tutorials a...
Open Management Consortium - Members - Members
RCDRUMMOND.NET: Projects/FBDUMP
Preparing for Daylight Saving Time changes in 2007
ForensiT
simply amazing.
The 80 PLUS Program | Home
Colony West Software-Content
Disk Investigator Info and Download page
Help and Support
False Positive Submission
LC ISO Creator
ADTool - Active Directory Domain Listing Tool »
nag@matrix.com
CrypTool - Homepage
Folder Size for Windows Explorer
shush
Woodhead NT4 usb driver
And here I didnt think they made one.
Pseudopod
Gujin boot/Linux/system loader
Very nifty concept. Might take out grub as grub has removed lilo
windowsupdate Upgrading to Service Pack 2 Issues
Aaron Margosis" WebLog : Setting color for *all* CMD shells based on admin/eleva...
Tsung
SAP Blog: Free ABAP Coding Guide from SAP Professional Journal
Linux.com | Make your own packages for Debian-based systems
Main Page - ClusterSSH
Tero-dump wikipedia to html converter
Littlefish Project Details
cable modem monitoring script
mitsubishi.com Mitsubishi Companies
about - Etherboot/GPXE Wiki
Cedar Backup
GSkill.com :: View topic - Asus M2NPV-VM motherboard QVL list and bios setup
So couldnt find this last night. :(
Daylight-saving bug could foil computers - CNN.com
And the media is off folks
Complete MOSS licensing info - Brain Dump
start [OpenRRCP]
SourceForge.net: Riverdrums Load Balancer
Sciret - Knowledge Base
mkvtoolnix -- Matroska tools for Linux/Unix and Windows
RackTables: management framework for rackspace, IP addresses, servers and more!
TidBITS: Daylight Saving Time Saved
Rapidshare Books
Uncle Ted"s Guide To Communications Cabling
Juniper Networks : Customer Support Center : SSG 5 Secure Services Gateway
Free Vista Drivers - RadarSync
Restoring Safe Mode with a .REG file « Didier Stevens
FlightAware - Free Flight Tracker - IFR Flight Status, Tracking, History, Maps
Firefox 2 Tweak Guide - TechSpot
Hidden Administrator - Program for remote administration of computers
CurrPorts: View Opened TCP/IP ports / connections on Windows
Geek to Live: Encrypt your web browsing session (with an SSH SOCKS proxy) - Life...
BigAdmin: DST: Daylight Saving Time Changes (2007)
Tulip Software home page
hewlett-packard LaserJet Point and Print
hewlett-packard LaserJet beta
CPU-Z
http://www.home.unix-ag.org/simon/woof
Linux.com | My sysadmin toolbox
Karen"s Power Tools
documentation: Content
Index of /~shd/foss/pmr
ZIPEncryptFTP « Didier Stevens
THC-HYDRA - fast and flexible network login hacker
Cisco Systems: Embedded Event Manager (EEM) Scripting Community
EVDOmaps - User Based EVDO Rev A Mapping and Coverage Tool
JODConverter | Art of Solving
japanese-vocabulary - Google Code
ipod-tutorial.pdf (application/pdf Object)
IBM - Lotus software: Daylight Saving Time (DST) changes for 2007 will affect Lo...
Rutgers University Computing Services - Camden
Rutgers University Computing Services - Camden
2007 time zone update for Microsoft Windows operating systems
Cromfs: Compressed ROM filesystem for Linux (user-space)
enchanter - Google Code
SafeKeep Home
ifixipodsfast.com iPod How To Video Tutorials
Vulnwatch: Multiple vulnerabilities in SAP WebAS 6.40 and 7.00 (technical detail...
Association of Shareware Professionals: Portable Application Description (PAD)
mcnaught3_kemppainen.jpg (JPEG Image, 1337x460 pixels)
Absolutely lovely
Notes Goddess - Work, Food and Life
Notes Goddess - Work, Food and Life
Notes Goddess - Work, Food and Life
Daylight-Saving-Time-2007---Part-4
Daylight Saving Time 2007 - The agents
Domino Blog
Nolisting - Poor Man"s Greylisting
A guided tour of the Microsoft Command Shell : Page 1
Apple - Support - Downloads - iTunes Repair Tool for Vista 1.0
Speaking UNIX, Part 7: Command-line locution
arpalert.org: main page
signals
getsnmp
http://www.peereboom.us/iogen/
UDP Cast
Apple / Cisco iPhone litigation primer, part 1 - what"s in a trademark? - Engadg...
iPodWizard.net - Home
Catch the Daylight Savings Time Webcast again for the very first time!
DST blues got you down?
Daylight Saving Time Help and Support Center
How to configure daylight saving time for the United States in 2007
Smallvoid.com - Tips for Windows XP, 2000, NT4
:: Reviews : Open Source: Understanding the Core Principals
Time-Zone Processing with Asterisk, Part I | Linux Journal
Bcfg2 - Trac
Puppet
Why Isn"t System Administration Evolving? - O"Reilly Sysadmin
Recuva - Undelete, Unerase, File Recovery - Home
lguest (formerly lhype)
news [NagVis.org]
2007/01/28/21.58 - CentricWare Suite - Trac
VICE FUND
Appliance Parts Pros.com Discount Appliance Parts – Appliance Repair Parts
10 Simple Ways to Lower Your Computer Support Bills
Catdaddy®Carolina Moonshine
Women"s Institute for Financial Education
Airchitex Cuckoo Product
Scott Hanselman"s Computer Zen - Scott Hanselman"s 2006 Ultimate Developer and P...
IP Tables Validator Project
Bika LIMS — Bika Lab Systems
Bayden Systems - SlickRun
Merge MP3
PengYou Project - Simply collaborate - User section
Gliffy.com - Create and share diagrams online.
LaCie - LightScribe Labeler for Linux
Scanhill MSN sniffer
eBox Platform
the debian user » Blog Archive » Howto install OCS Inventory NG
DailyTech - Workaround Discovered For "Clean Install" With Vista Upgrade DVDs
DSTPatch.com
Change to DST in 2007
infoGreG - MSN Messenger v7.5 Password Decrypter for WinXP and Win2K3
WikiStartEn - Linbox Rescue Server - Trac
The Top 100 Alternative Search Engines
Database PIC Search
Long Distance Digest
Some good information if you can get around all the ads
Long Distance Carrier 1010 CODES
List of PIC codes
PortSwigger.net - web application hack tools
Ticket-IT
Network Tracker
Debian install by way of windows
ScanSSH - fast SSH server and open proxy scanner
FlyerTalk - The world"s most popular frequent flyer community
vomit - voice over misconfigured internet telephones
rebuild phone conversations from tcpdumps
LPIC-1 Linux certification training available online
winips | IP Switching made easy
Fundamental Computer Investigation Guide For Windows: Overview
Download details: Computer Investigation Guide
SourceForge.net: WinDD - Disk Dump for Windows
Port 25
Windows Wallpaper Rotator
tcping.exe - ping over a tcp connection
Pentaho Data Integration: Kettle Project
TimeTrax - Timeshifting Software for XM Satellite Radio - MP3, Record, Capture b...
Windows Server Virtualization Calculator
Telephone Tech Talk
..:.:.:: CMScout Website::A CMS for scouting::Home Page ::.:.:..
research
Security updates are available on ISO-9660 CD image files from the Microsoft Dow...
heise Security - Hands-on - Do-it-yourself Service Pack
Articles-Inventory Management and Warehouse Operations
Main Page - Project VRM
Qshift Online Document Assembly and Knowledge Management - David Munn"s Legaltec...
» Repair Tool of the Week: Driver Collector - Technibble - A Resource for Comput...
Joel Oleson"s SharePoint Land : SharePoint Deployment and Provisioning Checklist...
benjaminstrahs.com - iTube
Kimai - Time Tracking For Designers
pimpmynetwork.org :: project observer :: network management system
Cooking Guide and Recipes for Home Cooks
TommyP"s HFSLIP
2007/01/16/22.25 - FreeWRT - Trac
XXCLONE, A New Way of Cloning the Windows System Disk
Freeware Tools and Utilities for Windows
Command Line SMTP Mailer for Windows
Explaining Steve Gillmor - Joel on Software
Well it shouldnt be but it does turn out to be very comical
A Beginner"s Guide To LVM | HowtoForge - Linux Howtos and Tutorials
StorageMojo
StorageMojo » StorageMojo.com’s Price Lists
StorageMojo » Riverbed Price List
UC Berkeley Webcasts | Video and Podcasts: Spring 2007 Courses
vLite - Windows Vista configuration tool
Linux.com | Make Wget cater to your needs
phpEasyProject - Home
Issue Dealer
namistai.nl.eu.org
FtpCube - Main Page
AIIM - The Enterprise Content Management Association
Circuit Board Repair and Rework Guide
Device Info
Azureus : Java BitTorrent Client
PoDoFo
Mark Lyon"s GMail Loader (GML) - Import Your Mail into GMail
HP.com - Management - SmartStart 7.6 - Overview & Features
freeSSHd
freeSSHd
True Hacker!: GIMP Complete Tutorials
Getting more out of Nagios with NagiosGraph | LinuxLaboratory.org
pfSense » Introduction
Remote Administration For Windows
IntelliAdmin.com: Unofficial Windows 2000 Daylight Saving Time Patch
SourceForge.net: cdpr
decode
NeDi - Network Discovery Suite
The NRG Home Page
OpenSMART - The Open (System|Source) Monitoring and Reporting Tool
The Nagios Book :: NagiosBook.org :: The complete guide to installing, configuri...
PocketMod: The Free Disposable Personal Organizer
CreativeIQ: My Mac Won"t Start! A Tiny Guide.
PhotoRec - CGSecurity
Internet Public Library: POTUS
Web Design References: Tools
Benjamin Franklin | PBS
MPT: Knowing Poe: Home
gethuman 500 database
LMCrack - Windows LanMan Hash Cracking Tool with Download »
Lockout Resetter
Junction Link Magic
Tracks :: screenshots
Finally found one that might work for me. :)
LightSquid Home Site : Home
sizeasy - your size comparison website
wpa-buddy
The Keene View
PSOUG Home Puget Sound Oracle Users Group
Personal Backup (VMware) Appliance
FoxyProxy: take back your privacy
Litestep Development: News
TiddlyWiki Guides - TiddlyWikiGuides
OpenStarLogo Community Site - Home
Group-Office homepage - groupoffice - Groupware - welcome 30 download profession...
Stockpickr! Your Source for Stock Ideas
Servprise - Home
Now with Nagios Plugin Integration
RemoteCalendars, the Outlook2003"s plug-in to subscribe, delete and reload your ...
Welcome to Scriptella ETL Project
PIKT System Monitoring, Configuration Management Software
Talend Open Studio for Data Integration: Fast and Powerful Open Source ETL - Tal...
http://www.vicosys.com.hk/bwcheck/
dont like the need to turn on a service. :(
Buanzo: GNU/Linux: Freshmeat Subscriptions
Tomato Firmware | polarcloud.com
D*I*Y Planner | Paper, productivity & passion
PalmAddicts
Slyck"s Guide to The Newsgroups - Intro
Virginia DEQ - eCycling
Open Learning Initiative at Carnegie Mellon University
Videora iPod Converter - iPod Video Converter
iDirectionz - Driving Directions on your iPod
EphPod - iPod for Windows (and Linux) :: HOME
Human Resources
OBM obm.aliacom.fr
Bandwidth conversion calculator | web.forret.com
Nestopia - NES/Famicom Emulator
SynergyMX.com - Freeware and Open Source Software
Z-Cron is a central control center for scheduling and automation of software.
Linux.com | How to configure a scanner"s buttons on Linux
SafePasswd - Generate Secure Passwords
Main Page - Practical PHP Programming
dnsbl.net.au
Completewhois Multi-RBL Lookup
SourceForge.net: ACE DNS Utilities
serlook"s homepage
freshmeat.net: Project details for DMAring
microformats
Roadnav
Macintosh Garden
DBBlast
remove dust from images
/projects/ MAGiCS software online
Dante - A Free Socks Implementation
MLN - Manage Large Networks of Xen and UML virtual machines
Virtual Machine - Terminal Server
VMBK.pl
Pirates Ahoy! - Chasing Booty Since 2003 - Home
Hooked on Pirates! - a Sid Meier"s Pirates! Fansite
Sid Meier"s Pirates! Fansite - Addicted to Pirates! - http://www.addictedtopirat...
bjk: Password Manager Daemon
The Highlights » Universal Password Manager
The Road to Know Where: Ultimate List of Free Windows Software from Microsoft
BBC - Science & Nature - Sex ID
Revelation
Troubleshooting winsock2 corruption issue
Main Page - OpenTom
EpiphanyRadio -- Independent Electronica Groove Internet Radio & Music
SourceForge.net: tEthereal Network Forensic Console
SourceForge.net: DataEcho Session Reconstruction Utility
Home of A43
VLC media player - Overview
DBAComp Home Page
Steel Inventory
midi Podcast
The Edge
Really Rather Good Battles In Space - Home
pNRG :: the pmacct"s Network Resource Grapher
AdvancedRemoteInfo — MasterBootRecord.de - Matthias Zirngibl - AdvancedRemoteInf...
::Aimfix - Jayloden.com::
Terminal Server for Linux
Secure RDP of Windows Terminal Services with 2X SecureRDP
- Technibble - A Resource for Computer Repair Technicians & to get PC tech suppo...
» Repair Tool of the Week: Driver Collector - Technibble - A Resource for Comput...
VirtuaWin - Virtual Desktops for Windows
Welcome to Remote Central: Universal Remote Control Reviews & More!
nouveau Wiki - FrontPage
Software Inspector - Secunia
KACE - | The Leader in IT Automation Appliances
AptZeroconf - PhiDev - Trac
Debian Package of the Day
Midnight Research Labs - Debian Security Pkgs
apt source for the latest security binary security packages
Midnight Research Labs - wicrawl
Index of /~proski/firmware
http://www.courier-mta.org - Benchmarking mbox versus maildir
Automatic MySQL Backup
Backup your MySQL databases automatically with AutoMySQLBackup | MDLog:/sysadmin
Around the Corner v2 - MGuhlin.net - Creating a Backup Image of Your Windows Har...
Around the Corner v2 - MGuhlin.net - Creating a Backup Image of Your Windows Har...
Death and Taxes: A Visual Guide to Where Your Federal Tax Dollars Go
Big List of Free Budgeting Tools and Software » My Money Blog
The SmartMoney.com Capital-Gains Guide (Tax Guide: Personal Finance) | SmartMone...
Lotus Notes IT Management Applications- Tracker Suite
Alluc.org - Free TV-shows/Cartoons/Anime/Music Videos: ONLINE - Alluc.org - News
http://www.newciv.org/whole/schoolteacher.txt
The well-tempered Debian desktop
Multimedia Debian Packages
Burj Al Arab - Dubai - Jumeirah - One of the World"s Best Hotels
First Time
Welcome to SIPp
O"Reilly -- Safari Books Online - Home Page
ReadyMade Blog
HRMGuide.com - US Human Resources
Tom"s Resume Writing Tips
Linux Virtualization and High Performance Computing
IT Management Reference Guide
VMProfessional
Browsing All Pages
OpenSTA Users Home Page - Free Web Load and Stress Testing Tool
MOA2 VMware-admins-toolbox
VMware ESX server hints "n" tips courtesy of Trivore Corp. - [http://trivore.com...
Setting Up A PXE Install Server For Multiple Linux Distributions With Ubuntu Edg...
heise Security - Know-how - How Skype & Co. get round firewalls
Learn 10 good UNIX usage habits
Couple I dont use regularly
Computing | Work-life balance | Economist.com
Open-ILS.org | Home of the Evergreen ILS.
SONG FIGHT!
Surviving the all-nighter
Optimum X
Nifty profile delete tool
Process Monitor v1.01
Sysinternal guys are still alive in the mothership
TNV : computer network traffic visualization tool
Re: Problem with wget password parsing
Escape in hex for special characters in password
LDAP solution that works | Request Tracker | Users
Motowalls.com Gallery - Home
mon.itor.us - FREE website monitoring
Last Minute Gadget Gifts - Data Doctors Computer Services
Winmail Opener - freeware utility for opening winmail.dat and other TNEF-encoded...
Open those attachments meant for older versions of outlook
Converting Dynamic Disks Back to Basic Disks - The Lazyadmin.com
Accessing Network Traffic: SPAN Ports Vs. TAPs ~ IT Professionals
Open Source Community for Network Monitoring and Server Alerts | Hyperic Forums ...
AskApache
Activity Manager
Oggify
RightWebPage - Web Conformance Tool
AppleIIGo
Using PowerShell to find the average size in a group of files
MERIDIAN MAIL / CALL PILOT VOICE MESSAGING
the Art of Virology 02h »
HighlyDeveloped.net - Microsoft Project Viewer
Not free but only costs if print is needed
ModMyMoto - Software Modding and Updates for Motorola Phones - Powered by vBulle...
Hack the Motorola RAZR V3 Tutorial
Hack the Razr!
Who Was General Tso And Why Are We Eating His Chicken? (washingtonpost.com)
x11vnc: a VNC server for real X displays
» Sandisk Connect Plus
Shavano Music Online - Using a Volt Ohm Meter
Current Loan Rates
http://www.rockxp.org
Direct Consolidation Loan - Loan Calculator
Bluetooth echo / delay / sound distortion issues with wireless cell phone headse...
From DOS/Windows to Linux HOWTO
NagiosExchange: Categories: AddOn Projects
http://noc.hep.wisc.edu/nagiosr.txt
G-Ding.TV | Viewing Linux in a whole new way
NetPIPE
We Buy Empty Ink and Toner Cartridges
NTLDR Is Missing - How To Repair « The Blade by Ron Schenone, MVP
SourceForge.net: jnget
rEFIt - An EFI Boot Menu and Toolkit
LANrev - Automated Client Management for Mac and Windows Computers and Software
HomeExchange.com
National Association of Real Estate Investment Trusts
VideoLAN - Free Software and Open Source video streaming solution for every OS!
VideoHelp.com
Key-Based SSH Logins With PuTTY | HowtoForge - Linux Howtos and Tutorials
Winzig
hpodder
Phill"s Homepage
Electronic Discovery Services | Applied Discovery®: Court Rules
Guide to IP Layer Network Administration with Linux (http://linux-ip.net/)
National Geographic: Remembering Pearl Harbor--history, maps
SAP Docs - SAP Books and Docs by Daniel Toba
Knowledge Base Software ::
DNS gotchas and tips
Tail for Win32 - Home Page
alphaWorks : Lotus Notes Command Line Email Client : Overview
Improve LAMP security with Apache Proxy"s directive (mod_proxy)
FLEXnet AdminStudio SMS Edition
TrackWinstall
The program will run in english on english OS
Where Work Is a Religion, Work Burnout Is Its Crisis of Faith -- New York Magazi...
CSS Beauty | CSS Design, News, Jobs, Community, Web Standards
NPR : Podcast Directory
Yeah NPR gets podcasts, it is a happy day
ReplaceEm
Welcome to gqlplus!
Plain Black, makers of WebGUI - WebGUI
Offline NT Password & Registry Editor
Collaborative Protection Against Disposable Email :: undisposable.org
AltOrgPhpWiki - Ti Vo To Go
ForensiT User Profile Wizard
migration tool for profiles
Civilization Fanatics" Center: Fanatical Coverage of the Civilization Series
S K U L L B O X . N E T
InformationWeek | XP Management | Langa Letter: XP"s Little-Known "Rebuild" Comm...
TinyApps.Org : Getting BGInfo to work for all users in Terminal Services
★★★★★ AdvancedRemoteInfo — MasterBootRecord.de - Matthias Zirngibl - AdvancedRem...
UPX: the Ultimate Packer for eXecutables - Homepage
CompuApps, Inc. - Download Swissknife
BootDisk.info | The web resource for bootable Media
Software and Drivers - download HP Drive Key Boot Utility, 7.41.3790.0
humloop.pdf (application/pdf Object)
Electrical Hum Earth Loop
Download details: Windows SharePoint Services Administrator"s Guide
cheat.pdf (application/pdf Object)
Galactic Civilizations II: Beginner"s Strategy Guide - A Forum Post by Draginol
Reed Arvin # Security Tools
JavaScout"s Galactic Civilizations Database - Starting Research and Projects
The Orion Sector: Featured Games : Galactic Civilizations : Downloads
How to set up a mail server on a GNU / Linux system
Netdisco - Network Management and Discovery
SANS Institute - The SANS Security Policy Project
How To Accelerate Your Internet
English - How To Accelerate Your Internet Wiki
Image vs Unattended | Pro"s and Con"s - MSFN Forums
Updating homepage: BIOS modifications -- BIOS help and support
ATA Security eXtension BIOS
Learn Japanese Online
USBVirusScan « Didier Stevens
TuitionCoach: Guidance for Financial Aid and Paying For College
Présentation - Careless Network
SSH: Configuring SSH Secure Shell
20 Must Read HOWTOs and Guides for Linux « foogazi.com - technical aspects for t...
Cacti: The Complete RRDTool-based Graphing Solution
NSClient++ - Trac
Windows Client new home page
USB Snoopy
Pocket PC Techs - WriteSHIELD™ Screen Protector/Lil" Sync® Cable/Power Adapter A...
domain name auction, register expired domain name, register expired domain names...
Welcome to the TechNet Virtual Labs
JOOConverter | JOOReports
EICARgen « Didier Stevens
MAGic MAster project
PHPlicensewatcher - watch your FlexLM licenses
Overview of Six Sigma Sigma Six
OrangeHRM - Home
OpenHRIS - Open Source HR Information System Project
Nerd Vittles
VMware Utilities Homepage
Linux Security - Seifried Security Site
VM Back
IndexUniverse.com - The World of Indexing...and Beyond
USA Spec
ACS :: FAQ
AnnualCreditReport
HDTVexpert — Home Page
O3Spaces - The way to extend OpenOffice.org
WinMerge: Downloads
IP subnetting made easy
DocMGR - DocMGR Wiki
Spiceworks - The Free IT Desktop
Anatomy of Postfix | Linux Journal
Creating a self-signed SSL certificate
FREE GEEK: HOME
FreewareWiki - freeware & free info - A place to look for great freeware, c...
SSL Digital Certificate Technical Support - thawte
The Free Haven Project
IBM Lotus Notes Hints, Tips, and Tricks - This blog helps users learn how to Lot...
myrescue Harddisk Rescue
FIRST - Improving security together
IA Education, Training and Awareness
The Tao Of Backup
[Debian Backports]
Motorola RAZR V3C USB Drivers (File is attached to the first post!) - OSNN Forum
Devices
http://divbyzero.com/linux/Notes7.setup.sh.txt
91.7 FM WMUH Allentown Pennsylvania
Welcome to iPodMods - iPod Repair & Modification Center
Linux.com | CLI Magic: lsof
[aproc]
http://home.fnal.gov/~tarupp/
Unofficial 4004 web site
Meeting Management ~ IT Professionals
Sparse - a Semantic Parser for C
floola.com - Wiwi - Home
Debonaras - Main / HomePage browse
Debian on Intel IOP
SourceForge.net: eNetman
A2 Web Hosting : : PHP 5.1.6 Hosting, MySQL 5.0.x/4.1.x Hosting, Postgres/Postgr...
Web Polygraph
Replace Your NT4 Domain Controller with Samba 3 (Part 2)
Replace Your NT4 Domain Controller with Samba 3
the Art of Virology 00h »
Main Page - Hackingdefined
www.atribune.org - VundoFix.exe
InstallPad - Get programs faster
O"Reilly Network -- Demystifying LDAP Data
pktstat
JNTO Website | Japan In-Depth | History & Culture | Traditional Annual Events
PHARscape - Home
PHARscape - COMGT the 2G/3G utility
Cisco Router Configuration Tutorial
Event Log Explorer - FSPro Labs
Very nice
WindowsDevCenter.com -- Top 10 Tips for Using Windows PowerShell
SourceForge.net: AppleJack:Troubleshooting Tool for Macs
Run IT on a Virtual Hard Disk
Layers of File System and I/O
SourceForge.net: PeaZip
Squid NTLM authentication project
Setting up Squid for NTLM Auth
SoX - Sound eXchange | HomePage
lfhex - (Large File Hex Editor) | stoopidsimple.com
netswitch User"s Manual
Move networks on a linux system. This one is for you and me.
GNU Proxyknife - GNU Project - Free Software Foundation (FSF)
How to Fix a Stuck Pixel on an LCD Monitor - WikiHow
The Partimage Backup Page
partimage
Main Page - Partimage
Hackers Profiling Project
123Macmini.com - A Mac Mini User Community
Linux.com | Create training videos with pyvnc2swf
Openbravo - Welcome to Openbravo
Fixit Guide Series - DIY Mac & iPod Repair
[den4b] - Denis Kozlov
ReNamer
plaxoed! » Little tool to extract all files out of Sharepoint [Mark Jen’s life @...
altinity.org
Nagios (NETS notes)
Wyd - Automated Password Profiling Tool »
The Home Energy Saver
NUU - Network Update Utility
OpenChange - Download
Versatile Maintenance Tracker - VMT
Diagnostics CD
Apache Performance Tuning - Apache HTTP Server
Thrifty Mommy » Foods That Can Benefit Your Health
Sun BluePrints Online - The Sun BluePrints Guide to Solaris Containers: Virtuali...
Control the world from your web browser! - Ships Overnight - 15 Day Free Trial!
IP addressable Remote Power
Computer Science Unplugged
lrzip
Opensched
Linux, FreeBSD, OpenBSD, NetBSD, HP-UX, Tru64 Unix Documentation Project
Jafe
Moodle - A Free, Open Source Course Management System for Online Learning
LDAP Series Part IV - Installing OpenLDAP on Debian Plus Some LDAP Commentary | ...
Montessori Bookshelf
Test-Um Inc, - The Intelligent Test Solutions Company
The History of Notes and Domino
Knoda database frontend
gFast File - Home
sshban :: homepage
Download details: Windows Vista Step-by-Step Guides for IT Professionals
DMTF - Common Information Model (CIM)
LDAP Series Part III - The Historical Secrets | Linux Journal
The Nagios Book :: NagiosBook.org :: The complete guide to installing, configuri...
William Gibson - Official Website
RyanVM"s MSFN Files Page
BBC - Languages - Learn Chinese
Learn Spanish: A Free Online Tutorial
Be Jane | The First Women"s Home Improvement Resource and Online Community for D...
An Awk Primer
Free Music Theory Workbooks!
Tech News - Network Connectivity Tester
Digital Genesis Technologies - CBLM
The 2007 Microsoft Office System - Learning Portal
T1 PRI Troubleshooting Flowchart [T1/E1 & T3/E3] - Cisco Systems
Troubleshooting Serial Line Problems [T1/E1 & T3/E3] - Cisco Systems
T1: A Survival Guide: Chapter 5: Timing, Clocking,and Synchronization in the T-c...
Cisco - T1 Layer 1 Troubleshooting
Cisco T1 Guide
thinair: Diplomacy of troubleshooting and the telecom alphabet soup: T1, CRC err...
T1 Fundamentals
Troubleshooting T1 Circuits
OpenSS7: Documentation: FAQ: FAQ#13
Cisco Connection Documentation
Configuration Management: Best Practices White Paper [High Availability] - Cisc...
The Cisco-centric Open Source Exchange Community
Maintain Project | Powerful Open Source Network Management
Main Page - OpenNMS
Linux.com | How to share a scanner on your network
KDE
nPassword
Server Web Administration Tool
sgtd - Simply Getting Things Done
Windows Updates Downloader
Auto Repair Advice
SourceForge.net: vncspy
SARA
alphaWorks : KeyMan : Overview
4sysops -- Expanding a virtual VMware disk
Sean’s Obsessions » RedHat/Fedora SSL keys - removing password
Keytool cacert extraction to PEM format using OpenSSL and keytool
SSL-Cert-howto
KSB"s openssl command line Notes
Linux.com | Build a centralized log management and monitoring system
Go Awstats
3.1 Introduction
Why is the startup so funky in HP-UX
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh S...
Linux Network Printing with JetDirect
Certificate Management with OpenSSL - General Stuff
Samba-3 by Example
squish
Less Than Zero Threat, Part 1 - IT Observer
SSLBridge - Open Source Linux VPN software - Samba Browser
IBM Redbooks | Linux Client Migration Cookbook, Version 2: A Practical Planning ...
Linuxtopia - On-line Linux and Open Source Technology Books and How To Guides
openQRM
SSL Certificate FAQ from VeriSign, Inc.
Generating an SSL Certificate with Apache+mod_ssl
Gen CSR with OpenSSL (OIT)
Excellent script for Generating a Cert
Getting a head start on ITIL | InfoWorld | Analysis | 2006-10-20 | By Randy Stei...
JGUI: BLACK (Samsung i320 Smartphone)
iPod Storage Calculator | iLounge
Linux.com | CLI Magic: Salvage lost partitions with gpart
Tunneling with SSH
WebIssues | Issue tracking and team collaboration system
Lego Math Sculptures
frequently used SSL commands
The Complete Works of William Shakespeare
mytop - a top clone for MySQL
Main Page - Moto4Lin
Oracle Performance Tuning
OpenSSL to Keytool Conversion tips
Last.fm - The Social Music Revolution
Best Practices For Policy Writing ~ IT Professionals
Oracle SQL Developer (formerly Project Raptor)
PaycheckCity.com - Paycheck Calculator
PhishTank | Join the fight against phishing
MathEclipse - AJAX Online Calculator powered by Google Web Toolkit
TrustedReviews - The UKs premier source of IT News and Reviews
The complete work of Charles Darwin
Missed this the first time
iCalcreator
feudalistic Dynasties
FreeWERM - FAQs
Linux.com | OOoBasic crash course: Working with files
Squeezer2 #*#*# SQUid optimiZER 2
Oracle
Index of /~appro/linux/DVD+RW/tools/win32
Josh Highland"s Blog / Journal / Whatever
Welcome to the Government Open Source Conference 2006 website. | GOSCON "06
Fix-IT.org
How to Get out of a Cellular Service Contract - WikiHow
Main Page - su.pport.us
Home
I dont know what this is yet. It looks like some weird Hybrid
Squid Users Management
Find local grocery flyer deals weekly and plan healthy meals. Make a grocery lis...
Packages Knowledge Base Home
RyanVM"s Windows XP Post-SP2 Update Pack
Get Safe Online :: Home
happy mailing : Blat online
fabFORCE.net
AccessPDF - Pdftk
IST Database Administration
Vim Color Scheme Test
Shibboleth Project - Internet2 Middleware
Journeys" End: Setting up proxy.pac with apache2
Bust Banner Ads with Proxy Auto Config
Graeme"s squidview
Effective Meetings, Your Meeting Resource Center
Cisco Routers and Switches - TechRepublic
Configuring Network Security with ACLs
gnoMint | Certification Authority management made easy
pdfforge.org
xkcd - A webcomic of romance, sarcasm, math, and language - By Randall Munroe
Windows Administration Support Portal (elings.com)
Interesting list of links to review. The popup is kinda annoying.
HDTV Pub - High Definition Hardware, local DTV information & more...
AntennaWeb
Travel Blogs | Travel Reviews | Travel Tips | Trip Planner
Ortro
Scheduler, and other things
Cultivation: a video game by Jason Rohrer
CdromMd5sumsAfterBurning < Wikilearn < TWiki
Some things you just expect to work and then dont. Grr.
Easy Backup and Restore | Linux Journal
SourceForge.net: Files
Connect to console via RDP
PayScale - Salary Survey, Salaries, Wages, Compensation Information and Analysis
VMGuru.com
H-Inventory
lcdresource.com - Home
安全焦点::安全工具-IceSword1.18en.rar
Version control for Linux
How to Cook Everything :: Recipe Guide
File Encryption Software for Windows - AxCrypt Free AES File Encryption for Pers...
Restoration download and review - file undelete utility from SnapFiles
Main Page - CGSecurity
Category:Preferences - MozillaZine Knowledge Base
Packages Knowledge Base Home
start - Etherboot/GPXE Wiki
Remote Network Boot via PXE
Download details: Microsoft Device Emulator 1.0
freshmeat.net: Project details for reTCP
Welcome to Petri.co.il by Daniel Petri
www.atribune.org - Home
SANS - Internet Storm Center - Spam Backscatter
Good terminology review of what backscatter is
Zoho - Affordable software for individuals, small & medium business
Veeam FastSCP for VMware
Secure Computing: Product Manuals
401kBrokers
NirSoft - freeware utilities: password recovery, system utilities, desktop utili...
Lots of goodies
Defrag v2.23
Free Rainbow Tables
LotusUserGroup.org -- Home
htpasstool v1.0
iPodScreenSaver
OBD-II Trouble Codes - OBD-II DTC Trouble Codes Repair Help Site
Freediag - Vehicle Diagnostic Suite
OBD-II - On-Board Diagnostic System
networksecuritytoolkit.org
48bitLBA.com - HOME
Tools and utilities for Windows
Virtual Drive Manager - VDM
Virtual Disk Driver - VDK
SourceForge.net: phpPasswordManager
Might be what Im looking for
www.phpip.net: IPv4 address managment suite
Welcome to ChoiceTrust
AllFinancialMatters » The Bogleheads’ October Project
Enigmamusic.com - The Ultimate Enigmafan Experience
Migrating settings to a new profile - MozillaZine Knowledge Base
deep-ssh
Debian Linux (on HP) - Home
Debian on ProLiant
Adapter for Dell Power Supply
EndPCNoise.comYour CartWe Ship InternationallyLow, Competitive Prices24 Hour Shipping HOMELoginserviceabout us Silent PCs and the best quiet PC components including quiet computer cooling, quiet power supplies, quiet hard drives, and quiet CPU fans, at lo
Sjitter - Network performing tool
SqStat 1.20
The Network Simulator - ns-2
Network toolbox netwox
Main Page - OESF
1100 Mah Battery Replacement
Enterprise Data Group - Home
A Brief Guide to Certificate Management
Notes On Bringing Up A New T1 Circuit While Experiencing LMI Issues : Net Observ...
MP3FS
Todo.txt - Task tracking for command line lovers
Super Grub Disk : En
LDAP Series Part II - Netscape Directory Server | Linux Journal
LDAP Series Part I - "Bulldozer" | Linux Journal
log_analysis
Incollector
iKog - the simple todo list
Cobbler -- provisioning made simple.
xen-tools.org - Xen Software: xen-shell
ocre
Ethane - The easy to thrive ad hoc network
project management - free process, techniques, tools, tips and training
IT Project Management for Project Managers - gantthead.com
Project Management
VMware Infrastructure | VirtualCenter
VMware Virtual Machine Importer
JungleDisk - Reliable online storage powered by Amazon S3™ - Jungle Disk
Wire Management, Label Printers, Heat Shrink Tubing, Tool Boxes & Wire Loom
Learn Japanese with JapanesePod101.com
BindShell.Net: Echo Mirage
PC Wizard
DivX Labs | Propellants for the mind
Conduit Literary Magazine
TURBO CHARGE - Cell phone charger that uses a "AA" battery! Works anywhere on an...
A geek toolkit must
SourceForge.net: SQLGotcha
Hardened-PHP Project - PHP Security - Suhosin
Insecurities_in_AoE.pdf (application/pdf Object)
The Sleuth Kit & Autopsy: Digital Investigation Tools for Linux and other Unixes
Tcpreplay - Trac
Beginner"s Guide to Wireless Auditing
PhreakNIC 10 :: Nashville, Tennessee
MAKEMSI - Make MSI based installation files. Can automatically build new or upda...
Yotophoto | Find free photos... fast!
Sheet Music Collection: Lewis Music Library: MIT Libraries
The Chronicle: Site sampler
NIST Computer Security Special Publications
nerdcorehiphop.org
valuca
BASTILLE-LINUX
Debian_server
NewServer
Check list for new servers
Poetry Source : Express your felling, free poetry, poetry, poem, a new poem ever...
IBM Redbooks | Domino 7 Performance Tuning Best Practices to Get the Most Out of...
KC Softwares
Get Free Downloads on the iTunes Store!
How to get Windows PowerShell RC2
Motley Fool CAPS
Computer Antivirus Research Organization : HomePage
Ten Most Used BitTorrent Sites Compared
Tracking the source of email spam
ewido - anti-spyware and anti-malware solutions
Hak.5
NIST Net Home Page
Setup a network nightmare with linux instead of freebsd
ConsumerReports.org - 20 free ways to save energy 9/06
"ClearNet Security" : Competing for network-based security assessments
Invirtus - software to make virtual machines more accessible to more people - Tr...
Yersinia is a network tool designed to take advantage of some weakeness in diffe...
IT"s seven deadly career sins | InfoWorld | Analysis | 2006-09-18 | By Richard G...
johnny.ihackstuff.com :: I"m j0hnny. I hack stuff.
Love it
Foundstone, a division of McAfee, Inc.
Sprint PCS Software: Sprint PCS Connection Manager Software from Sprint
HFS - Http File Server
UNIX productivity tips
shc(1)
PC Engines Wireless Router Application Platform
» Drowning in Debt? 6 Tips for College Students and Recent Grads on Consumerism ...
FinAid! Financial Aid, College Scholarships and Student Loans
News on Pea-Peach project: Pack (archive, compress), Encrypt, Authenticate
HomePage - RT Wiki
Index of /quadkonsole
Consoles aplenty
Linux.com | Point, click, root: System exploitation with open tools
chordbook.com
Welcome to Simple Groupware !
Mini vMac - a miniature Macintosh emulator
cabextract
SourceForge.net: JNFA - Java NetFlow Analyzer
Openfiler — Friendly enterprise storage management platform
ISO Master: Home
News | Varnish
JungleDisk - Reliable online storage powered by Amazon S3™ - Jungle Disk
Welcome - usbcell.com
OS/2.cz -
OS2 World.Com - An International Collaborative Community
Debian Administration :: LAMP on Sarge (Apache2, PHP5, MySQL5, phpMyAdmin, Smart...
home [Dotdeb]
iProng : iPod, iTunes, and Music : News, Commentary, and Reviews : Switch to iPr...
ANSI X12 EDI Format
Kleinschmidt Inc. - The EC/EDI VAN - X12 Transaction Descriptions
recordMyDesktop Homepage
Employee Time, Attendance and Payroll Software
Epiware - Open Source Document Management Software , Online Calendar, Task Manag...
networksecuritytoolkit.org
SPF: A Sender Policy Framework to Prevent Email Forgery
ddwrt
MySQL FAQs - Command-Line End User Interface mysql
:: www.icodex.com :: ICODEX Software AG - The Integration Architects
lf382, Applications: A toolchain for transformation from paper to HTML
LSAT home page
Main - Welcome to WikyBlog.com
http corner <- mysqlblasy (MySQL backup for lazy sysadmins)
Intute - the best Web resources for education and research
uanr.com - SD/MMC card fits in floppy edge-connector
Welcome - ticalc.org
BugHunter - MalWare Removal Tool
MBROWSE
System Architecture Design, Development, Review, Security, Performance, Audit, V...
spiralbound.net » Why Modern RAID 5 is Ideal for Oracle Databases
antenna.swf (application/x-shockwave-flash Object)
Wireless Recycling
Learning - Six steps for learning difficult subjects quickly
Network Weathermap
Setting up Subversion and websvn on Debian | HowtoForge - Linux Howtos and Tutor...
Repair4MobilePhone: How to Upgrade, Repair, Disassemble a Mobile (Cellular) Phon...
YATT
KillBox.Net
LinuXchangE
CuteFlow - Open Source Document circulation / workflow system
ShowMeDo
JavaForge - CodeBeamer
webmethods like
Chaogic Systems - vHost : Main
ConTagged -- CosmoCode GmbH
AsItHappens
HelpSetMaker - An application for authoring online help information
UML CASE Tools - Free for Learning UML, Cost-Effective for Business Solutions
http tunnel
SourceForge.net: CK-ERP
Open-AudIT
VMTN Discussion Forums: Forum Home
VMTN Discussion Forums: How to install VMTools to Debian 3.1 ...
v13, i01: Emulating Networks Using User-Mode Linux
LinuxFocus, the international, multilingual volunteer GNU/Linux magazine
LinuxFocus Magazine
TCP Tuning Guide - TCP Tuning Background
Enabling High Performance Data Transfers [PSC]
Elemental Games Forum
Cisco 7200 Simulator - IPFlow Netflow Collector
Cisco Learning Blog
good ospf commands
MIT IS&T: Stock Answer Menu 7246 - Request Tracker (RT) on help.mit.edu
BigAdmin Feature Article: RT: Request Tracker, Part 2
BigAdmin Feature Article: RT: Request Tracker, Part 1
Optimal Use of Fonts on Linux
Relax & Recover
Dissy - MIPSlab
Montastic: the free website monitoring service
Global Text Project
StarForce Drivers Removal
Cisco Feature Navigator - Cisco Systems
Packaging tips for unofficial Debian packages
Cisco 7200 Simulator
USB Indoor/Outdoor Thermometer (or, "My first USB device")
GTDGmail - The Firefox Extension that Combines Gmail with Getting Things Done - ...
SourceForge.net: Matrex
unspreadsheet
SourceForge.net: Dual DHCP DNS Server
Vleu.net: Shake
50 State Bluebook Guide
vmwarez.com: A site about Virtualization, Virtual Machines, Server consolidation...
HP.com - HP Virtualization with VMware
NetViewer Demonstration
MDB Viewer Plus
Live View
Main Page - NSMWiki
(IN)SECURE Magazine
The TCP/IP Guide - The TCP/IP Guide
Security Engineering - A Guide to Building Dependable Distributed Systems
Guest Review: Fraser Speirs on “Time Management for System Administrators” | 43 ...
Phlog :: Phunsites Blog » Blog Archive » Installing VMWare Server on Debian Sarg...
RFC 3463 (rfc3463) - Enhanced Mail System Status Codes
ISO Recorder v 2
Check your PHP code at every level with unit tests
Simple Invoices
www.run-virtual.com
HowardForums: Your Mobile Phone Community & Resource
Linux Get list of installed software for reinstallation / restore software | nix...
Index of ftp://ftp.xelerance.com/knownhosts2sshfp/
DMAK
Partition Logic
projects:start [SphereNet Wiki]
FIRST.ORG.MY
How to troubleshoot issues with a Robotic Library or Tape Drive in Backup Exec 9...
Downloads - LiteStep Open Source Installer
LifeClever ;-) » 10 tips for keeping your desk clean and tidy
KLOTH.NET - about radio and internet, DNS lookup, whois, antispam
Contribs.org-News
SlimTimer
Dawn
How to I copy Outlook Express Contacts into Lotus Notes Address Book?
Import Outlook Contacts to Lotus Notes
Linux Box Admin
secret-shamir.pdf (application/pdf Object)
USBSink - File Synchronization over USB for GNU/Linux - Home
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 5
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 4
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 3
VoIPowering Your Office with Asterisk: SOHO VoIP, Part 2
VoIPowering Your Office with Asterisk: SOHO VoIP
surblhost — program to identify spam-related websites
Project Based Calendaring System - Home
SURBL -- Lists
Webmail.us, Inc. | The Email Hosting Company™ | Business Email Hosting
Speaking UNIX, Part 2: Working smarter, not harder
Integrating Oracle with the Windows Active Directory | Dizwell Informatics
Mario Iseli » Blog Archive » Debian GNU/Linux in a Microsoft network? With winbi...
System Administration: Another Step toward the BIND - V | Linux Journal
newsobserver.com | Credit freeze better than insurance for ID theft
Notalon: An Open-Source Cornell Notes Application
Jebi
ignis: the heat-strengthened backup tool
easy TicketManager
Gnumed
extendedPDF creates PDFs with bookmark trees, hyperlinks and notes
Thinking Rock
Linux.com | CLI Magic: Enhance your YouTube viewing pleasure
OpenedHand
The Dude
Very cool.
Getting Things Done Software Systems (Part 1 of 2) - Download Squad
good walkthrough on what GTD is about.
Planet Malaysia Blog » Blog Archive » Bandwidth Monitoring Tools
Linux.com | Printing Avery labels with Linux
Linux.com | Processing RAW image files on Linux
GNU Classpath - GNU Project - Free Software Foundation (FSF)
Jitterbit Open Source Integration - Business Integration Made Easy.
Webmethods replacement?
Being organized means marshalling resources - The Boston Globe
Your Vacation Message: Make It Work for You
Totally Geek :: Network Device Change Control (NDCC)
Steve.org.uk: Free Software - debian-updates - Be notified of Debian package upd...
IEEE Virtual Museum—The history of electricity, electronics, and computers
Network Downloads : FastCache /// AnalogX
Total Internet Anonymity
Linux.com | CLI Magic: Make instant Web banners from the command line
ITH Homepage / IT Harvest - Corporate
VideoHelp.com :: View topic - How to convert TV Series DVD episodes to DivX/XviD...
Wapiti - Web Application Scanner / Black-box testing »
stu.dicio.us
RFC959
Thesis writing in LaTeX
Active Virus Shield - Free Anti-Virus Protection Courtesy of AOL
Lotus Notes Project Management - Tracker Suite
CENIC - CVS Firewall Configuration
IP Ports and Protocols used by H.323 Devices
HP LaserJet 8100 Printer series - HP Jetdirect and Embedded Jetdirect Inside Pr...
IT Resource Center forums - Laserjet 4600n not detecting Jetdirect 615n
615N jetdirect replacement out of warrenty.
System Administration: Another Step toward the BIND | Linux Journal
System Administration: Another Step toward the BIND - IV | Linux Journal
System Administration: Another Step toward the BIND - III | Linux Journal
System Administration: Another Step toward the BIND - II | Linux Journal
Profiles
.:: Open MoveOver ::. The Windows to Linux Desktop Migration Tool
VIRUSTOTAL - Free Online Virus and Malware Scan
Online malware scan
Hacking Exposed VoIP: Voice over IP Security Secrets and Solutions by David Endl...
pound
x11vnc: a VNC server for real X displays
RegLookup Home
Unixsurplus - Great Deals on Sun and Unix Hardware! Home
How to detect proxy server automatically
Norfello - Norfello CMMS Open Source
ProfZone Anteater
LogAnalysis.Org
Computer Repair, Networking, Security & Wireless North of Boston, Southern NH, M...
Zero Surge Surge Suppressors Homepage
How to wire Ethernet Cables
View Quotes - www.chrisbeach.co.uk
SourceForge.net: pcapsipdump
Linux initial RAM disk (initrd) overview
SquidFaq - SquidWiki
What is Categories of twisted pair cabling systems? - a definition from Whatis.c...
SOMAP.org - Security Officers Best Friend - Security Management Tool
Main Page - Wikicars
The Chronicles of George
100% Safe Downloads - SVSDownloads.com
SVS Application Best Practices - Altiris Wiki
Altiris Juice | A Community for Altiris Product Enthusiasts
Linbox Directory Server - Trac
dvdisaster English
Happy Camel
Welcome to logreport.org
DownThemAll!
P___2804.PDF (application/pdf Object)
Processor magazine article on employees buying their own laptop
Certain Programs Do Not Work Correctly If You Log On Using a Limited User Accoun...
The Parallel Virtual File System Project
Diagnostic tools to aid in NetWare environment troubleshooting
Security Configuration Guides
Debian Linux Network Monitoring with MRTG and SNMP
My NetFlow Reporting System - Dynamic Networks
Text* Snippets: TextDrive Snippets courtesy of Peter Coopers handy little app
Security - Active Directory Security Groups for Apache Authorization
Safe Computing at the U
VM Builder
Drive diagnostic utilities compendium - TechSpot OpenBoards
Linux.com | Little-known APT utilities for Debian desktop users
UTF-8 Cygwin - Download
Firefox Portable | PortableApps.com
WinNUT - Windows Network UPS Tools
LDAP Authentication on Debian Sarge HOWTO
Welcome to NANOG!
CrunchyFrog - Database schema browser and query tool
leads4web/4
Conc
concentrator
Podiobooks.com - Serialized audio books in podcast form
PHP encryption for the common man
FreeSWITCH.org :: Open Source Telephony Project
WindowsDevCenter.com -- Registry Hacks for Servers
JGoodies :: Freeware
Asterisk UNISTIM channels - voip-info.org
A Technical History of Apple"s Operating Systems: Introduction
Penguin Feet Content Filtering System
Cell Phone Wireless Recycling, Ink Toner Cartridge Recycling, Fundraising - Recy...
VGA USB 1394 FireWire EVC keyboard monitor mouse port pinout, RS232 DB9 DB25 pin...
Top Ten Tricks and Tips for New IRC Users
Tranglos software: KeyNote
Duplex Issues
TCP Tuning Guide - TCP Tuning Background
nonadmin - Home
CSPP-54015 Advanced Network Design
PERM Project
The Hercules System/370, ESA/390, and z/Architecture Emulator
CPUG: The Check Point User Group
Welcome to INFOMINE: Scholarly Internet Resource Collections
Principia Discordia - S23Wiki
Principia Discordia | the book of Chaos, Discord and Confusion | Fnord!
FNORD
Employment Opportunities
webcast.berkeley | Courses | Schedule
AudioSkin™ Cable Organizer
TECHtionary :: World"s First and Largest Animated Magazine on TECHnology
History of LISP — Software Collection Committee
Linux Reality
Plagger - Trac
Microsoft Virtual Server 2005 R2
free
About GloMoSim
Main Page - Nsnam
Telephone Terminology
Glossary of ISDN and Telephone Terminology
Ohloh
Linux.com | CLI Magic: Creating basic front ends with dialog and Xdialog
OpenOffice Writer: Creating powerful lists using styles
PITA
MDLog:/sysadmin
Endgame:Singularity; an original simulation of a true AI
Rosegarden: music software for Linux
Info-ZIP"s Zip
Iceman1"s KSQLAnalyzer
ncc homepage
How to restore a hacked Linux server | MDLog:/sysadmin
Work at home, home office and telecommuting marketing consultant speaker and exp...
The Chief Home Officer on Squidoo
O"Reilly Network -- Data Protection for LAMP Applications
HotOSS | organize and share OSS notes
NetSmartz.org
Debt Collection Practices: When Hardball Tactics Go Too Far
Fair Debt Collection
Designed in California | An Apple reference
WindowsDevCenter.com -- Best Windows Admin Downloads
Aardvark Digital 2006 - Periodic Table - Education
Telnet Password on Cisco Router to Avoid Error Message Configuration Example [C...
Sysinternals Freeware - BgInfo
Catalyst 4000 Series General Setup
Catalyst 4000 Series Port Setup
Configuring EtherChannel
Cisco Repair - BradReese.Com
Using PortFast and Other Commands to Fix Workstation Startup Connectivity Delays...
Trunking Between Catalyst 4500/4000, 5500/5000, and 6500/6000 Series Switches Us...
Software Configuration Guide (5.5) - Configuring VLANs [Cisco Catalyst 5000 Ser...
Networking: Cisco 2950 VLAN problem
Configuring Ethernet Switching
[cisco-voip] T1 dropoffs.
QoS Cisco - voip-info.org
ScanTool.net - Products
Field Notice: IP Phone in Loopback May Cause VLAN Instability [Cisco 7900 Serie...
How To Configure InterVLAN Routing on Layer 3 Switches [Layer-Three Switching a...
Cisco - Creating Ethernet VLANs on Catalyst Switches
Introduction to VLANs
Routing between vlans | 911networks.com
Password Recovery Procedure for the Catalyst 4500/4000 Supervisor Engine II+/III...
CommonCiscoCommands | Engcomp | TWiki
VLAN management on the Cisco 3524
C and C++, Perl, Networking and more: MAC vendor check
WANdoc Systems
Cisco Quick Tips
PsyncX - Free Backup Software for Mac OS 10
Change Control Manager
unixgu.ru :: advchk
Net Integration Technologies
T R E M U L O U S
How to install a Cisco Router / Firewall
i-doIT
WepDecrypt
SmokePing - About SmokePing
From the creator of RRD. Latency Graphing
OTDRoadmapFinal.pdf (application/pdf Object)
FoxyProxy :: Mozilla Add-ons :: Add Features to Mozilla Software
Net Observer: Blog Travels through a Cisco World
The ELOG Home Page
Cisco - Troubleshooting Cisco Catalyst Switches to NIC Compatibility Issues
BixData | Cluster and Systems Management
Guessnet
OpenDNS | Providing A Safer And Faster DNS
You Had Me At EHLO... : More on Exchange 200x SRS + SRS troubleshooting tips!
Imagination Cubed
Conky - a light-weight system monitor
Virginia jobs - Virginia Beach jobs - Norfolk jobs - Chesapeake jobs - Richmond ...
USAJOBS - The Federal Government"s Official Jobs Site
vmount
GUIdebook: Graphical User Interface gallery
Notice: Illuminated Fault LED on Hot-Plug Parallel SCSI Hard Drive May Not Indic...
Notice: Troubleshooting Process for Parallel SCSI Hard Drives Configured in a Pr...
TaskList.org - List of Windows Proccesses and Descriptions
HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer
Prelude-IDS - The Hybrid IDS framework
BuilderDepot | MegaStore
Lightning Photography pictures photographs weather picture photos photo tips pho...
Scan, copy and fax with your camera phone or digital camera
Free Fantasy Football From Fleaflicker.com
Basic journey of a packet
Frugal For Life: tips:Ants, Bathrooms and Urine Stains
Top 6 Uses for Vinegar that will Save You Money - Frugal - Families.com
Frugal For Life: Poor Man"s Meals
Electronics: An Online Guide for Beginners - Home
Debonaras - Main / HomePage
O"Reilly Network -- What Is a Wiki (and How to Use One for Your Projects)
PHP GEN: Homepage
Index of /~jgoerzen/dfs
A.G. Edwards & Sons, Inc.
tftpd32.exe: a small free multipurpose server including DHCP server and TFTP ser...
System Administrators Toolkit: Migrating and moving UNIX filesystems
Welcome to Granite Digital
Postmaster.Info : Troubleshooting E-mail Delivery
[unisog] Nortel VoIP phone configuration with ISC DHCP
vendor class identifier
NetDirector.org - Home
Blog O’ Matty » Viewing VMWare ESX server configuration data from the command li...
Dr. Dobb"s | Quick-Kill Project Management | June 30, 2006
Postfix Monitoring With Mailgraph And pflogsumm | HowtoForge - Linux Howtos and ...
UMTSmon
does it support evdo
Barcodepedia.com - the online barcode database.
QDB: Quote #244321
QDB: Quote Database Home
Office Depot - Office Supplies, Furniture, Technology
jakilinux.org - english version » SSH tricks
Sendmail Performance Tuning for Large Systems
Civil Netizen Official Download Site - A free, personal file transfer program fo...
GeoFront Webhosting | Services
DNS Hosting, domain name management and registration, dynamic DNS, secondary DNS...
EveryDNS.net is Reliable Free DNS, Static DNS, Dynamic DNS, URL Redirection, and...
Secure DNS hosting and mail services from DNS Park
The Public DNS Service
Free DNS service - Easy, web-based domain manager - ZoneEdit.com
About the K-Lite Mega Codec Pack
Bundle of codecs
The KForge Project
T2t - text to table
OGMRip
TrackStudio -- Hierarchical Issue Tracking, Bug Tracking and Defect Tracking Sof...
Pinot, a metasearch tool for the Free Desktop
Google Cheat Sheets (Version 1.05)
The Windows XP Command Line, Batch Files, and Scripting
Infosecwriters.com
The Lazyadmin.com
ATA-over-Ethernet enables low-cost Linux-oriented SAN
Kernel Korner - ATA Over Ethernet: Putting Hard Drives on the LAN | Linux Journa...
AoE (ATA over Ethernet) Specifications
Linux.com | Reduce network storage cost, complexity with ATA over Ethernet
CDCheck - CD checking and recovery software
Remote Administration For Windows
Main Page - HowardForums Wiki
Welcome to BitPim
s5vi"s homepage
Welcome to MotoModders.net
razr
Oracle9i Database Concepts -- Contents
carnarvon.tigris.org
Silmarill
ttyrpld - TTY replay daemon
Redimido - NTLogon
PHProjekt - an open source groupware suite
Flightview ::: Homepage
FireMaster 2.1 - A Firefox Master Password Recovery Tool »
Airfare Predictions, Find Cheap Airline Tickets - Farecast
Eight key tools for Oracle apps developers
Getting Ready To Send/Receive Email On Your BlackBerry Device (Part III) (Tips)
Getting Ready To Send/Receive Email On Your BlackBerry Device (Part II) (Tips)
Getting Ready To Send/Receive Email On Your BlackBerry Device (Part I) (Tips)
NetworkManager - Linux Networking made Easy
Blog O’ Matty » Monitoring Linux servers with procinfo
Blog O’ Matty » New version of ldap-stats.pl released
Relay: Ajax Directory Manager
Freevo | Freevo
EH.Net Encyclopedia: History of Property Taxes in the United States
The New York Times on the Web: Glossary of Financial and Business Terms
Stephen"s Oracle Blog
Stephen"s Oracle Blog: Does Oracle cache the SYSDBA password?
Principles of Orchestration On-line - Northern Sound Source
Ruminations on Turning 43 - O"Reilly XML Blog
Gnash - The GNU Flash player - Summary [Savannah]
Rugg - Crash test for your hard drive
Thin Client - Citrix and Terminal Services Resource Center
Tokeshi.com :: Citrix Support :: Thin Client Support :: Terminal Server Help
Terminal Services resource site
Squid Performance
bit out-of-date but still useful
» Vulture
Open/Free Realty - Free Real Estate Listing Software
The LISA Project
FreeBSD 6.0 to 6.1 binary upgrade
DODwireless-policy.pdf (application/pdf Object)
NetIQ: ADcheck - An Essential Part of Your Active Directory Toolkit!
HOWTO Rip DVD Movies To Your iPod Using Free Software
Research Systems Unix Group: radmind
Stopping spam with the Anti-Spam-SMTP-Proxy (ASSP)
SSHproxy
krd -kde remote desktop manager
IAM Homepage
ftp.proxy - FTP Proxy Server
SQUID Frequently Asked Questions: Communication between browsers and Squid
rdesktop: A Remote Desktop Protocol client
Apache::ProxyConf - Generate Proxy Configuration for browsers. - search.cpan.org
Cultured Perl: Intro to cfengine for system administration
Main Page - Cfwiki
BigAdmin Feature Article: Centralized Host Configuration With Cfengine, Part II
Turtlecase.com
pSeries and AIX Information Center: Mail queue management
Getting Things Done
System Administration: One Step toward the BIND | Linux Journal
Linux Terminal Servers for Any Business | Linux Journal
The SDF-1 gallery
healthfinder® - your guide to reliable health information
Network Monitoring Tools & Resources - Tutorials - Software - Shareware - Freewa...
NETSYS.COM - The Intelligent Hacker"s Choice - Interscan Tips & Resources (anti-...
BuzzMachine: Dell Archives
DNSHistory | Dee and Steve"s Web
DAG: Dstat: Versatile resource statistics tool
MetalheadWs: tgrep
IkeWiki
xen-tools.org - Xen Software: xen-tools
AirSet - Shared Online Calendars, Contacts and Lists for your Family, Work and S...
TestDisk - CGSecurity
Métamorphose File -n- Folder Renamer - Main
OpenBlueLab.org
fetchconfig - Fetch Configuration
Hands-On How-To
Nail Meetings Down Tight - lifehack.org
About the Rosetta Project — About the Rosetta Project
Deckplans.com - Deck plans for pool and custom decks
Welcome to the LIMSource, the premier information resource for Laboratory inform...
Debating the usefulness. The site is slightly crowded
pm20060621.png (PNG Image, 550x410 pixels)
LIMS Finder: best site for laboratory informatics, LIMS products, LIMS news, LIM...
Welcome to Bika lab systems — Bika Lab Systems
Flow LIMS: Flow Cytometry LIMS
GnosisLIMS
Bioinformatics.Org: Project Info
HalX - Free-source Laboratory Information Management System (LIMS) software
Laboratory Information Management System(s)
NIST Computer Security Division"s CSRC Home page
The Advanced Research Corporation ®
Nikto
How to build your own backyard deck - Lifehacker
Java SE Downloads
BackupPC: Open Source Backup to disk
Open Source Requirements Management Tool
squint - sqnt
How to use your Tapedrive
Identifying different iPod models
Mozilla Firefox Cheat Sheet
Classic Texts In Computer Science
Diet Tips or How To Lose Weight with a Spreadsheet and a Web Site (by Jeremy Zaw...
The Hacker"s Diet
yersinia...
Sendpage
NewsForge | Contributing to FLOSS projects
Linuxdelta: Knowledgeroot
Introduction to linSmith
fatalmind.com | software | ha-tools
Squidalyser 0.2.5
lbd-0.1
checks for load balancing
Computer Science Club of the University of Waterloo: Home
Blog O’ Matty » Securing MySQL installations with mysql_secure_installation
Frucall: Online Comparison Shopping Web site for Mobile Shoppers
Getting Through Customs - Articles
Installing East Asian Language Support Under Windows XP
Debian Backports
Secure Linux/UNIX access with PuTTY and OpenSSH
Pretty pictures
Alkyproject.com - bringing Microsoft Windows programs to Linux and Mac!
Standards and specs: The Interchange File Format (IFF)
UnixLite - A LightWeight Unix Operating System Written in C++
developerWorks : AIX and UNIX : Technical library view
Solio - Portable Hybrid Solar Power Charger
Solar power charger
Google U.S. Government Search
Wow
QEMU
SourceForge.net: VNCTracker
SourceForge.net: DVDripTools
darkstat
MyChineseFlashcards: an open source software for learning, memorizing the 1000 m...
SourceForge.net: XenMan
Best Practical Solutions, LLC: RT: Request Tracker
The helpdesk software
Zeppoo
IBISEYE.com - Your Hurricane Information Center
Lyrical Legacy (Library of Congress)
IT Recruiting and staffing services from TEKsystems
EcoGeek - Home
Netview Staffing
DNS: The Bind Leading the Bind | Linux Journal
DAT - Directory Analysis Tool
maybe Active_Directory
NFSwatch
mysfitt.net :: Syslog-ng Splunk 2.0 FIFO Howto
Tip of the Trade: Bandwidth Monitor NG
Snare EventLog Agent for Windows - Event Log transfer to Snare & Syslog servers ...
Splunk Base
How to recover from a corrupted registry that prevents Windows XP from starting
Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM
DABCC Download FREE Download – ICA and RDP Bandwidth Analysis Tool
DABCC Download Free Citrix / Terminal Services Reboot Tool - Centralis Centinel ...
Opengear - Console servers, serial over IP, and secure desktop management consol...
500 bucks for an 8 port serial console. Wow
EarToner
iSAKwiki - Open Source - Internet Secure Access Kit - Sheild Your Network Withou...
Nifty Roll of squid
Inflight Power Recharger Cables
NewsForge | How to use VMware Player to create your own images
DBench and friends
CAIDA : home
bing
Bruce A. Mah: pchar
Setting up a nagios screensaver
Using the scadm Utility
alphaWorks : IBM Autonomic Task Manager for Administrators : Overview
Project Management Institute (PMI) - The largest project management association
XPlanner Home
Welcome to CERT!
Superuser do for Limited accounts under Windows XP
SAP High Availability for Idiots
Basic Negotiating for Fun and Profit by Steve Pavlina
Armangil"s podcatcher
ExaVault - Remote Backup Supporting Open Standards (rsync, sftp, ftp) and All Pl...
A company offering remote backup
NasBackup :: Backup to the network
cwRsync - General - ITeF!x Consulting
psad
FreeBASIC compiler (a free BASIC compiler) - official page - About [en]
FrontMotion"s Firefox Community Edition
ActiveDirectory version of firefox
Print Migrator 3.1
CRONw - CRON for Windows
Vintela Resource Central - Using VAS with Samba
GetGnuWin32 – Maintaining a Gnuwin32 Package archive
PuTTY: a free telnet/ssh client
Xming Notes
NPR : Podcast Directory
IsiSetup - APT for your config
Wireshark: Welcome
Ethereal
OSRC: The Operating System Resource Center
Electronic Check Conversion
Kings and Queens of the United Kingdom
The Privacy Ecosystem (™ pending)
A P R E S S . C O M
X-Deep/32 X-Server - Interoperability Solutions
The Debconf Programmer"s Tutorial
freshmeat.net: Project details for NVnetbackup
squidGuard - An ultrafast and free filter/redirector/access controller for Squid
DansGuardian - True Web Content Filtering for All
Poesia Project
iftop: display bandwidth usage on an interface
ivarch.com: Pipe Viewer
Consolidation Comparison - home
Western Digital Loyality Program
Seagull: an Open Source Multi-protocol traffic generator
msi2xml - Windows Installer Package to XML Bi-Directional Converter
MSI-Repackaging
smf-zombie :: Sendmail Zombie SPAM Blocker
The Post Punk Kitchen: Vegetarian cooking & vegan baking with no attitude
Hiking in Colorado - www.hikingincolorado.org
The Cast Iron iA3000™ integration appliance enables companies to integrate appli...
I wonder why webmethods never did this?
Consistent backup with Linux Logical Volume Manager (LVM) snapshots | nixCraft
Netdisco - Network Management and Discovery
TeraTerm 3.1.3 - Telnet, SSH2, SSL Client with built in Web Server
Tera Term Home Page
Remastering DSL: A Short HOWTO with a Long Preamble - Linux Forums
Vacations
Wolfpack Empire - Reasons to Play
all about the sheep
TUI White Papers
Hack Tales: E-mail archiving the home-brew way | InfoWorld | Analysis | 2006-05-...
Worldlabel.com - Laser Labels, Inkjet labels, address labels, avery® labels, mai...
The Cool Colors Project
Slowlane.com Stay-At-Home Dad Stay At Home Father Resource
Landscaping for Energy Conservation
Putting Trees to Work | THIS OLD HOUSE
Pipemeter
Synbak | InitZero S.r.l. - IT Solutions
CLISH: Main Page
How do I explain this other then cool
Coda File System
Lotus Notes Calendar FAQ - Faculty/Staff
good end user oriented help
LDAP GURU - Do it right the first time around.
BUILDYOURMEMORY.COM / A mnemonics and memory improvement resource
Windows Live Safety Center: Free online tool for PC health and safety
Linux Timeline | Linux Journal
Download Now: The Free iPod Book 2.0
Sloppy - the slow proxy for dial-up modem speed simulation (slow down)
Bandwidth Calculator, Byte Converter, Bit Calculator - Edoceo, Inc.
NLANR/DAST : Iperf 1.7.0 - The TCP/UDP Bandwidth Measurement Tool
Multi Distro
9 livecds in 1
Brain Burps : IT Capabilities Assessment: free download
NewsForge | Getting started with Wacom tablets in Linux
Zenoss : Home : Open Source Network & Systems Monitoring
Computer Medics of Suffolk
Installing and operating the SAP NetWeaver J2EE Preview
Shell Scripting Primer
Viruslist.com - Analyst"s Diary
Mp3dings
Nessj
start [OpenVAS Project DokuWiki]
Winpooch : Windows watchdog helps to detect spywares and trojans - opensource - ...
Cheap Airfare, Hotel Reservations, Car Rentals - Kayak.com
USB Adapter for CardBus Wireless Modem Cards
Linux, Unix, /etc: The Unix Philosophy
The DevCon command-line utility functions as an alternative to Device Manager
Linux.com | Super-speedy KDE keyboard shortcuts
Bartlby - Next generation of system and network monitoring
RoombaDevTools.com - The place to get all your development and hacking tools for...
Microsoft Exchange Server resource site
Creating Passionate Users: How to be an expert
Cornell Note Taking Method
Bash tutorial
WikiMatrix / Wiki Feature Comparison - Compare them all
FullSync - Home
iSubwayMaps - New York, London, Chicago, San Francisco, Boston, Washington DC Su...
.: UNEASYsilence :. » How-to: Backup Del.icio.us to Gmail
Belcan Corporation
GCALSYNC - synhronize your phone with Google Calendar
FS24-7ltd - A network of IT professionals, engineers and technicians
Computer Specialists Inc. (CSI) - Home
Basic Library Lists - Mathmatics
Common Lisp the Language, 2nd Edition
How to Design Programs
Welcome to the SICP Web Site
FreshBooks - The Fastest Way to Invoice Your Clients
ProcessID Home Page
Appliance Parts from Repairclinic.com - HomePage
APA Research Style Crib Sheet
Portable Rackmount: Portable Server Racks and Cabinets from Rackmount Solutions
9800 Free Fonts, fonts for free, font finder, download free fonts, free typograp...
Home - iFolder
Small Enclosures - techrack.com - TechRack Systems
JDiskReport
LDAP Account Manager
PKR | internet - Taskjitsu
www.lookatlan.com - Network Monitoring and Management Solutions
Unboxing.com
WikiStartEn - Linbox Rescue Server - Trac
31tools.com : ShareToDo
freshmeat.net: Project details for Mathematical Backgrounds
Corporate Information Technologies - Cisco, Citrix, 3Com, Nortel, Linux, and Mic...
nFusion Technologies, LLC - A Computer Hardware, Data and Network Systems Integr...
AddPrinter
Nifty add printer batch file
SAP Help Desk - SAP Help Desk
PBNJ - (P)orts (B)anners N" Junk
HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer
Rogue Scanner
Seige
Testing webservers
SOFTCARE INC.
Online IP CIDR Calculator
Automate Linux Installations with Debian Pre-Seeding
MySQL Cheat Sheet
Browser Security Test
BogoSec: Security Quality Metric
www.crm-ctt.com: the CRM-CTT Project page
OSSEC HIDS - Open Source Security
Squid spyware detection.
HT Editor
Linux/Unix nbench
Memtest86+ - Advanced Memory Diagnostic Tool
Getting Metasploit to run on a Linksys Router - Hackingdefined
FairuzaWRT
SANS™ Institute - Computer Security Education and Information Security Training
Extending MythTV recording space with LVM - O"Reilly Digital Media Blog
GNU Screen - GNU Project - Free Software Foundation (FSF)
Mooch | Abcde
How To Set Up A Loadbalanced High-Availability Apache Cluster | HowtoForge - Lin...
Tail Server - Home Page
tail via telnet
http://lite.ipanto.com
IP address management
InstallJammer - A free, open source, multiplatform installer and builder - Home
jMemorize - Learning made easy (and fun) - A Leitner flashcards tool
OracleEditor.php - Oracle Record Browser and Editor in a single PHP script
Perl Audio Converter (PAC)
IBM Software - Lotus Notes access for SAP solutions
Articles at Epicurious.com
Welcome to GPC News
SSH Proxy Command -- connect.c
deep-ssh
multiple SSH connections
cURL - Tutorial
Interesting reading
VZAccess Manager - Product Search
Whitedust: Understanding Basic Cryptography
Ethical_Hacking_RHartley.pdf (application/pdf Object)
FTester - Trac
fsh -- Fast remote command execution
Scalar
MuniWireless » Blog Archive » 3G/EVDO services not designed for true Internet ex...
The truth comes out. :)
Pete Finnigan - Oracle and Oracle security information
Foofus Networking Services - Medusa
www.GomoR.org: sinfp
In the Trenches
ITT Wiki : Home Page
ITT Wiki : How To Calculate UPS Load For UPS Purchase
Ive been looking for something like this for a long time.
Linksysinfo.org - #1 In External Linksys Support - Content
GigaOM : » The Myth, Reality & Future of Web 2.0
Firefox 1.5 CCK (Client Customization Kit) Wizard
Web Polygraph
DCRP Review: Canon PowerShot S2 IS
PowerShot S2 IS Top Page
American National Standards Institute - ANSI
Serial ATA
System performance benchmark
Mondo Rescue - GPL disaster recovery solution
Debian Administration :: Search and replace across many files with a perl one-li...
Virus Bulletin : Independent Malware Advice
VIRUSTOTAL - Free Online Virus and Malware Scan
AV-Comparatives
CIO Blogs - Tips on the Interview, Skills in Demand and Compensation for IT Job ...
Salveson Stetson Group, Inc.
Ktctool
Download details: Microsoft Baseline Security Analyzer v2.0 (for IT Professional...
V-Grep
Flexbeta - A Guide to Bittorrent
EDI Specs
Ford
sector 7g - PDFCreator
Sean’s Obsessions
Expose Web performance problems with the RRDtool
echoping Home Page
Torpark
Pod CityGuides: Download for FREE
flat assembler
BasicQuery SourceForge Project Homepage
oz2remind
Oggify/Goggify
MSORT
Sussen
WebInject - (HTTP) Web Application and Web Services Test Tool - Nagios Plugin
English grammar - freeTutorials Learning pages - 5-column-system -language schoo...
Advanced techniques for using the UNIX find command
MonAMI
The Hobbit Monitor
Notesgirl : Libby"s Spot
How to Write a Helpful Bug Report
popurls.com | popular urls to the latest web buzz
Home Page of John Nemes
ntop - network top
Argus - Home
WebHome - NTP
1383.pdf (application/pdf Object)
3183.pdf (application/pdf Object)
Vipul"s Razor: home
Postfix Configuration - UCE Controls
Tail for Win32 - Home Page
EtherApe, a graphical network monitor
Garbage Pail Kids World
Traders" Glossary A-C
gada.be
FrontPage - Debian Wiki
Gentoo Linux Documentation -- Keychain
a vsftpd guide and tutorial - vsftpdrocks.org
vsftpd - Secure, fast FTP server for UNIX-like systems
BSI : Software : chkconfig
Food and Nutrition Solutions Series | University of Illinois Extension
Home Resource Efficiency
How to "chroot" an Apache tree with Linux and Solaris
OCS Inventory NG
Debian notes
Linux.com | CLI Magic: Using script to log your sessions
NewsForge | Defeat spam with SpamBayes
MTR
view packet loss at each hop
CivicSpace | A free/open-source community organizing platform
NewsForge | Three rules for safer Wi-Fi away from home
Mantis Bug Tracker
Linux.com | Convert any video file to DVD with open source tools
9-1-1 National Emergency Number Association | The Voice of 911
LinuxDevCenter.com -- Managing Disk Space with LVM
iana-etc . projects . seth w klein
OPEN-XCHANGE : The Collaboration and Integration Server Environment
The Prefix WhoIs Project - WhoB & Layer Four Traceroute (LFT)
FrontPage - Ketchup
ipcam - motion detection and recording program for IP camera"s
guidod - mksite - website look and feel generator
OpenOffice.org Training, Tips, and Ideas
voip-info.org - voip-info.org
Documenting Your Network - Network Services, MOREnet
NagVis - Nagios visualisation addon - Homepage
NagiosExchange: Categories: AddOn Projects: Downtimes
Ssh framework - neuntoeter
Socialist Sushi » portaPuTTY
Winpooch : Windows watchdog helps to detect spywares and trojans - opensource - ...
xpy
Need to look at this
My Fiendish Master Plan
helpdesktalk.com
MySQLForge
Network Protocol Specialists, LLC
SNIA - Storage Networking Industry Association: New to Storage Networking?
Americas
Stanford"s NEW Netspeed Server NDT server
Riverbed Technology
Neat technology
The Burning Man Project :: Welcome Home
Welcome to your Network Nightmare!!!
Neat
Cisco VPN 3000 Series Concentrators Configuration Guides - Cisco Systems
RRDtool - rrdtutorial
AstroGrep
Oh my! Grep for Windows. Grep for Windows
Linux.com | Moving to PDF as a future print job spooling format
InitNG - Trac
About mp3togo
ITNW 1325 - Fundamentals of Networking
Catch (But Don"t Release) with Squid Web Proxying
Linux.com | How to configure a low-cost load-balanced LAMP cluster
CK-ERP InfoWeb: General Description / Demo Site Entrance
Projekty
Main Page - Aircrack-ng
kbarcode.net: Home
RSP Monitoring Tools: Personal Edition
AbsurdlyCool Freebie Finder
Blog O’ Matty » Debugging TCP connections with tcptrace
Website Monitoring
SQLiteManager - Accueil
Smoot Web-based Ajax Diagram and GIS tool
Wiki on a Stick
Xealous Nets
Subnet Calculator
Cfengine - an adaptive configuration engine
Seed7 Homepage
PerlSendmail
Debian Administration Utilities - Every Debian Admin needs
SICM - Simple Infrastructure Capacity Monitor
monit
AFD (Automatic File Distributor)
Cacti: The Complete RRDTool-based Graphing Solution
eb0482.pdf (application/pdf Object)
Rain Barrel Info and Sources for the Pacific Northwest
Sunset :: Travel :: Life in the West
Introduction to DFS
Debian From Scratch
Scientific Linux - Welcome to Scientific Linux (SL)
Caching Tutorial for Web Authors and Webmasters
General Caching Guide but I still relate it to Squid
Cacheability Engine
Transact...
Having problems with your SAP adaptor receiving from your SAP server
To do list, simple, easy, fast, sharable: Ta-da List
Raible Designs ~ We Build Web Apps
Cisco VPNs with the Sharp Zaurus
vpnc - client for cisco3000 VPN Concentrator
SAPadministration.com :: View Forum - SAP Basis / Web AS Administration
How to set up an Ethernet over USB connection between the Sharp Zaurus SL-5000D ...
Unofficial Zaurus FAQ - OESF
All the SAP Online Help in PDFs - Very Easy to Find - A Really Good Tutorial ...
All SAP Transaction Codes with Report and Description
Transaction List
Gourmet herbs, spices, essential oils, potpourri, green tea, catnip - bulk and w...
Public Proxy Servers
Internet FAQ Archives - Online Education
An introduction to MSDOS
batch file commands
onfocus.com | Add a batch of dates to Google Calendar
DSH - dancer"s shell / distributed shell
johnnygizmo - getCals
Geek Pit
Geek Pit: Five-Minutes to a More Secure SSH
CSS Navigation Techniques (36 entries)
100 Science Facts
Shopping List Compendium - Collection of Abandoned Grocery Lists
Home ( DNN 3.2.2 )
ipodjuice.com - change ipod battery replacement battery in 1st second 2nd third ...
Get More Interviews With a T-Letter
I started using this format for my coverletters some time ago. Never really though of it as unique or special. Oh well.
Font guide for webmasters
Welcome to MusicBrainz! - MusicBrainz
WWII German Translation Guide
Welcome to Crawlspace Doors!
The Geekery - Home
Ben Fenster - Classes & Schedules
This guy just has an amazing amount of notes. I wish I was that organized. :)
ACCT E-120 MANAGERIAL ACCOUNTING Home
Joe Brazel"s Web Page
The Math Forum @ Drexel University
VoIPowering your Office with Asterisk—Building a Test Lab, Part 3
VoIPowering your Office with Asterisk—Building a Test Lab, Part 2
VoIPowering your Office with Asterisk – Building a Test Lab, Part 1
Demystifying Regular Expressions - The Linux Information Resource
oob-remote-management.pdf (application/pdf Object)
Zonker"s Greater Scroll of Console Knowledge
Conserver
Legal Case Management
sysstat utility
[Geeks are Sexy] technology news: Freeze your hard drive to recover data: Myth o...
And everyone looked at me like I had lost my mind when I said this would work. :}
yorkspace.com » The Dell De-Crapifier
Rockbox - Open Source Jukebox Firmware
intp.org
O"Reilly Network -- Using Solaris SMF
Build a Secure Logging Server with syslog-ng (Part 2)
Build a Secure Logging Server with syslog-ng
DebCentral - The Center for all things Debian based
File Permissions - The Linux Information Resource
Cufflinks for men,women at discounted cheap prices,silver cufflinks,wedding cuff...
The Budgeting Babe: Can paying off debt hurt your credit?
moreutils
WebInject - (HTTP) Web Application and Web Services Test Tool
Books for MacOS X
Welcome to DenyHosts
OpenSyncro, opensource EAI software for Java, Tomcat & MySQL platform
LinuxTracker :: Linux BitTorrents
Apple - Support - iPod - The Five Rs
Re: Help, my printer port is on fire!!!
VNCCasts
iCalShare - Share Your iCalendars!
Like Merchant Ships: No Flour Brownies
SMC Barricade notes
tws-v3n2.pdf (application/pdf Object)
Search and Download Oracle Database, Application Server, and Collaboration Suite...
Product Technical Notes
Performance Documentation some of it is dated
The weblog of Nathan Lee
I want a Freeware Utility to ... 300+ common problems solved : eConsultant
Sendmail Configuration Settings Unmasked!
Homepage of ZABBIX :: Open Source Application and Network Monitoring Solution
Poet at Work: Walt Whitman Notebooks 1850s-1860s - (American Memory from the Lib...
A Taste of Gardening - University of Illinois Extension
PlainDoc (pd2tex) Home
Evolutionary Timeline
Google Calendar
The google juggernaut (googlenaut?) continues on.
HOWTO Keep a network of Debians up-to-date - BeezNest
Linux // Debian GNU/Linux on a Dell D610
DNS Stuff: DNS tools, DNS hosting tests, WHOIS, traceroute, ping, and other netw...
tnscmd
Welcome to Pentest Limited
Mailmgr
SARG
ServersCheck - - MIB Browser - Freeware
Free?
The Cult - ChuckPalahniuk.net
Fight club
Apcupsd, a daemon for controlling APC UPSes
Download Java 2 Platform, Standard Edition, v 1.4.2 (J2SE)
Box Backup
Re-examining the Suitability of the Raised Floor for Data Center Applications (a...
Lennie Lightwave"s Guide To Fiber Optics - Jargon
Basic Steps in Forensic Analysis of Unix Systems
FORTUNE 500 2006
About You
Lowepro - Home
openCRX - Limitless Relationship Management
20 ways to Secure your Apache Configuration
Service Management Software - service level management background
Pekarna / Seek & Destroy Music Duplicates
FreeRADIUS -- building the perfect RADIUS server
NirCmd - Freeware command-line tool
MX Lookup Tool - Check your DNS MX Records online
Souptonuts: for detailed notes, click on my notes
HipCal - it"s about time
BigAdmin Feature Article: Resources for Running Solaris OS on a Laptop
Sun Microsystems - BigAdmin HCL: Solaris Operating System for x86 Installation C...
Wideman Comparative Glossary of Project Management Terms v3.1
stu nicholls | CSS PLaY | experiments with cascading style sheets
Unix Admin Corner: Why are installs so Slow
Welcome to the 21C Hotel
Router man
» E-mail security: detecting spam (II) » Becoming paranoid » Tips about computer...
import this. » Blog Archive » IPCop-OpenVPN HOWTO
Cascading Style Cheatsheet
Learn CSS Positioning in Ten Steps
Install PHP5 Apache MySQL on Windows : WAMP5
Geek to Live: Set up your personal Wikipedia - Lifehacker
www.centos.org - News - CentOS in the News - It"s L-i-n-u-x, that is an Operatin...
Jobby :: Web 2.0 Style Resume and Skills Tracker
SFBags - WaterField Designs - Home Page
Activity Manager overview
CIO Blogs - Why IT and Users Hate Each Other |
Graphviz
Wired News: Steve Jobs" Best Quotes Ever
Timeline of Apple Macintosh models - Wikipedia, the free encyclopedia
SVG documents label templates using XML
Crutchfield.com - Digital Drive-thru
why_phishing_works.pdf (application/pdf Object)
HP.com - ProLiant networking - Support & Documents
OSSEC HIDS - Open Source Security
thoggen - DVD backup/ripping with style
Apple - iPod - Download
Mandriva Linux Documentation Project: Borges
di - Disk Information Utility
/home/david :: Scripts
Feeding America
T E X T F I L E S D O T C O M
altinity.org
altinity.org: Lessons in .... SNMP trap handling
Super Proxy Script
Good example for load balancing
TriOptic Barcode Labels
Nuxified Forums :: View topic - Roll Your Own Firewall
Solaris - first install
Zaurus Debian TCL howto
Linux.com | Snort on OpenWrt: Guarding the SOHO perimeter
Network UPS Tools
OpenQRM - Open Resource Manager - Home
Is Your Data Encryption Really Secure
IBM Redbooks | IBM TotalStorage: Implementing an Open IBM SAN
Simpson Crazy | Downloads | Simpsons mp3 music
HP Surestore 15 Slot with DLT7000 series - HP Surestore Tape Library - DLT Libr...
OpenGuides
Keepass for Linux (Keepass/L)
KeePass - The Open-Source Password Safe
SSH without password : micro HOWTO by Arun Vasan @ Univ. of Maryland
How to bypass your BIOS Password
Ultra High Security Password Generator
tvRSS - Syndication for your television
Prepping /dev/random in FreeBSD
SquidRestrict - Time Restrictions for Squid
aria2
Rover
Schedule tool for remote access to multiple pcs.
Manpage of anyfs-tools
BASH with Debugger and Improved Debug Support and Error Handling
Ryan"s In/Out Board
Ive seen these done with magnetic boards. Always seemed like something which should be done in software
sharehound
file system indexing
Nautopia: LiveCD Collection
put multiple live cds on a dvd
VoIPowering Your Office with Asterisk – Part 1: Introduction
Frontier: Elite 2 web site
Frontier First Encounters: Alioth Network
Elite - Second game to capture my attention
iPod Diagnostic Mode
IDEMA | The International Disk Drive Equipment and Materials Association
Wire Your House How To
Binary Expressions » Daddy’s Rules
Rands In Repose: Status Reports 2.0
Your Credit Score: How It All Adds Up
Rebels: Painters and Poets of the 1950s
Brochure "ABC of diplomacy"
Two-in-one DNS server with BIND9 | HowtoForge - Linux Howtos and Tutorials
John the Ripper password cracker
Softgun
CmosPwd - CGSecurity
Index of /GPL/ora2pg
Windows 2003 Terminal Services (Part 1)
Dell - Dell Linux - RAID & Storage
Howto remove an user and improve security - O"Reilly Sysadmin
Unix stuff
CD/DVD check tool
GnuCash - Gnucash
Browser ID Strings (a.k.a. User Agent ID)
NewsForge | Command line Perl for sysadmins
Sed - An Introduction and Tutorial
CE Information and Policy Statements
somewhat humorous
Things I didnt know you could do with vi
IEEE Registration Authority - IEEE OUI and Company_id Assignments
HP Web-Based Training
Lulu.com - Self Publishing - Free
Publishing On Demand (POD)
NetBIOS Suffixes (16th Character of the NetBIOS Name)
Working more productively with bash 2.x/3.x
Operating Systems Guides
DHCP Best Practices
BBC - Languages - Learn German
BBC - Languages - Learn French
Cables To Go: Computer Cables, Audio Video Cables, DVI Cables, USB Cables, PC to...
NEMA Chart
iPod Gym - Exercises for your iPod
Electrical Outlets by NEMA Ratings - TWAcomm.com, Inc.
Tag from sbooth.org
Plans - A Good Web Calendar
MasterShaper - Easy traffic shaping and QoS with Linux : MasterShaper
BasKet for KDE: Unstable Development Version
Network Management (ICA40399) | SWAN TAFE C122 Web Log
Main Page - Wikibooks, collection of open-content textbooks
MS Project Tutorials
Smartworks:Free Downloads
MPP2PPR converter to use Project Planner Reader to read the file. Project Planner Reader Need to blog about this
FrontPage - SWiki
FON: WiFi everywhere!
What information to prepare before calling Tech Support for Matrix-UPS fault?
cbl_best.pdf (application/pdf Object)
Cabling Documentation - Best Practices
Dell™ PowerEdge™ Rack Systems
RFC 1855: Netiquette Guidelines
My Settop Box
Linux NetMag - Linux NetMag
DeVeDe
TiddlyTasks - v0.2 for FireFox - based on TiddlyWiki v2.0.6
:: PDF Split and Merge ::
Linux.com | CLI Magic: Tracking system performance with sar
[Scripts] NTP management scripts
Network Monitoring Tools
Troubleshooting Remote Desktop Licensing Error Messages
CUE | Computer-Using Educators
DriverCleaner.net Other Tools
DriverCleaner.net Driver Cleaner Professional Edition
Your How To! - Home
Kinda weird about the adsense thing but atleast he/she is honest about it. :)
View HTTP Request and Response Header
Cacheability Query
Read Go It Alone!
SciTE4AutoIt3 Home Page
DVzine.org - The Dvorak Zine
Order your TypeMatrix keyboard online!
The Slack World, Issue 2, 2005. Slack Notes
IT Manager"s Journal | Introducing COBIT
Open Tax Solver
Presentation Zen: No excuse for tedium: Advice on giving technical presentations
Schools Save with Open Source
Network Wide Updates - Trac
Linux.com | Using versioning for your configuration files
Blah Blah Blog » Linux Terminal Server for Home Media PCs
Automate OS switching on a dual-boot Linux system
Linux.com | Implementing a Postfix mail server with spam and antivirus protectio...
Tips to Secure Linux Workstation | Ayman Hourieh"s Blog
Traditional DNS Howto | HowtoForge - Linux Howtos and Tutorials
Software in Review - Moving Windows fonts to Linux
Adminspotting.net » Stories of Spam, Part 1
ZeeMaps - Hotels and Restaurants
Restaurants, Hotels, Reviews, Restaurant and Hotel Guide - Open List, Inc. - You...
Warren County, New Jersey -- Dining
Choosing Home
Unicode in Japan
Crunch TV
Captain Crunch/ Crunchman
A smarter, but not the smartest, thermostat - O"Reilly Mac DevCenter Blog
Create an iPod Video converter cable -- For Cheap! - O"Reilly Mac DevCenter Blog
Make - Portable Skype HOW TO: Run Skype from your iPod
Andy Budd::Blogography: iTunes Smart Playlists
Upgrading to MythTV 0.19 - O"Reilly Digital Media Blog
HADSL - Home of "FirM"
Administration tool for Lotus Notes
Be smarter at work, slack off - Mar. 17, 2006
Stevey"s Blog Rants: Math For Programmers
BHV - Browser History Viewer
fsvs.tigris.org
Kilala.nl - UNIX Sysadmin
miek.nl - projects - rdup
The Perfect Linux Firewall Part II -- IPCop & Copfilter ::.. | HowtoForge - Linu...
The Perfect Linux Firewall Part I -- IPCop | HowtoForge - Linux Howtos and Tutor...
A sysadmin tip that could save you hours... - O"Reilly ONLamp Blog
Theos Soft - Handy
OOo Off the Wall: That"s Your Version--Document Control in OOo Writer | Linux Jo...
An Introduction to awk | Linux Journal
MuslimHeritage.com - Discover 1000 Years of Missing History
Scintilla and SciTE
PaperCut Software Knowledge Base - Main.ConfiguringSquidProxyToAuthenticateWithA...
InterScan VirusWall Statistics Generator - IScanSG
InterScan VirusWall patch for Debian GNU/Linux
Signal Lost
Q & A: Using Seek and Destroy Music Duplicates
Scmbug | mkgnu.net
PHP Timeclock
Books2burn
OpenBookings.org - Official Home Page
32-Bit Chroot How-To - Ubuntu Forums
Understanding The Spanning Tree Protocol (Part III) (Tips)
Copper or Fiber? What"s the real story for communications cabling?
Fiber Optic Tutorial - Basics: what is fiber optics, fiber vs copper, fiber opti...
HOW TO run two or more Nagios instances on one server
Rob van der Woude"s Scripting Pages: Batch Files, Rexx, KiXtart, Perl, VBScript
OpenQA: Home
ARP Tools [Krzysztof Burghardt"s Home Page]
eicar - European Institute for Computer Anti-Virus Research
eicar - Anti-Virus test file
bookbpdf.pdf (application/pdf Object)
developerWorks : Linux Professional Institute (LPI) exam prep
Creating Repositories and Projects in Subversion: Trunk, Tags, ...
Understanding The Spanning Tree Protocol (Part II) (Tips)
Operator v3.3.20
Darknet The Darkside
Bit9 FileAdvisor - FileName, MD5, SHA-1 Search
IBM Redbooks | IBM Virtualization Engine Platform Version 2 Technical Presentati...
Frysk System Monitor / Debugger
The Webalizer: Download
Simpletons guide to web server analysis
Free Online Spyware Scan - Trend Micro™
TREND MICRO - Free - Portscan
Trend Micro - Virus Map
Trend Micro - Free online virus Scan
DAG: Tunneling SSH over HTTP(S)
SNMP4Nagios::
Siege Home
foo2hp: a linux printer driver for ZJS protocol (e.g. HP Color LaserJet 2600n)
NirSoft - freeware utilities: password recovery, system utilities, desktop utili...
Using Wikis and Blogs to Ease Administration | Linux Journal
[Phoronix] Linux Audio Comparison
Read The Book - John Taylor Gatto
Rands In Repose: Messy Thinking
Indeed | one search. all jobs.
How Products Are Made
Studies in American Humor
The Academy of American Poets
9 tips for running more productive meetings | 43 Folders
Welcome to Boxxet
VMware Virtual Machine Importer 2.0 Beta Program
SCSI expert articles with up-to-date SCSI information: LVD, SE, HVD SCSI Compati...
scsifaq.org - SCSI Info Central
SCSI Trade Association (SCSITA)
SCSI Media Changer and Backup Device Control System
scsi connector types and pictures
::Welcome to JNYSolutions::
Description of Transport Neutral Encapsulation Format (TNEF) in Outlook 2000
RFC 2034 (rfc2034) - SMTP Service Extension for Returning Enhanced Error C
RFC 1893 (rfc1893) - Enhanced Mail System Status Codes
Style Properties
ScienceLogic - Simplify IT Management
Similar to OpenView & Tivoli Looks like the hardware is based on a Custom Dell Systems(maybe clone?).
DokuWiki [splitbrain.org]
Multiple Network Interfaces with Samba
Active Directory Samba - Waikato Linux Users Group
Cable Management Done Right
Excellent Linux E-Book Reader | Stupendous Tales
WinExtra BOSS Freeware Edition - a computer utility toolchest of goodies
Articles
HD Tune
Hardening a Linux server in 10 minutes » The R Zone
Tuning and Optimizing RHEL for Oracle 9i and 10g Databases (Red Hat Enterprise L...
Linux.com | Viewing Word files at the command line
The Screen Program - Linux Forums
Tuning an Apache server in 5 minutes » The R Zone
How to switch an enterprise to OSS, part one
Armagetron Advanced :: a Tron clone in 3D
HardwareLiSter - ezIX
wxChecksums
Niki (english)
gjots - a simple jotter for X11/gtk-gnome
UMLGraph - Declarative Drawing of UML Diagrams
LAT - LDAP Administration Tool
gtkpod - a GUI for Apple"s iPod using GTK2
Index of /~ratz/mpt-status
LSI Raid Status
CoffeeGeek - News, Reviews, Opinion and Community for Coffee and Espresso
Talisker Computer Network Defense Operational Picture
Security Pro Dashboard
Cain & Abel
Wikispaces - A Place To Grow Communities
One Bag (all about packing, luggage, and travelling light)
Main Page - Nscplus
Protection from Spyware, Spam, Viruses and Online Scams | SiteAdvisor
ONLamp.com -- System Administration with ooRexx
time management software :
JAMon - Documentation
System Manager
Manage patches across systems of all types
ffe - flat file extractor
Site personnel de Laurent Coustet (alias ed)
System Info
WiX - FAQ
Planner on Windows
Planner - Imendio Developer Pages
GNU Enterprise
Open Subscriber Home
Open: Open Source Project Management
SourceForge.net: Open Workbench
Open Workbench - Open Source Project Management and Project Scheduling for Windo...
Avoiding Vampire Meetings at blackrimglasses.com
The future of the Palm platform: lessons learned from the Sharp Zaurus (EasyPrin...
Tree Planting | NRCS
Librarians" Internet Index: http://lii.org/pub/topic/taxes
National Gardening Association
World War II Military Situation Maps - (American Memory from the Library of Cong...
Vegetable Gardening In Containers
Singingfish - the audio/video search engine
Main Page - wikiPodLinux
Encyclopodia - the encyclopedia on your iPod
System Administrators Toolkit: Process administration tricks
Download details: Windows Vista Step-by-Step Guides for IT Professionals
The Official ImgBurn Website
SourceForge.net: GTK Ora
Hitachi Global Storage Technologies | Support | Knowledge Base
debsecan
dotproject - Open Source Software :: Open Source Project and Task Management Sof...
somesound.org
WebVocab Home Page
Imperium Galactica 1.0 (Official GameServer) Login
Log4sh
phpSuperMarketTycoon
// packetfence //
joblist
Hari’s Corner » Linux system information app
IzzySoft Oracle Support
Worse is better - Wikipedia, the free encyclopedia
IT Manager"s Journal | What IT managers can learn from software developers
Thinking in Web 2.0: Sixteen Ways (web2.wsj2.com)
JACKS and PLUGS
IPMI HOWTO for Debian GNU/Linux on the Intel SR2300 (Server Board SE7501WV2)
SourceForge.net: IPMItool
The FreeBSD Diary -- Bacula - Digital DLT MiniLibrary - TL891
Welcome to LinkedIn
v12, i11: Advanced Configuration of Nagios
v14, i03: SNMP Trap Handling with Nagios
Jalenack"s AJAX Periodic Table of the Elements
The Ethical Hacker Network - Essential Wireless Hacking Tools
FrontPage - Unattended Wiki
ASUSTeK Computer Inc.-Support-
A8N-VM (CSM) in Linux
sneep
Writing A Business Plan
Linux.com | CLI Magic: Patching the differences
HowtoForge - Linux Howtos and Tutorials | The Open Source Howto Development Web ...
wiki like?
How to write a technical article - O"Reilly Sysadmin
Oedipus Web Scanner Project
SourceForge.net: PersonalBackup
npadmin
Printer tool to check status of network printers.
BigAdmin - Submitted Tech Tip: Responding to Disk Errors on Both Root Mirrors
spiralbound.net » Solaris Disk Partition Layout & Mirroring Scripts
BobCares :: Outsourced Web Hosting Support :: Configuring Apache for Maximum Per...
Tres Hofmeister
freeSSHd - free SSH server
Proxytunnel Project Homepage
aerolitheos
OS/2 still lives.
Munin - Trac
Download details: Windows XP SP2 Support Tools for Advanced Users
Open Source Energy Network ( OSEN ) - Home
Unipage.org - Home of the Unipage format and the Unipage Unifier
UltraVNC
Tab viewer (Yes Im a table junkie) and NTLM authentication
Official VNCon Website - [Main Page]
VNC Central
07_Cloning complex System landscapes Bernd Herth.pdf (application/pdf Object)
Know Your Stuff :: Home Inventory - powered by EZasset
Insurance Information Institute (III)
wikiCalc Alpha Test Home
Spamato Spam Filter System
::: BashBurn - It just works! :::
O"Reilly Network -- Building a High-Availability MySQL Cluster
ONLamp.com -- Network Filtering by Operating System
ONLamp.com -- Introducing Lua
Macsimum News - The "do"s" and "don"ts" of hot spot usage
tanais: How to save £100 (and try not to break something in the process...)
Debian GNU/Linux -- The Universal Operating System
Sharp Ideas: Downloads
Linux4n6.be
Solaris Networking - The Magic Revealed (Part I)
Robots.txt File Tutorial
NewsForge | FOSS for OS/2: Keeping the flame alive
Tech Blabber » The History Of 404 Page Not Found
IBM Redbooks | Security Considerations in Notes and Domino 7
Adult ADD Strengths » Top 10 Advantages of ADD in a High Tech Career
Samba Server Configuration in Debian
DebianHelp.co.uk-Debian help made easy
Brutal Chess Development Blog
Alex"s Firewall ByPasser
Edgewall Software: Trac
Vlad: Software: OSSMON
SourceForge.net: OpenSharePoint Team Service
GPixPod
Simba
Checkmate MP3 checker - Check MP3 files for errors
Active Directory Authentication Notes - Waikato Linux Users Group
Ethereal Capture Filters
SimpleAssets
Feta Efficiently Tracks Assets
SAP Note 47057: R/3 and DHCP
SAP Note 195715: Service connection types "BW RFC" and "BW GUI"
SAP Note 99435
TTS Interactive Demo
HP StorageWorks SSL1016 Tape Autoloader - HP StorageWorks Tape Drives - The Rep...
"To maintain a viable cost structure, HP could not continue to stock multiple colors of what is essentially the same product in our repair centers worldwide."
The Ranger Creed
Chess Quotes
My credit report is in error. How can I fix it? | IndyStar.com
D*I*Y Planner 3.0 (Classic/A5 Edition) | D*I*Y Planner
Shogi Variants: HomePage
Mini Network with a Big XServe Style | MetaSkills.net
All about Linux: A collection of books, howtos and documentation on GNU/Linux fo...
Windows XP installation guide | Michael and Mary"s site
Everything Linux (No Frames Version)
Everything Solaris
APSR - Project
Umbrello UML Modeller
Why Not Python?, Part 4 | Linux Journal
Why Not Python?, Part 3 | Linux Journal
Why Not Python?, Part 2 | Linux Journal
Why Not Python?, Part 1 | Linux Journal
Parallel BZIP2 (PBZIP2)
IMDbPY
HTB-tools: News
ONLamp.com -- Building Decision Trees in Python
O"Reilly -- Free Your Music: How to Convert Digital Audio Files
Bumblebee Instrument Management System : Bumblebee
netrw
¯`·.¸¸.-StIgMa.DyNdNs.OrG·.¸¸.·´¯: My Nagios Contributions
IBM Redbooks | Solaris to Linux Migration: A Guide for System Administrators
ND7 Reviewers Guide
IBM - Supported Configurations of Notes and Domino 7.0
IBM - Upgrade Central: Planning your upgrade to Lotus Notes/Domino 7.0
VERITAS Backup Exec (tm) 10.0 for Windows Servers BEGather - Log File Gathering ...
Common threads: OpenSSH key management, Part 3
Common threads: OpenSSH key management, Part 2
Common threads: OpenSSH key management, Part 1
Trendmicro Scan Engine Updates
Trend Micro Virus Information, virus alerts, advisories, Top 10, antivirus, worm...
Current TrendMicro Verisons
Sprint/Verizon EVDO compared :: EVDOforums.com
How to Perform System Boot and Shutdown Procedures for Solaris 10
Stormy Dusk on Flickr - Photo Sharing!
Digital Camera Resource Page: Welcome
Nikonians: Nikon User Community Digital Film User Nikon Camera Info Nikkor Lense...
ACLs & Delay Pools Under Squid
NagiosExchange: Featured: NagiosOnCD: Summary
kenkinder.com - Using Verizon Wireless EVDO, PC5740, and Linux
LinkChecker - check websites and HTML documents for broken links
midge - adm5120 linux mini distribution: Main
Home | NetMRG
Openoffice.org Label Templates for Ooo Writer free
Natural Handyman"s Caulks and Caulking Page
CPS Project
Monitoring access to Server SQUID | HowtoForge - Linux Howtos and Tutorials
Cheat Knoppix 4 to Improve Performance Part 2. Knoppix Performance Improvement C...
Memory Ten - Computer Memory upgrade RAM memory upgrade PC DDR SDRAM memory Upgr...
mwcollect - Trac
Memo from the Derby Files
Common Malware Enumeration (CME)
Check if Firefox is updated
OpenQRM - Open Resource Manager - Home
TiddlyWiki - a reusable non-linear personal web notebook
Welcome to HR Clean
Windows Alt Key Codes
In Windows Server 2003 and in Windows XP, W32Time frequently logs Event ID 50, a...
The CMS Matrix - cmsmatrix.org - The Content Management Comparison Tool
Neal"s Admin.Notes.: Windows 2003
Time synchronization may not succeed when you try to synchronize with a non-Wind...
tutty.dwalin.ru :: tutty
additional feature patch to putty
Network Administration Tools: GNU/Linux, Windows 2003, Windows 2000, NT, and mor...
Sendmail Configurations
MailScanner
TechCrunch » The Online Storage Gang
Mighty McPilgrim: Broke Mac Mountain
Mark"s Cyber Domicile
Domino Dude | BlackBerry Tips
Coolz0r - Marketing Thoughts » Super RSS Tools
SDN Podcasts
Russell Beattie Notebook » Motorola RAZR V3 Power User’s Guide
Multiple Intelligences
spiralbound.net
Interesting stuff
spiralbound.net » Solaris Useradd Syntax
Add users in Solaris
MRTG - Tobi Oetiker"s MRTG - The Multi Router Traffic Grapher
Learning Solaris 10 » Zones : Unofficial FAQ
Python Humor
Replacing a failed boot disk
metastat
Streber pm - a web based free open source project management tool with php 5 mys...
Nagiosgraph with Windows support at Nerhood Weblog
GNUpod - GNU Project - Free Software Foundation (FSF)
SNMP4Nagios::Home
Crash Course: The ABCs of WPA2 Security | Learn How Wi-Fi Protected Access 2 Wor...
Free Software Magazine - Free Software Magazine
Free Software Magazine - GRUB tips and tricks
The Story Behind Apple"s 1984 Ad
FreeOSZoo download page
:: Authentic Happiness :: Using the new Positive Psychology
Linux Project Notes
Icon Library, a database of Cisco corporate icons for use in Cisco network topol...
How-To: Build a practical HTPC - Engadget
DOS and Windows 3 Utilities
Google Code: Web Authoring Statistics
StopBadware.org
Explore the Linux memory model
The amazing web site of Shakespeare"s Sonnets
CATS - Home
Application Tracking System
http://www.ihackedthisbox.com/pub/papers/sysadmin.txt
PHP Classes - Class: Forms generation and validation
SMTarPit
Sing Along with Mary Beth
MacDevCenter.com: Putting Google Video onto Your iPod
Undervolting a laptop
GNU/DOS
Nakfull Propaganda - Entering the EFI Menu
FreeNAS: The Free NAS Server
The processor wars Part I, “The death of Alpha”: Q&A with Nebojsa Novakovic
PersonalAlpha
SourceForge.net: iPod video encoder
A Leadership Primer from Colin Powell
Events And Errors Message Center: Advanced Search
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh S...
Configuring the Windows Time Service
Trend Micro™ CWShredder™
Inner Algebra - How To Do Algebra In Your Head
Creating a favicon.ico for Internet Explorer 5 and Netscape Navigator 7
png2ico - PNG to icon converter (Linux,GNU,Windows,Unix)
retune
HP iLO Monitoring
New Lost Labyrinth Homepage
Bob the Butcher - It"s just a crash
Distributed Password Cracking
Debian Reference
Kallisys | Newton | Einstein Project
Podget.
YamiPod - Home
nethack.net - netmapr
Solving Sudoku
» Homegrown Audio Books and iPod
Welcome to the GPAC Project on Advanced Content
m4a)
Anti-Spyware Coalition
Emulation to provide windows only printers to a wider range of clients
Linux.com | An introduction to services, runlevels, and rc.d scripts
Create3 - A Newbie Guide to Setting Up Sendmail, Fetchmail and Procmail
The Last iPod Video Guide You’ll Ever Need at Plastic Bugs
SMS Server Tools
SecureApt - Debian Wiki
ScanJet Music
VoIP Service Provider"s Ten Commandments - The VoIP Weblog
developerWorks : Linux : Technical library view
General Protection Fault--The Comic Strip
InterScan VirusWall Userguides
Iscan install for Solaris
VPN Discovery and Fingerprinting Technique
How To: Asterisk Answering Machine : TomsNetworking :
RoadKills CaFe, A GNU/Linux state of mind.: libdvdcss and why we need it?
Free Remote KDE Desktops from CosmoPOD.com
KDE desktop anywhere but does it work through a fw?
Debian Administration :: Installing Debian onto USB flash media with everything ...
Linux Mail Server
x2vnc 1.6.1
MSFN"s Unattended Windows : Introduction
Computer Programming Algorithms Directory
Extratasty Get Your Booze On!
The History of Notes and Domino
Partition images with Partimage and Partimaged « Raoul’s Land Reloaded!
:: The Flux :: World"s First iPod Video Film Festival :: Now Accepting Entries :...
developerWorks : Linux
Common threads: Sed by example, Part 3
Common threads: Sed by example, Part 2
Common threads: Sed by example, Part 1
LoFiMo - Log File Monitor
Project Raptor
Juniper Networks :: Technical Documentation :: ScreenOS Software Documentation
Configuring a NetScreen Firewall: Best practice guideline for the basic setup of...
My French Picture Dictionary (English - French)
index ||| WikiSH, the Wiki engine written in /bin/sh - do.homeunix.org network
What cant be written in shell?
Lustre: scalable, secure, robust, highly-available cluster file system
Speedometer - Bandwidth Monitor
SourceForge.net: Bluediving
Oramon: Home
Need Registration for download. :(
SQL Server Information at SQLTeam.com
ms-sql mssql
PortableApps.com | Your Digital Life, Anywhere™
SANS - Internet Storm Center - WMF discussion and thoughts
The true legacy virus: An image virus is back on the scene (until 1/10/05)
Rules-of-thumb for monitoring Windows NT/2000 and Domino statistics
IBM Redbooks | The System Administrator"s Companion to AS/400 Availability and R...
IBM Redbooks | A Holistic Approach to a Reliable Infrastructure for SAP R/3 on A...
Stephen S. Constantine: Lotus Notes/Domino R5/ND6 Administrator - Home Page
How to create a Juniper/Netscreen VPN in 5 quick s
Quick and Dirty Screen to Screen policy based VPN
FreeS/WAN Project: Home Page
RANCID
Your source for Family Guy episodes
Guide to Lock Picking
ScreenOS Hidden Commands Revealed
Juniper Networks :: Software Documentation for ScreenOS 5.0
iWay : Use your iPod Photo or Nano as a Yahoo! Maps directions viewer!
macteens Magazine - Putting DVDs onto your iPod
Google Maps on iPod Photo
Spaceweather.com Presents: Aurora Galleries
Installing Lotus Notes 6.5 under Wine
Welcome to Badcaps.net!
Small, Fast, Clean, and FREE PDF Reader for Everyday Use
Not opensource but might be interesting
Student Finds a Stolen Thesis by Thinking Like a Thief
Notesbench
The Encyclopedia of Arda
iftop: display bandwidth usage on an interface
Bruce Perens" Open Source Series Series
Main Page - wikiPodLinux
10-2003 SuperCap Battery.pdf (application/pdf Object)
openmss.org | Main / Home Page
Hasbro
Jay R. Wren - lazy dawg evarlast » SSH Connection Sharing, C++ Visibility, Share...
KMaps FAQ - Kmaps
CyberDewey
Links organized via Dewey Decimal System
ONLamp.com: Organizing Files
Organizing Computer Resources
backing up thunderbird / hddsaver.com
Lotus Notes Out of Office Agent, revisited: Part 2
Lotus Notes Out of Office Agent, revisited: Part 1
Java(tm) Optimization and Java Performance Tuning Techniques
KDE Wiki - Performance Tips
Poetry Archive
Frugal For Life: Weekly Inspirational Quotes
Main Page - Wikilaw
FAQ - ClusterSSH
Cite CRM
OCS Inventory NG
grack.com: Welcome to grack.com
The Search for A Good Story: Top 10 System Administrator Truths
FloodSmart.gov: Your premier resource for flood insurance information
10 things you should do to a new Linux PC before exposing it to the Internet
Titration: Project Tracking Software
Neogia - Open Source ERP and CRM Solution
castget
contineo - Open Source Document Management
Fasterfox - Performance and network tweaks for Firefox.
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows XP/...
Finally for Linux!
Ophcrack 2.0 -- The fastest Windows password cracker
Java Tuning White Paper
Sysinternals Freeware - RootkitRevealer
Spice Trade
C-evo, Empire Building Game
Welcome to The Clash of Civilizations Web Site!
KeePass - The Open-Source Password Safe
SSL-Explorer: The World"s First Browser-Based, Open Source SSL VPN
CitrusDB - The Open Source Customer Database CRM Software
DCC Alliance
OBM obm.aliacom.fr
DRIP Central
Linux.com | CLI Magic: More on SSH
io - about
acheron development - BIRT
Avfs: An On-Access Anti-Virus File System
10,024 CleanItGuide 2003.pdf (application/pdf Object)
McCormick - Spice Encyclopedia - Cloves
EULAscan: community-written EULA reviews
Professional Association of Innkeepers Int"l
All about Linux: Adding Windows Fonts in Linux
Setup32.com
Brendan Gregg"s Homepage
Data Encryption — A Must for Today"s Corporations - ITAudit - The Institute of I...
Telnet - SMTP Commands (sending mail using telnet)
How to use Gmail as your SMTP server
Small Business Resources, Business Advice and Forms from AllBusiness.com
A quick AWstats guide « Raoul’s Land Reloaded!
Linux.com | Qmail Toaster makes mail server setup easy
DNRD - Domain Name Relay Daemon
lpr-bash
sendmail Tutorial
Help Desk Portal
Mail Filtering - Introduction
LearnOutLoud.com Free Audio & Video Html- Free Audio Books, Lectures, & Speeches...
Dirk Loss: Windows-Tools on CD-ROM
Portable USB Drive Apps - TheUselessWiki
Eye Movement and Lying - How to detect lies
Debian Backports
OpenTTD - News
Programming E-Books
Adrian"s Rojak Pot
Blocking_Skype.pdf (application/pdf Object)
Federico Mena Quintero - November 2005 Activity Log
O3: The Open Source Enterprise Data Networking Magazine
freesound :: slashdotted for now
Unix Portal:Nexenta OS - Nexenta GNU/Solaris
Dia icons
Cisco PIX Firewall - Practical Guide
cisco vpnclient password decoder
SourceForge.net: CISCO IOS Simulator
Cisco PIX Firewall Basics
Patch Check Advanced
OptiPNG Home Page
IVR Cheat Sheet to Find a Human
SARG
Notes Downloads
NPR : This I Believe
High Performance Enabled SSH/SCP [PSC]
ONLamp.com: TCP Tuning and Network Troubleshooting
Kflickr mt - ThiesenWiki
MySQL Squid Access Report
Frappr!
Google maps enable webbased thingamagiggy
UEG - Robotech Movie - Home
The Robotech Companion
Robotech Lab :: Help us to build free robotech games !
Flex Profile Kit 4.0 is now available! (And it"s still free!)
login scripting on steriods
O"Reilly: What Is Screencasting
The 11-Year Quest to Create Disappearing Colored Bubbles - Popular Science
I Forgot My Administrator Password!
TipMonkies » Blog Archive » The Penultimate Guide to Google Services
ProduKey - Recover lost product key (CD-Key) of Windows/MS-Office
Projects - fakeAP
All about Linux: The Complete Concise History of GNU/Linux
The Orion Sector :: Master of Orion 3
Master of Orion 3 Patcher
The Master of Orion 3 Guardian
Unattended, A Windows deployment system: Welcome
Chris McCafferty: AutoIT: How to Install Windows Software with AutoIT
Good collection of AutoIT install scripts.
Java Silent Installation
Oreon - Network & System Monitoring
Java Tester - Home Page
ModSecurity (mod_security) - Open Source Web Application Firewall
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
nsftools.com - Tools, Tips, and a Weblog about Lotus Notes, Domino, and Java
MIT OpenCourseWare | OCW Home
The Trac Project - Trac
Paymaster - News
Open Source LMS OLAT | About OLAT
linux/arpwatch NG ::
Chrootbin Homepage
What is smtpguard
RainbowCrack Online
"The Washington Monthly College Guide " by The Editors
United States Postal Service - Abbreviations
Knowledge at Wharton
Tax Policy Center
American Petroleum Institute - new section 15F265AB-6808-494F-A418BA6D4B68BD59
TATE ETC. issue 5: The Drink that Fuelled a Nation"s Art
Absinthe: what"s your poison? -- Strang et al. 319 (7225): 1590 -- BMJ
NewsForge | NewsForge presents free OpenOffice.org training videos
The Binary Opinion: How to Secure Windows XP...For Real!
linksys wrt revival
How-to: VMware player modification - hack a day - www.hackaday.com _
Cisco - Cisco VPN 3000 Concentrator FAQ
Debian Linux on the Dell Latitude D600
SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System
Hardmac.com : 12in iBook upgrade
People & Projects Tracking System Splash Page
KlamAV
Shift Work Scheduler
Network Manager
ITIL - ITIL
ITIL | Achieving IT Service Leadership
OGC - IT Infrastructure Library (ITIL)
SBA - Business Plan Basics
The ITIL ® Toolkit
The ITIL Community Forum
Tidybot Home Page
Dell Inspiron 8x00 fan control
Updated Dell D600 tips for Linux
Konfabulator - Gallery of Futurama Charactors
Chapter 1 Oracle and SAP
Vision For Hire: How to "un-brick" a WRT-54G wireless router (and why) -- and ot...
scfdot: SMF Dependency Graph Generator at OpenSolaris.org
Allowing controlled SMTP relaying in Sendmail 8.9 and later
DABCC.com – Citrix, Microsoft Terminal Services, Softricity, and RES Training Si...
Citrix MetaFrame for Windows Servers- Installation and Tuning Tips
VPN Client GUI Error Lookup Tool [Cisco VPN Client] - Cisco Systems
Joern Brabandt"s Blog on SAP and Netweaver - Your own Logo in the SAP screens
Mac VoIP -- VoIP record calls
Greg Goebel / In The Public Domain
The Ungoliant Project Home Page
Hotrod Your Linksys WAP with Linux
Keene Enterprises :: Open Source :: BackupPCd
SchemaSpy
Index of /~ben/funkload
Guido van Robot
Logicalware - Open Source Community for MailManager
Index of /bacula-snmp
Cacti: The Complete RRDTool-based Graphing Solution
Make Firefox Look Like Internet Explorer :: Mozilla Stuff :: JohnHaller.com
Tie-a-Tie.net | Learn How to Tie a Tie
SparkNotes: Today"s Most Popular Study Guides
Apple Rip-offs
Mark Twain
HNS - The Story of Snort: Past, Present and Future
The MINIX 3 Operating System
Home - Berkman Center for Internet & Society
The First Email
Deleting mail from the mail queue
Ryan"s Network Tips
An Introduction to Artificial Intelligence
Linux.com | What do to when apt-get fails
Linux System Startup | Linux Journal
Header Backgrounds - Another Step-by-step Tutorial by Veerle
How to Write a Resume
The CUPS Printing System | Linux Journal
Heating with Oil - Maintenance
HOWTO Use hdparm to improve IDE device performance
.:[ packet storm ]:. - http://packetstormsecurity.org/
Internet Health Report
Business Software Alliance, Promoting A Safe & Legal Digital World
Young Entrepreneur Journey: Random Ruminations on China
Web Sudoku - Billions of Free Sudoku Puzzles to Play Online
Everybody"s Guide to OpenDocument | Linux Journal
FMPro.org - The Ultimate Site For FileMaker Pro
Cricket Home
accounting_forensics.pdf (application/pdf Object)
Linux.com | Advanced Squid
Linux Magazine
zufall
nagcon
IBM Redbooks | Lotus Domino Domain Monitoring
A Comparison of Solaris, Linux, and FreeBSD Kernels at OpenSolaris.org
The Tao of Mac - Python/Grimoire
Procedures (cookbook-style how-to"s)
Linux: My Contributions to free software
http://www.garloff.de/kurt/linux/rescan-scsi-bus.sh
Linux: My Contributions to free software: rescan-scsi-bus.sh
Test SMTP Service in IIS and Exchange
BIND 8 for NT - Is my DNS a Mess? Probably!!
Grauw’s web spot - BitTorrent clients review
HOW-TO - Ethernet Cables
Cisco Device Management
Switchmap
The Cisco-centric Open Source Exchange Community
Linux Training and Certification Classes
Tiny ERP & CRM:
WebCleaner - a filtering HTTP proxy
flactagger
Antispyd Project - An Open-Source web threat filtering solution
PosteRazor - Make your own poster!
Open Source ERP & CRM
KDE Developer"s Corner - Konstruct
ID PAL Label Printer by Brady
Help Desk Software
Cisco IOS Basic Commands
Inverse Multiplexing for ATM Solutions.pdf (application/pdf Object)
Spartan Xilink
Crypto Law Survey
Routers/Switches: Auto config-save to TFTP server on Cisco routers and switches.
IT Baseline Protection
Linux@DUKE: Epylog Log Analyzer
Driftnet
tcpxtract
Foremost
Duffbert"s Random Musings - Troubleshooting Notes Client Crashes
Dane Carlson"s Business Opportunities Weblog - Opportunities, news, and links fo...
SMF-migrate.pdf (application/pdf Object)
NcFTPd: Transfer Log Format
OpenVMPS
Duffbert"s Random Musings - Table of corresponding Notes/Domino 6.0.x and 6.5.x ...
NSLU2-Linux - Main / HomePage
Anton"s Security RSS Feed Watch
The Sleuth Kit
Pass on Passwords with scp | Linux Journal
httping
Assetman Index
IIE - Image Information Extractor
faces
Symantec Security Response - Intelligent Updater Notification Page
Latest updates
History According to Bob | Podcast History | Podcasting Stories of History
Princeton Public Library - African American Genealogy on the Web
Requirements-Led Project Management: What Is the Value of Requirements?
Removing Norton AntiVirus 2003 or earlier by using the Rnav2003.exe removal util...
Mercedes-Benz International - International Home - Entertainment - Mixed Tape
Object Role Modeling
Linux gains lossless filesystem
Linux.com | CLI Magic: Logrotate
NetScreenForum.com :: Index
Bart"s Preinstalled Environment (BartPE) bootable live windows CD/DVD
"How does SSL Work?" from the Ask Dave Taylor! Tech Support Blog
TaskFreak! web based task manager / todo list written in PHP
Tellico - a collection manager for KDE 3.x
sukria.net - Backup Manager - A small Linux tool for making backups.
Government Podcasts | Free Government Information
Librarian"s Resource Center
WirelessAnarchy has arrived - hide the kids.
greg hughes - dot - net - Use Cisco VPN Client on TCP 443 or 80 to solve connect...
kccmp - kernel config compare v0.1 | stoopidsimple.com
welcome to habitat - system garden
pmacct-fe :: a tool for presenting network statistics.
Out S.M.A.R.T (SMART) Your Hard Drive
Wardriving Tools, Wardriving Software, Wardriving Utilities (Wireless LAN Securi...
Good real estate google map hack
WinDirStat Home Page
Ditto, Clipboard Extension
VLC media player - Overview
GraphCalc The Ultimate Windows 2D/3D Graphing Calculator Software
F u t u r e M e . o r g
Linux.com | CLI Magic: p0f
del.icio.us Social Bookmarking - Creating a reusable copy of a "tagged" RSS file
Home CollectiveGood, cell mobile phone recycling
geektechnique.org: How-to hand crank power your ipod...
untitled
Redet
PHPSPELLBOOK
Lillesvin Networks - phpCF
Welcome to the DocMGR Homepage
Schmih Schmah Schmuh - Programs - Odot
Oolite-Linux
I sure do miss elite and i386s
cron-apt
MySQL Activity Report
UFRAW
LMS - LAN Management System
SnortAlog Page
Main Page - SussenWiki
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
ReactOS Homepage - Frontpage
LinuxDevCenter.com: Installing Debian
ReplicatedOracleSAN 082605.pdf (application/pdf Object)
Dataguard.pdf (application/pdf Object)
.:Asterisk VoIP News:. Daily Updated News and Help about Asterisk, VoIP and PBX ...
Notebook Screen Guide
Stompbox Networks
Fastermini.com - Source for Mod, Upgrade and Overclock your Mac Mini
Todd Dailey - Weblog - Blog Archive - Restore your iPod nano to new condition wi...
sunkencity.org
Neckties.com: Men"s Silk Neckties and Bowties
The "Lectric Law Library"s Entrance, Welcome & Tour
BigAdmin Feature Article: Secure Shell: Part 2
BigAdmin Feature Article: Secure Shell: Part 1
Rebuilding Squid on Debian with the logformat patch — Upfront Systems
Re: httpd to squid native log format convertor? from Peter Reif on 2000-01-07 (s...
MozBackup - A utility for creating backups of Mozilla Firefox, Mozilla Thunderbi...
Drivers for SAP printing
Notes reconfigure via INI editing
jbeale-bastillehardening.pdf (application/pdf Object)
Built Green Colorado - Green Builder Program of Metro Denver and all of Col...
A $10 Linux Answering Machine
Beautiful Soup: We called him Tortoise because he taught us.
Cowtacular
[GLPI - Gestionnaire libre de parc informatique]
Stellarium Astronomy Software
Firewall Builder
GNU MDK - GNU Project - Free Software Foundation (FSF)
Using the AirPrime 5220 1xEV-DO card on Linux
lukeSoft .Traf Proxy Server Log Analyzer
isoqlog
newtVNC: VNC for the Newton
A Natural History of the @ Sign: Part One
RFIDAnalysis.org
simplyhired.com | the largest job database on the planet
Expect - Expect - Home Page
Using ftp in a shell script
.netrc
openISP.net September 2005
WSRCC Spam Fighting Page
Welcome to the OpenNMS Project - OpenNMS
LinuxFund.org
SAP Developer Network Wiki
Tunneling SSH over an HTTP-Proxy Server
ASTPP Wiki - Main - HomePage
Tommy"s (SveaRike) homepage
FrontPage - Mercurial
LGames - Linux Games
AutoScan - Network Monitoring and Management Tool
OpenGrade
Prof. Steve Mann
::uberGeek::Toons::Switch to Linux()
Storm Chaser Photography Page
System Rescue with Knoppix
Kalysto - /Utilities/dd_rhelp - (rescue hard disk helper)
webMethods Advantage - supporting the webMethods Community
wMUsers: For webMethods Professionals -- An independent user community
FatWallet Forums - Hot Deals
AnandTech -- Hot Deals
AnandTech: your source for hardware analysis and news
TheIndividual"s Sveasoft WRT54G Firmwares
UBCD for Windows
Docvert [current: 1.0.1]
iReport - OpenSource Java Reporting Tool
xinco DMS™ - Open Source Document Management Systems
Eidetic Document Management System
Jan Setje-Eilers"s Weblog : Weblog
the jackol’s den » htaccess Cheatsheet - Mikhail Esteves
Serial ATA (SATA) on Linux
Successful SolarisTM Performance Tuning
Solaris™ 8 Performance Tuning
airfinder: MAC finder
SourceForge.net: Project Info - PyKanjiCard
dd_rescue
Ddrescue - GNU Project - Free Software Foundation (FSF)
Cmos, LILO, NT passwords - Data recovery
Jpegdump Version 1.18 in Kurts Homepage
Mailinator:Spam Map
Library Success: A Best Practices Wiki - Library Success: A Best Practices Wiki
preprint.pdf (application/pdf Object)
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh S...
The irongeek is really rocking these things out
Home - Confluence
Rover of Windsor - 流浪者: Our Favorite Cheat Sheets
Theos Soft
Linux.com | CLI Magic: the word on wget
Bless
Symmetrix Technologies - Downloads
Crossroads
Mechanoid
SMFS :: Smart sendMail FilterS for SPAM and VIRUS filtration, free virus scan, s...
LAT - LDAP Administration Tool
nepim - network pipemeter
nagiosdigger
SourceForge.net: Project Info - KeePass Password Safe
KC Softwares
FreeDOS | The FreeDOS Project
SuSE mailinglist: Re: [suse-sles-e] Boot Hang with New Installation on Compaq ML...
Notes/Domino 6 & 7 Forum : Date\All (Threaded)
Notes/Domino 6 & 7 Forum : RE: install LN5, LN6, LN7 together
Pink :: Braeburn :: Tracing the history of Computing
After a Disaster: Repairing Your Home
Tom"s Hardware Guide PCs & HowTo: Windows In Your Pocket - Introduction
Beagle - The next generation of Linux desktop searching
Enterprise-Wide Network Management with OpenNMS
Enterprise Expense Reporting Software
robinbowes.com - Converting FLAC files to MP3
HellChess of HellHound
Open Clip Art Library :: openclipart.org :: Drawing Together.
"How do I change the hostname in Solaris 9?" from the Ask Dave Taylor! Tech Supp...
Notepaper Generator
.htaccess tricks and tips.. part one: tasty food for web serving thoughts.
Squid configuration for rsync
encrypting syslogd with stunnel4
Intel Centrino Guide
SmartCard Infrastructure : References & Links
The 29 Healthiest Foods on the Planet
Tiquit Is Quality User Incident Tracking
Linux.com | CLI Magic: locate, slocate, and rlocate
Teach Yourself Programming in Ten Years
Data Tables and Cascading Style Sheets Gallery
Popcasts (BETA) - most popular podcasts at a glance
Localhost
About SoapCrafters.com
Home Wiring Repairs in the Real World
Primer on Gasoline Prices
AAA Daily Fuel Guage Report
Starwarz Rap
TUX | The First and Only Magazine for the New Linux User
Cisco Systems Technical Users Magazine-Packet Magazine - Cisco Systems
Finding Rogue SMB File Shares On Your Network
AppleCrate: An Apple II-Based Parallel Computer
How to write keyword-rich electronic resumes
USENIX - Publications - Compendium of Best Papers
Linux Syslog Server - How To Set Up A Debian Linux Syslog Server
opensourcemac [nothickmanuals.info]
Optimizing Oracle 10g on Linux: Non-RAC ASM vs. LVM | Linux Journal
Partition Logic
Install Oracle10g (10.2.0.1) on CentOS 4.1 (RHEL 4 Update 1) | Linux Gazette
About Ajaqs
SourceForge.net: Project Info - storebackup
freshmeat.net: Project details for zaurus_datebook_to_vcs
SRtool homepage
DIY Xerox Printer Shredder - Overview
Category 5 / 5E & Cat 6 Cabling Tutorial and FAQ"s - the best source for informa...
Script for DB2 Universal Database using REXX: Learn REXX fast
Controlling spam: Advanced SMTP settings in Lotus Domino
Controlling spam: Advanced SMTP settings in Lotus Domino
IBM Lotus software: Lotus Documentation: Lotus Domino 7 (English)
SourceForge.net: Project Info - Nagios-DB
Bill Kearney: Autoconfig proxy settings
Automatically Configure Browsers for Proxy
Proxy Client Autoconfig File Format
John Cowan"s Home Page
Smart Open Source ERP Software Solutions with integrated CRM Software Solutions ...
Barracuda Networks :: View topic - Lotus domino with barracuda
Dell Latitude D600 : Page 1
What to do when your LDAP port"s already in use
LDAP-HOWTO
Customizing your LDAP Directory"s Schema
Designing an LDAP Directory Tree
An Introduction to LDAP
Magazine Cover
SAP Top Sites Ranked By Vote - SAP Training, SAP Consulting, SAP Jobs, SAP Resou...
Lotus User Group
Dr Dave » Spam Karma 2.0
Barracuda Networks :: View topic - OID numbers for Monitor the BSF
Barracuda Networks :: View topic - monitoring & alerts
SourceForge.net: Project Info - PiArmada
Creating a Star Rater using CSS » Blog » Komodo Media
Jon Aquino"s Mental Garden: Audiolicious: Turn Any RSS Feed Into A Podcast, Usin...
Home Tips: The Web"s Most Helpful Home Improvement & Repair Site
Debian Administration :: cfengine [3/3] : Using cfengine in a client/server setu...
Debian Administration :: cfengine [2/3] : An introduction to cfengine rules
Debian Administration :: cfengine [1/3] : A simple overview of cfengine
Version Control with Subversion
gURLChecker project
TaoSecurity
SAGE - System Administrator Job Descriptions
home [Nepenthes - finest collection -]
An Illustrated Guide to IPSec
LinuxDevCenter.com: What Is the X Window System
Boot loader showdown: Getting to know LILO and GRUB
AFP548 - A True Tale of an Xserve install
Get Recipes on your Apple iPod
THC-HYDRA - fast and flexible network login hacker
LWN: Dissertation: Three ethical moments in Debian
Free Software Magazine - How to recover from a broken RAID5
Ultrize timesheet
SAPRFC Homepage
Application Layer Packet Classifier for Linux
Alexandria: a book collection manager for GNOME
CTShaper - Carlos" Traffic Shaper
Guten: A Project Gutenberg reader
Layer Four Traceroute (LFT) and WhoB - oppleman.com
Schroedinger"s Cat
A to Z Home"s Cool (Homeschool) - Homeschooling Information, Free Homeschooling ...
FirstGov.gov: Reference Center -- RSS Library
Traditional Japanese Music--printer friendly version | National Clearinghouse fo...
The Vertical Farm Project @ VerticalFarm.com
myPHR.com - My Personal Health Record
National Clearinghouse for U.S.-Japan Studies
RFC 3164 (rfc3164) - The BSD Syslog Protocol
02 Experiment: Blogs that share subscribers
Network Notepad Homepage
A Plumber"s Confessions : Designing your Active Directory deployment in under a ...
The Gadgeteer - USB 2.0 to IDE Cable Version 2
How to Make a Category 5 /5e Patch Cable
Network_Hardening_Warfare_Strategy.pdf (application/pdf Object)
ThePharmingGuide.pdf (application/pdf Object)
Dan Bricklin: The personal web site of the co-creator of VisiCalc
LFTP - sophisticated file transfer program
Integrigy_OracleDB_Listener_Security.pdf (application/pdf Object)
Oracle FAQ: Oracle Security
myFICO - FICO® Score Estimator
SourceForge.net: Project Info - scooter
SugarCRM - CRM Software - SugarCRM - Open Source Customer Relationship Managemen...
How to configure your router to allow fast BitTorrent downloads - The Peer-to-Pe...
Irongeek"s GUI HP Printer Display Hack
Install On A Partition Simple And Accurate - OSx86
» Best Hacking Tools and Tutorials
Ten Easy Ways to Improve Your Resume
TipMonkies » Blog Archive » Writing Linux firewall rules w/ IPTables
Oracle® Database Quick Installation Guide
Zebra Tables: A List Apart
CSS tests
GData: An Online MD5 Hash Database
Linux.com | Limiting Linux logins
The Code Project - Start Your Windows Programs From An NT Service - System
NewsForge | Best practices for the Linux home office, part 3
NewsForge | Best practices for the Linux home office, part 2
NewsForge | Linux wireless freedom with OpenWrt
Linux.com | CLI Magic: Make time for crontab
NewsForge | Best practices for the Linux home office, part 1
Deep Network Analyser (DNA)
IPplan [IP address management and tracking]
Asterisk@Home
DokFLeed.Net --Security Portal - Oracle TNSLSNR Full Client
ReligionFacts.com - Just the facts on world religions.
O"Reilly: Building My MythTV Box, Part 1: Hardware
O"Reilly: Building My MythTV Box, Part 2: Software
Oracle Database Online Documentation 10g Release 2 (10.2)
Step-by-Step installation manual of DBD-Oracle-1.16 on Sparc Solaris 9 with Orac...
Inlab: Balance
Intuitive Systems: Thoughtful Solutions by Dave Taylor for Teaching, Speaking, W...
Welcome to Project Gutenberg - Project Gutenberg
Sendmail Logging Documentation
:: Spam Filter | Spam Firewall | Barracuda Spam Firewall | +1-416-444-7530 | Sec...
A Comparision of the Size of the Yahoo and Google Indices
Stylegala ★ design | css | standards
/* Position Is Everything */ Modern browser bugs explained in detail!
Ruthsarian Layouts
glish.com : CSS layout techniques
CSS Vault » The Web"s CSS Site
Cascading Style Sheets, Level 2
Listamatic: one list, many options - Using CSS and a simple list to create radic...
CSS From the Ground Up - 1
Web Developer"s Handbook: developing web-sites, exploring own imagination | CSS,...
css Zen Garden: The Beauty in CSS Design
Oranna, GTK based Oracle Client
Configuring and using syslogd
Stichting NLnet; The LogReport Project and the Lire Package
Good diagram of how lire works
Nagios plugins
Mounting ISO images in a virtual CD-ROM drive
WWW.EBOOK911.COM - ( ASP .NET UNLEASHED by SAMS is now available !)
RFC 2196 (rfc2196) - Site Security Handbook
Using Firewalls to Block Spyware?
Spyware Weekly Newsletter :· August 12, 2005
Richard Koch"s web site
Collected Quotes from Albert Einstein
Mapping Sex in America - The Museum of Sex
Flavio’s TechnoTalk » Blog Archive » General purpose computation using a GPU and...
Linux News :: VRAM Storage Device - How to use the memory on GFX board in a diff...
cowdancer - copy-on-write data access completely in userland
The Ur-Quan Masters - News
plan/b | backup from anywhere, to anywhere
WindowsDevCenter.com: What Is a Pivot Table
The Education Podcast Network
Common Content
McMaster University Archive for the History of Economic Thought
The Coolest Car in the World
Airlink Wireless Hacking
UNIX Load Average Part 1: How It Works by Dr. Neil Gunther
SPAM and Unix sendmail
ucdavis
ONLamp.com: Five Tips for a Better sendmail Configuration
Upgrading Sendmail
RHCE2B.COM- Free RHCE Linux Test Preparation Site
Beginner"s guide to armoring Solaris
Google cache version
Unix System Administration - Network Monitoring by Opensysmon
Frugal Book list
Digital Black and White
Installing OpenSSH for Windows 2003 Server - How to get it working
Welcome to openSUSE.org - OpenSUSE
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
Barracuda Networks :: View topic - LDAP verification against a domino server
Apt-Pinning for Beginners
qcterm
Barracuda Networks :: View topic - Better LDAP Filter for Exchange Servers
MPE/iX 5.0, 5.0 Express, 5.5, and Communicator 3000
Dave Glover "Down Under (Oz)" : What Sex is your Computer? Fun/Silly:-)
Synergy
Ext2 IFS For Windows
Laptop Mode for Linux 2.6
Website Uploads with lftp | Linux Gazette
chammer
JHylaFAX - JHylaFAX
Scapy
Pete Finnigan - Oracle and Oracle security information
Google Cache Checking Tool
Network Communication
Technical papers template
3k Associates" HP3000 Publications
freevt3k - An NS/VT terminal emulator for Unix
LDAP Browser - Softerra LLC
Barracuda Forums = Batch File Automatically Backs Up Your Barracuda
Backup the cuda via batch
MTA Basic operations
RegLookup Home
Sun[tm] Patch Check: Save Time Managing Your System"s Patch Level
Solaris - Tuning Your TCP/IP Stack
Patch Check Advanced
The NTP FAQ and HOWTO
coolcommands.com - the search engine for unix sysadmins :: unix commands and scr...
SchilliX - OpenSolaris based Distribution
Mirroring Disks with Solstice DiskSuite
Solaris 8 Jumpstart Setup/How-To
Solstice DiskSuite - Admin"s Guide
Device Mapping on Sun Servers: A Quick Guide
NTsyslog
arch-wp.pdf (application/pdf Object)
III_LispBook_Apr66.pdf (application/pdf Object)
LISP 1.5 Programmers Manual.pdf (application/pdf Object)
How to Be a Leader in Your Field
DSLnuts | DSL Wiring 1
Sushi Lesson: How to eat sushi properly, Part 5 | Bayosphere
How does SSL work? Easy to understand SSL Certificate and HTTPS
Flexbeta - Wireless Data Transmission Security
RadTech Products - CableYoYo - Ultra-thin Cable Management
TweakGuides.com - Firefox Tweak Guide
Sendmail FAQ
untitled
log_analysis
Scrubbing, Shreding, Nuking Old Data
TOOLS & MATERIALS | THIS OLD HOUSE
Home Improvement Tools - Hardware & Accessories : DIY Network
DBA Hacker"s Guide to Solaris
Solaris Performance Monitoring - iostat , vmstat , netstat
Webhistorian by Red Cliff Consulting
Web Historian
Hal"s Low-Tech Homepage
Lots of security related pdfs and other information
SolarisWebcast.pdf (application/pdf Object)
Log Rotation in Solaris
BigAdmin - Submitted Tech Tip: System Log Rotation Utilizing logadm (for Solaris...
Snowfence - a simple firewall for Zaurus
"What is Sarbanes Oxley and why does it change everything?" from the Ask Dave Ta...
"Sarbanes-Oxley affects small businesses too?" from the Ask Dave Taylor! Tech Su...
Corporation Finance: Sarbanes-Oxley Act FAQs
ClamWin Free Antivirus. GNU GPL Free Software Open Source Virus Scanner. Free Wi...
Linux.com | CLI Magic: Regular expressions and metacharacters
Linux, Unix, /etc/: Getting More From Your Shell
Funny Signs: This Week"s Feature
Book Quotes
Free Programming and Computer Science Books
KiXtarting Your Scripts
Linux command line tips
SpiderFoot
Domain Fingerprinting
ntp.org: Home of the Network Time Protocol
WSJ.com - Lawyers" Delight: Old Web Material Doesn"t Disappear
A description of Svchost.exe in Windows XP
What can I delete from my brand spanking new mac mini
ONLamp.com: Live Backups of MySQL Using Replication
WebTst Home
DQ ISSUE 3
NewsForge | Sharing files between OpenOffice.org and Microsoft Office
Loading OPML documents - w3future.com
PowerEdgeForums.com - powered by vBulletin
Chris Linfoot - Site FAQ - Issue 1
Sam Spade
MisterHouse
WRAP Box
OpenGroupware.org
Boing Boing: Microsoft "Genuine Advantage" cracked in 24h: window.g_sDisableWGAC...
Eli"s SharePoint Resources
Running the BIND9 DNS Server securely
viksoe.dk - GMail Drive shell extension
ONLamp.com: Six Things First-Time Squid Administrators Should Know
OPML Editor support: Basic Outlining
OPML Editor support:
BTX Form Factor Info - Article 7 Page 1 - btxformfactor.info
[SUMMARY] rotating squid logs using logadm
startup script of squid on solaris
The BigPond Cable Squid Peering page
mnot: Squij
Mac Mini
Paul Thurrott"s SuperSite for Windows: Windows Vista FAQ
Solaris, Cisco, Firewall, Security Resources by MGMG Interactive
Squid download sitelist
Squid-cache Zero Penalty Hit patch
Squid Cache Purger DOWNLOAD
Wonders of "dd" and "netcat": Cloning OS harddrives
BerliOS Developer: Project Info - apt-history
webcheck: website checker
How to interview and hire people - scottberkun.com
tracert and ping howto
pings out of order
OpenWrtDocs/Customizing - OpenWrt
WRT LCD display mod - hack a day - www.hackaday.com _
Linux, Unix, /etc/: Unix Web Hacks
MacDevCenter.com: Automated Backups on Tiger Using rsync
FRET - helping understand file formats
Mastering the VI editor
Linux Newbie Guide by Stan, Peter and Marie Klimas
Unix Shell Tricks
| www.tecknoxology.com | IRC | Resources | IRC Beginner"s Guide
How To Look Like A UNIX Guru
learn UNIX in 10 minutes
BSD Guides :: Doing Stuff With FreeBSD, NetBSD, OpenBSD, & Mac OS X
NewsForge | Three open source password managers
The HarvestMan WebCrawler
Task Coach
Job Hunter
GanttProject.org - Home
Debian Grimoire: CPAN Debian Packages
Vegetables We Eat
Security inVoIP-Telephony Systems
jigdo (Jigsaw Download) - a download manager for CD/DVD images
NewsForge | Hooking OOo to MySQL
Linux, Unix, /etc/: An Introduction to m4
g3dviewer
Overclockers UK Forums - DSL - Linux USB Key Install Mini How-Too
LSHW
RefreshBlocker for Firefox
Fruity : A Nagios Configuration Tool
Network Monitoring Software LAN, WAN, Routers
Netwhistler
OpenSMART - The Open (System|Source) Monitoring and Reporting Tool
Tstat - TCP STatistic and Analysis Tool
The Unheard Beethoven
LAN/WLAN Interface for Digital Cameras
NSLU2 Linux - HowTo / OverClockTheSlug
Hacked $99 NAS gadget runs full Debian Linux
A History of IBM OS/2: 1991 to 1996 - A WinCustomize Article by Draginol
Frox transparent ftp-proxy home page
Cisco SNMP Object Navigator
Amiga Forever Home Page - Amiga Emulation, Connectivity, History and Support
Roomba Internals
Tomato Nation
Roomba
Roomba Community - Discussing and Dissecting the Roomba
Ad Zapping With Squid
Secure Deletion of Data from Magnetic and Solid-State Memory
Darik"s Boot and Nuke
DoD erase HD
VNC FastPush
Earthmagic.org - Software
About the MD5summer
StackWorks: IRM - The Information Resource Manager
Time Shall Tell - Work Time Tracker
Wing Commander - Privateer Remake
PEAR :: Package :: Services_Weather
How It Works...The Computer
Sean Adams . Com - Electric meter reader
Circuit Monitoring
SAP seeks irrelevant executive | The Register
Windows 2000 on old computers with 32MB RAM
Hacking a SAP Database
SAP Network use
Whitehats.ca - Advanced WGET on Windows
www.fiber-optics.info
The Written Word
How to Use Lotus Notes on Linux with Wine
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
VisualCron - a Visual Cron / task scheduler for Windows
blog.var.cc :: backing up del.icio.us
Offline NT Password & Registry Editor
Review of Sharp Zaurus SL-5500 | Tux:Tops
WPKG, a Windows software deployment tool: About
pocketnow.com - Reviews - JDTeck JD55-PR Cellular Repeater - v3.0
RadTech Products - Portectorz - PowerBook & iBook Port Protector
Microsoft Baseline Security Analyzer (MBSA)
Learning PHP, Part 1
19 inch PC Rack by TykSak of ModZone.dk
HeadCold
db_rootkits_us.pdf (application/pdf Object)
"What"s your credit report saying about you?" from The Real Life Debt Blog
TravelPower Cases (Manual)
PEiD
The Mike Matas Blog: How to make a Life Poster
Just need how to do it in the gimp
Chris Linfoot - Fentun
extracting attachments from C.DAT, WINMAIL.DAT or ATT0001.DAT
broadband » News » Everything You Need to Know About Next-gen Broadband - New DS...
WikidPad - wiki notebook/outliner for windows
Using hp OpenView Omniback II GUI Via Slow Remote Connections (application/pdf O...
Origin of Storms - the blog project
Full Circle: A Brief History of NeXT
Judy"s Book
Macsimum News | Apple & Macintosh Related News Reviews & Opinions
Macsimum News | Apple & Macintosh Related News Reviews & Opinions
IT Resource Center forums - favorite sysadmin scripts you always keep around (3)
Jeff Hunter"s Oracle / Software Engineering Site
GNU GRUB splashimage howto
Unix Crontab - setting up cron jobs using crontab
Monitoring Hard Disks with SMART | Linux Journal
TipMonkies » Blog Archive » GMailFS, GMail drive for Linux
Breaking Firewalls with OpenSSH and PuTTY
Linux.com | A parent"s guide to Linux Web filtering
Home of nuhi - Projects - nLite
InfoSatellite.com - Windows 1.0 to XP: Screenshots
Log4sh
SourceForge.net: Project Info - RunAsAdmin Explorer Shim
a dog named fish - Lego Star Destroyer
History of Wall Street
EVDO Info, Coverage, Tips, News, EV-DO Products, Booster Antenna, 5220, v620, KP...
Database Systems and Tools
TOra
phpOracleAdmin - managing Oracle with PHP
SourceForge.net: Project Info - TOra
www.dsitri.de :: View topic - Guide to ConnectPlus on Zaurus
SanDisk ConnectPlus Wi-Fi 128 MB on OpenZaurus
The UNIX Forums - HP-UX boxes - am I mad?
Using the Oracle Universal Installer
Linux And Non MS OSes - Switching To Linux Checklist - OSNews.com
A Howto but not really more of a mantra, yes?
Macsimum News | Apple & Macintosh Related News Reviews & Opinions
docs.sun.com: Solaris Volume Manager Administration Guide
Recording the Alternate Boot Device Path
CyberGuard | Network Troubleshooting A Complex Process Made Simple
Q & A for Citrix Web Client
HowTo: Build a Complete Citrix MetaFrame Lab with VMware Workstation
Very nice.
Great Citrix vs. Terminal Services Article
Flash Tip: How password changes are communicated between Active Directory sites
User May Not Be Able to Change Their Password If You Configure the "User Must Ch...
docs.sun.com: Solaris Volume Manager Administration Guide
mirror drives
holgermetzger.de - Tips & Tricks
mozdev.org - portablefirefox: index
Solaris Patch Return Codes
Index of /clusters
SunSolve(tm)
CTX434260 - NIC Teaming - HPNICs with Cisco Switches
channel group not port group
NIC Teaming - Compaq NICs with Cisco Switches (EtherChannel) :: Tokeshi.com Thin...
channel group not port group
Flavio’s TechnoTalk » Blog Archive » Filesystem snapshots with unionfs
Burncenter
The Tenth Commandment of system administration
Backing Up And Restoring Your Dedicated Server With SystemImager | HowtoForge - ...
TipMonkies
Taskjuggler - Project Managers Delight - Home
Aris Global - Drug Safety Software, Drug Registration Software, Pharmacovigilanc...
Cyclone Commerce - The Collaborative Commerce Company
Safety and Pharmacovigilance Software for the Global Regulatory Environment
RTFM Education - Tips for Citrix
User settings issues are not resolved when you reinstall or repair Office progra...
How to install Office 2003 on a computer that is running Windows Terminal Server
Thin Client - Citrix and Terminal Services Resource Center
CTX145271 - PN.ini Parameters Deciphered
CTX331178 - Appsrv.ini Parameters Deciphered
Aximsite.com - The Dell Axim Community
OpenNTF.org - Lotus Notes and Domino Open Source Community
.NET Compact Framework Team : Updated list of .NetCF applications and libraries
Home
FreeCol: NEWS
WARZONE2100.COM - The Official Site
vocaro.com Dial Up Networking
..shadowmite: How To Use DUN
plaxoed! » Downloadr v 0.1 available for download! [Mark Jen’s life @ Plaxo]
www.bootsplash.org - introduction
Sed oneliners
How to backup your precious del.icio.us and Bloglines information - AviDardik.co...
Keeping $HOME (or /etc) in Subversion
kaos.theory: fractal blog » Blog Archive » 1001 ways to harden Linux
PrintFu - On Demand PDF printing Service. PDFs to Printed Books Print, Bind and ...
Yummy! Personal PDF Library
browse Zaurus_Project
Hack a Zaurus
Ruby on the Sharp Zaurus
Koshisms
The Lurker"s Guide to Babylon 5
Babylon 5
Babylon 5 Quotes
B5 Spoiler Junkies Archive
Science Fiction Timeline Site . . . Babylon 5 History Page . . .
B5TECH.COM - The Babylon 5 Tech-Manual.
Babylon 5 Encyclopedia
Podcast Bunker -- High Quality Podcast,30 Second Previews
Plot IP
Snort Technical Guide
The Hello World Collection
Must have programs for a USB card | Ask MetaFilter
BrickJournal - the magazine for Adult Fans of LEGO
CSS Panic Guide
Linux in an HP World
Librariana
Real Tech News - Independent Tech » The Truth About Lithium Ion Batteries
Embedded Linux Software Index
docs.sun.com: Browse Product Documentation
Why I teach Eclipse
Notes on SAPDB
SAPdb - Enterprise-class, Open Source Database
The Story of the PING Program
www.Irongeek.com: Irongeek"s Zaurus Security Tools Page
LJ105: | Linux Journal
externe.net/zaurus :: externe.net/zaurus - The latest and the best for your Zaur...
Ian"s Zaurus hacking page
Installing Perl on the Sharp Zaurus PDA
Zaurus Software Index
The K-Zone: Some notes on OpenZaurus
Craig"s Zaurus Stuff - Downloads
Zaurus Kernel Development
Zaurus Synchronization Repository
Zaurus User Group :: Zaurus Users Unite!
Wireless Card Support - OESF
Home - OpenZaurus
Zaurus Information
tekprosystems.com
Rod Waldhoff"s Weblog: Monday, July 21, 2003
Twingine
O"Reilly: Building my MythTV Box, Part 1: Hardware
Human Development Reports
fusor.us | home
Picking a Padlock
WindowsDevCenter.com: Navigating SharePoint
Main Page - LincityWiki
GCViewer
Garbage Collection
An apt-get primer
Home - Using SharePoint
cmdftp
Linux powers low-cost petabyte-level storage
USB multi-card reader woes | MEPIS Support
The table of equivalents / replacements / analogs of Windows software in Linux.
Network Notepad Homepage
123Macmini.com - Mac Mini News - Mac Mini Bracket
The Ninth Commandment of system administration
Xplanet
opencomputing » server side e-mail protection
txt2tags
ProShield - Debian Linux security program
Shell Script Library :: Wicked Cool Shell Scripts: Unix, Linux, Mac OS X, Bash, ...
IT Resource Center forums - favorite sysadmin scripts you always keep around &#9...
Metalshell.com - Source Code Examples ( Last 20 )
FileZilla Homepage - Index
The only ftp client needed
IT Resource Center forums - favourite sysadmin scripts you always keep around......
SAP Blog: MM Reopen posting period - MMPI transaction
AirSet - Shared Calendars, Reminders, Community for Groups and Family
IBM Lotus Notes/Domino Hints and Tips - Hints and Tips for using IBM Lotus Notes...
Collection of programs for lotus. Wow
HEXUS.net : Review : ECS Production Tour 2005: How to build a mainboard, ECS sty...
How does a motherboard become a motherboard?
YubNub
Converting a laptop into a walltop
Moodss and Moomps
capacity planning
Mastering recursive programming
Welcome to HylaFAX(tm)
GNU/DOS
mrbarrett.com
BBC NEWS | Programmes | Click Online | How Skype and Kazaa changed the net
Using Unison to synchronise your work
File Synchronization with Unison | Linux Journal
unison-contributed-binaries/windows
Thursday Reading - Consumerism Commentary - A Blog About Personal Finance
BigAdmin Xpert Session - Solaris 10 OS Installation
Tech-Recipes.com - Add a user from the command line in Solaris
Walking on Windows with a LiteStep
ExplorerXP - Freeware file manager for Win2K/XP
ShellFront :: Where Shells Come Alive!
deviantART: Litestep Gallery
Dusty-Computing.com
Power.org - Home
Installing Adobe Reader 7 without unnecessary plug-ins or add-ons - Tweaks @ San...
Library Policies
Commodities - Materials and Waste Exchanges
nmr-26-kay.pdf (application/pdf Object)
YourEmblem- Make Your Car Unique with your unique set of initials. Better than c...
Homebrew Air Conditioning
The Subaru SVX World Network - powered by vBulletin
Subaru SVX .com
"You"ve got to find what you love," Jobs says
NTAccess replaces lost Windows NT, Windows 2000, Windows XP or Windows Server 20...
check_bl
Flavio’s TechnoTalk » Blog Archive » Hardening Linux: a 10 step approach to a se...
NewsForge | Pipes and filters
Linux Exposed :: The Linux Security and Hacking Resource - Case of a wireless ha...
Digital forensics of the physical memory.pdf
Lotus Geek - The Domino Developer Bell Curve
Wireless LAN security guide - By George Ou
Nagios: Home
Big Sister - Home
SCC
the Bleeding Edge of Snort - Breaking Snort Signatures
mp3splt project home page
HTTP-Request-Smuggling.pdf (application/pdf Object)
HTTP Request Smuggling
Handhelds.org - Open Source Operating Systems for Handheld Devices
Easy Service Marketplace - The Easy Frontend to the SAP Service Marketplace
Deploying the Solaris Operating Environment Using a Solaris Security Toolkit CD
mibDepot: Home Page
Podfeed.net : Podcast directory, podcast and podcasting resource on the web
PeteL"s Blog : 3 Column Layout in CSS
Sun BluePrints OnLine - Archives By Subject
Sun BluePrints OnLine - Archives By Date
Blastwave.org - An OpenSolaris Community Site
Home at OpenSolaris.org
Network Boot Server for SPARC
XML Résumé Library:: Welcome
Solaris Network Install from Linux
Fedora Project, sponsored by Red Hat
www.centos.org - The Community ENTerprise Operating System
Compiled directly from source for that other popular distro.
Knoppix STD: Tools
Damn Small Linux (DSL), 50 megabytes of penguin power
Boot KNOPPIX from an USB Memory Stick
Welcome to the Mepis Docs Project - Mepis Documentation Wiki
MEPIS Knowledgebase - A Community Supported MEPIS Knowledgebase
MEPIS Support | and Development
Mepis Lovers - For those who truly love Mepis!
The Opte Project
Free SAP Training and Tutorials
Planet SAP
SNMP - Simple Network Managment Protocol
IBM - How to Set Up SNMP for Notes Domino 6 in Windows 2000
Federico Pistono | Web design and applications
Linux.com | CLI Magic: Hexdump unlocks mysteries
thespot4sap.com. A SAP Community Website.
Oracle FAQ: SAP R3
ASUG: Welcome to ASUG!
How a Corrupted USB Drive Was Saved by GNU/Linux | Linux Journal
SAP for MIT
Mercury :: mercurysms
Venture Chronicles by Jeff Nolan
SAP Hosting
SAP Basis, ABAP Programming and Other IMG Stuff
Microsoft | SAP
SAP Professional Journal Online
Home
MaxDB™
SAP Fans Home Page: The SAP Fan Club and User Forum
SAP Design Guild -- Usability, User Interface Design & Visual Design
SDN - The SAP Developer Network
Unix Support - Sun - Keeping up to date
Planet Debian
Planet Solaris
Sun Microsystems - BigAdmin System Administration Portal
Planet Sun
Everything Sysadmin
Unix Review
RootPrompt -- Nothing but Unix
Solaris Patch Management: Recommended Strategy
Improving Security
Unix Support - Sun - Checking against patches
SUN patch reporter
Solaris Recommended Patch Installation
SAP INFO
SAPBASIS.ORG Welcome
SAPBASIS.ORG Welcome
SAP Security Authorizations - CMU FIS
Sharp Ideas: Pod slurping
PearPC.net :: News
Twin Mac - Your Dual-Boot x86 Mac Resource
Homebrew Air Conditioning
The Seventh Commandment of system administration
The Eighth Commandment of system administration
Podracer - The winner of the pod race - Home
KVpnc - KDE frontend for various VPN clients
Project Logger: Project Collaboration via Blogs!
The DSPAM Project
The Mint: Home
USB - 2.0, port, Hi-Speed, Wireless, OTG - Everything USB
BuildYourOwnMac.com | Take the Mac into your own hands.
Better Practice Guide - Security and Control for SAP R/3
Better Practice Guide - Security and Control Update For SAP R/3
Anonycat Web Proxy - Free Anonymous Surfing
Acronymn Search engine
Clemens Vasters: Enterprise Development & Alien Abductions - Why 3219?
Ultimate Boot CD - Overview
Bootdisk.Com
TI-89 Central - Emulators
7-Zip
Scott Hanselman"s Weblog : Scott Hanselman"s Ultimate Developer and Power Users ...
smartpm.org
Systems Support | Administration Tools | Network Installations| Solaris | Instal...
Solaris 8 Installation Checklist
Georg"s Brave GNU World - GNU Project - Free Software Foundation (FSF)
Symantec Enterprise Solutions
Linux Terminal Server Project
Business Opportunities Weblog | The Elements of a Good Business Plan
K12Linux in Schools Project - Home Page
KDE-Look.org
Hacking Billy Mouth Bass in Linux
Gmail: Help Center
Home - Sustainable Marketing - Green Organic and Corporate Social Responsibility...
SolarDataCenters.com - Web Hosting For A Better Planet
Home - Locomotive Media - Wind Powered Hosting
Elfon.com Your webhosting partner
Internet at the Speed of Sunlight! | ecoSky
Environmentally Friendly Hosting, Solar Powered Web Hosting, Reliable and Afford...
Tuxcards and KnowIt: Open source outlining
The Slack World, Issue 2, 2005. Slack Classes
Ping Tunnel - Send TCP traffic over ICMP
Version control for non-programmers with Subversion
Building a Linux virtual server
HTTP Time Protocol (HTP)
Osiris | Host Integrity Monitoring
SecurityDocs: Monitoring Network Traffic
Free wi-fi cafes & other wireless hotspots | MetroFreeFi.com
notestips.com :: Cracking WEP in 10 minutes
How To Conduct a Background Check
Freecycle
The Free Speech » Lire - A Log reporting tool installion guide
Get a Clue: Cisco Routers
New Computer Build Settings
Configuring SNMP in Cisco Routers
Welcome to California
ibiblio - The digital library
Internet Archive
Chrooted Snort on Solaris
tattle
ackerTodo
grepmail homepage
sukria.net - Backup Manager - A small Linux tool for making backups.
docs.sun.com: Solaris 8 2/04 Update Collection
Solaris8204
Werkema.com: Software: SpaceMonger
Brian Cryer"s Techie Notes ...
Tor: Download
unix_Passwordless_Login_PDF (application/pdf Object)
sshwindows.sf.net: OpenSSH for Windows
Windows Implementation of RSHD
Clay"s Utilities
Horst Schaeffer"s Software Pages
Hit any mm
TurboSnortRules :: Powered by VigilantMinds
Updating the Flash PROM on the Ultra 1, Ultra 2, Ultra 450, and Sun Enterprise 4...
Caesarea Scenario Club
Untitled Document
Caesar III Strategy Guide
The Governors Retreat
Caesar 2 Hints and Tips by Vaustein!
Caesar 3 Heaven - Senate
Caesar II - The Ultimate Site
Jim Watters - Technical - CD Lamp
Debian GNU/Linux System Administration Resources
Jumpstart.pdf (application/pdf Object)
RS232 Tutorial on Data Interface and cables
MSDN Solution Architecture Center: RFID Enabled Retail Supply Chain
Select a Product
Inside Workflow and EAI : Maintaining the ACID test in long running transactions
Think you know the Apple Newton"s History? Think again
Getting started with RHEL4"s built-in LVM tools
Use the Current Date in a Windows XP Batch File
Lotus Domino Administration in a Nutshell: Chapter 13: Domino Server Tasks and C...
HAVP - HTTP Anti Virus Proxy - The web antivirus solution
A guide to VoIP and Asterisk : Page 1
How to use your Tapedrive
1q04-mic.pdf (application/pdf Object)
Debian on Dell Servers - Confluence
glark
highlightedsearch
SUMMARY: L9 Autoloader configuration
Active FTP vs. Passive FTP, a Definitive Explanation
SCSI FAQ information with questions and answers on LVD/MSE, HVD and SE SCSI
Wireless Security Blackpaper : Page 1
Switching: VLAN"s
VLAN overview notes
www.SNMPLink.org - Other SNMP Links
C R Y P T O N O M I C O N
Japanese Slang
Learning Japanese
Ascii Art Dictionary (Andreas Freise)
Eleven SSH Tricks | Linux Journal
How to draw Celtic knots
The Linux keyboard and console HOWTO
IT cheat sheets for all
Absolutely Del.icio.us - Complete Tool Collection
exploitwatch.org - Exploits
PerlStalker"s SysAdmin Notes and Tools
How to Make a RJ45 Cable Tester
PatchPro Hub
Solaris™ Patch Manager
The Basics Of Telnet
Oracle Tutorials2
Oracle Tutorials
The Perfect Setup - Debian Sarge (3.1) | HowtoForge - Linux Howtos and Tutorials
Music File Processing on Linux
Easy Automated Snapshot-Style Backups with Rsync
Linux Maximus, Part 1: Gladiator-like Oracle Performance | Linux Journal
Reference Library
Introducing Oracle
rdiff-backup
Solaris Security Toolkit
Black Sheep Networks
Solaris Network Hardening
Understanding system log files on a Solaris
Lost Solaris password?
ONLamp.com: Understanding Filesystem Inodes
Certification: Passing the Sun Certified System Administrator, Part I Exam
Certification: Passing the Sun Certified System Administrator, Part II Exam
Glenn Brunette"s Security Weblog
YASSP: Yet Another Solaris Security Package
Memorial Day History
Buddhism -- The Four Noble Truths -- 4 Truths .com
Cluster your del.icio.us bookmarks
Grip -- CD Ripping/MP3 Encoding for Linux
Scott Granneman
LinuxISOtorrent.com :: Linux ISO Torrents
http://www.networkworld.com/news/2005/053005-firefox.html
BlockHosts - automatic blocking of abusive ssh hosts | A C Zoom
The Sixth Commandment of system administration
Asterisk Flash Operator Panel
OpenVPN - An Open Source SSL VPN Solution by James Yonan
WarDriving - Personal Telco Wiki
#/usr/local/bitshift
Wireless LAN Security & Wardriving - 802.11
WarDriving.com
MythTV
Welcome To Community Internet. | communityinternet.us
American Hiking Society
MIT OpenCourseWare | OCW Home
thebroken dot organization
from the shadows -- not tv. dot tv.
WEP Cracking Illustrated - hack a day - www.hackaday.com _
Roadcasting
Basic Guide to Dial-Up Fedora and SuSe - www.reallylinux.com
GNUsound
freeVikings - three monster-clobbers under GNU/GPL
Verizon Treo 650 Picture Transfer Workaround :: Blueserker :: Berserk about Blue...
Solaris Firewall, Example Installation & Configuration
configuration guide
ASZ_ASWPS_Securing_Solaris.pdf (application/pdf Object)
solaris 7
What is Usenet?
NACE
Automated configuration of Nagios Hosts
alienRAID.org - Xserve RAID in non-Apple environments
Four Hundred Guru--Admin Alert: A Lotus Notes Adjustment for Fighting Spam
Serial Links using RS-232 and RS-485
Gas prices average by state
Butterfly Gardening
Wireless DevCenter: Mapping the 802.11 Protocol
The Ten Commandments of system administration, part I
The Second Commandment of system administration
Linux Magazine
redhat.com | Installing Fedora Core on the Mac mini
The Third Commandment of system administration
The Fourth Commandment of system administration
Archives of HP3000-L@RAVEN.UTC.EDU
Spam Marshall - Server based anti-spam, anti-phishing and anti-virus solution fo...
SourceForge.net: Project Info - Perl Audio Converter
How to convert your Windows Server 2003... to a Workstation!
Secure and Private Browsing with Squid | HowtoForge - Linux Howtos and Tutorials
EarthLink IPv6 in the Home
What is Google Bombing?
IT Observer - Top 10 Security Checklist for SOHO Wireless LANs
Make your own RJ45 dongle for many PCMCIA network cards
FrontPage - OpenWrt
WRT54G dot COM :: Your Source for the WRT54G and the WRT Series
Fireplace Construction Information Site
SDN - The SAP Developer Network
Fix SAP OSS Notes
Blogebrity: The List
cheatsheet.pdf (application/pdf Object)
UFO: Alien Invasion - news
Bug Bash
Web Apps Compendium v1.0 || kuro5hin.org
milter-greylist home page
The Fifth Commandment of system administration
Mirrors - Linux From Scratch
The Tim Burton Collective
Dia for Windows
[A] m p a c h e : For the love of music since May 5th 2001
Fou4s - Fast OnlineUpdate for SuSE
Nagios PHP
SVNManager Homepage
smf-spamd :: Sendmail filter for SpamAssassin
SnortSMS Project
Rootkit.nl - Protect your machine
Sussen
Tag Logging Program
Welcome to logreport.org
lire
Logcheck -- Logfile Scanner
SMA - Sendmail log analyser
Will Filters Kill Spam?
UNIX Basics : Examples with awk: A short introduction
sed tricks
Spam
Symantec Knowledge Base
U.S. - Japan Joint Ventures: Problems & Prospects
Heiner"s SHELLdorado
Help! My Mail Server Is Being DoSsed!
Exit0Wiki - Rules Du Jour
Spamassassin rule updater
Logrep - General - ITeF!x Consulting
Sendmail cf/README - Anti-Spam Configuration Control
Reflections on the 25th Anniversary of Spam
How To Crack WEP – Part 1: Setup & Network Recon : TomsNetworking :
Tor: An anonymous Internet communication system
Freeciv - Freeciv
Xconq Web Site
Jason"s Web Thingy: Using VNC over an insecure network with SSH
Initiating an SSH Tunnel From Linux
KDE KMail: Secure Email Through SSH Tunneling
Zaurus links
Demystifying the sendmail.mc | Linux Gazette
Punching holes into firewalls
Main Page - WikiPodLinux
Squid Report Generator
NewsForge | The Fourth Commandment of system administration
SMTM Perl/Tk global stock ticker
FreeOrion
RoadMap: car navigation system for Linux and UNIX
Globulation 2 - Globulation2/Welcome to Globulation2!
Agata Report
sync2cd
www.logwatch.org
Excel add in ASAP Utilities free MS Excel tools. Add ins for Microsoft Excel 79,...
.: UNEASYsilence :. » Blog Archive » How-to: Phreaking your iPod (DTMF)
Sun Install Check Tool
MITRE - Our Work - Technology Transfer - Downloadable Software - Mobile Mesh
Partition Logic - Download
The Security Samurai
Waag Society - TOOOL Lockpick workshops
Steve"s RHCE Study Guide
Sysinternals Freeware - Utilities for Windows NT and Windows 2000 - NewSID
Sysinternals Freeware - Utilities for Windows NT and Windows 2000 - PageDefrag
Sysinternals Freeware - Utilities for Windows NT and Windows 2000 - BgInfo
Chrooted Snort on Solaris
Spyware Warrior (home page)
Similar stories Solaris Containers and Zones pdf
Anti-Malware Resources
Sun Solaris Tips
PublicRadioFeeds.com
CCC | How to fake fingerprints?
Browsershots
Know your Enemy: Phishing
Del.icio.us popular sites
The TCP/IP Guide - Table Of Contents
How To Crack WEP - Part 2: Performing the Crack
Predator at the Chessboard: A Field Guide to Chess Tactics
Essential bookmarks for web-designers and webdevelopers | CSS, Color Tools, Roya...
Server Oriented System Tuning Info
Nagios eventlog plugin for Nagios
PerfParse Home Page
Micro Persuasion: Kensington Lock Kryptonited, Company Silent
Internet News Article | Reuters.com
Grisoft Freeweb: AVG Free Edition
Flexbeta - AVG Free Edition 7.322
They still have a free edition
Notes411 :: Resources - KillDomino - Silent Version. Similar to Killnotes, zapno...
KillDomino after it has crashed
Welcome to Notes411.com
Sandbox - Mail Box Cleaner
How do you get rid of dead mail messages on the server?
Preventing spam mail in Notes/Domino 6
The care and feeding of your SMTP MTA (EasyPrint)
avail.cgi timerperiods patch
service level agreements
Compliance Solutions Advisor :: Managing the Business Risk of Blogs -- Complianc...
Video Resolutions: VGA, SVGA, XGA, SXGA, SXGA+, UGA
Owner"s Manual PDF
Service Manual
aaltonen.us :: View topic - Unofficial Dell Inspiron 600m FAQ
Can_NetWeaver_deliver_everything_I_need_in_the_new_SOA_world.pdf (application/pd...
How_do_I_get_from_todays_architecture_to_NetWeaver.pdf (application/pdf Object)
What_will_Netweaver_deliver_for_me.pdf (application/pdf Object)
Where_should_NetWeaver_fit_into_the_strategic_architecture.pdf (application/pdf ...
Why_do_I_need_NetWeaver.pdf (application/pdf Object)
Tactical_solutions_towards_strategic_goals_overview.pdf (application/pdf Object)
JSI, INC. - Tips & Tricks - Windows Server 2003 / Windows XP / Windows 2000 / Wi...
LinksysInfo - The #1 In Linksys Support and WRT54G Firmware
Tutorial: WRt54G SD card reader mod
What Color Eyes Would Your Children Have?
Mac Mini Surgery
Does Intellisync 5.3.2 support devices using HotSync 6, like the Treo 650 and Tu...
Download details: Windows AntiSpyware (Beta)
Download details: Windows Server 2003 Resource Kit Tools
Welcome to Script Center
OSLectures.pdf (application/pdf Object)
To Bruce Hutton very nice job
docs.sun.com: Solaris 8 System Administrator Collection
Notes/Domino 4 and 5 Forum : Error on Listen function: NETBIOS unit/lana number ...
IBM - Router: "Error Searching Mailbox File mail.box: Insufficient Memory - Rout...
maint46.pdf (application/pdf Object)
Admin guide
IBM - How to Manually Recertify an Expired ID
IBM - Steps to Reinstall a Domino Server or to Move a Domino Server from One Mac...
How does the Treo 650 memory system work (NVFS), and how does it affect me when ...
Palm Focus: PalmOne Treo 650 Compatibility List
Treonauts | Dedicated to your Treo 650 & 600. The Perfect All-In-One Communicati...
Treo650Faq: The Treo 650 Knowledge Base.
The Treo 650 (Can a SmartPhone Become My Main Brain?) Article
Your #1 resource for the Treo Smartphone
Got a Treo go here
Tom"s Hardware Guide Mobile Devices: The PalmOne Treo 650: Did You Say Phone, Ca...
palmOne - Products - Treo 650 Smartphone
Skype for the Treo 650
Flexbeta - Unofficial Windows 98 SE Service Pack 2.0.1
AFP548 - Putting the Fun into Xsan Fundamentals
Xserver raid Review
Apple - Xserve RAID
What Is...every file format in the world - A through E
review of Linux for the iPod
Mac Mini *COMPLETE* Technical Disassembly Documentation (PDF)
Mac Minis Disassembly
how-to record on your ipod (for free) - ipod hacks - ipod.hackaday.com _
PodNova | Better podcast delivery through PodNova. Search or browse the biggest ...
A Faster, Better Behaved Windows XP
How To Steal Wi-Fi - And how to keep the neighbors from stealing yours. By Paul ...
AirSnort Homepage
Default Password List
Linux on the WRT54G
Default Router Usernames and Passwords
Unison File Synchronizer
Wired 13.05: Cracking the Real Estate Code
Audacity: Free Audio Editor and Recorder
Power Shell Usage: Bash Tips & Tricks
foldedspace.org: Get Rich Slowly!
SSH, The Secure Shell: The Definitive Guide
The snailbook
Setting up passwordless, passphraseless ssh
The history of PDAs
Mac Mini FireWire Hard Drive Performance
Pocket PC Software suggestions | Tux:Tops
File System Forensic Analysis: PC-based Partitions
Linux in Government: Optimizing Desktop Performance, Part I | Linux Journal
Christoph Kugler Brightmail Presentation
Nice and High level
Browseable Online Backup Systems (BOBS)
Gambas - Gambas Almost Means Basic
Gmail as an online backup system - iBlog - Ilia Alshanetsky
Free Pascal - Home Page
AMANDA, The Advanced Maryland Automatic Network Disk Archiver
Bacula, the Network Backup Tool for Linux, Unix, and Windows
JPackage Project
Linuxmafia.com Knowledgebase -
SSH public key authentication.
Twisted Thought » Brightmail 6.01
Linux USB
USB.org - Welcome
Dan"s misc tech tidbits page
Cisco Ethernet Switch Procedures
Sendmail Home Page
Red Hat Enterprise 3.0 for Linux: Security Recommendations
Symphony Operating System
ONLamp.com: Setting up a Secure Subversion Server
FCCU GNU/Linux Forensic Boot CD
Cooperative Linux
Run linux kernel along side windows
TikiWiki : Winik
Linux on windows distro
GmailAgent - a local email client for Gmail
Tuxrip
HOW-TO: WRT Client Mode - hack a day - www.hackaday.com _
CDBurnerXP Pro - freeware burning solution | Home / News
Automating deployment with Subversion : Page 1
Lenz Blog
"Ubuntu Linux, Yellowdog Linux and Mac OS X, all on one PowerBook?" from The Int...
Oracle Default Ports
OR Soft - Advanced Planning Board for SAP R/3
Wired News: Blank Discs Not Created Equal
Schneier on Security: Combating Spam
Microsoft-Free Home Part 4: The Linux HTPC--ExtremeTech Build It
The Unofficial Fedora FAQ
SecurityFocus HOME Infocus: SSH Host Key Protection
NRH-up2date : the open-source up2date server
SecurityFocus HOME Infocus: Web Browser Forensics, Part 2
SecurityFocus HOME Infocus: Web Browser Forensics, Part 1
sshworm.pdf (application/pdf Object)
NMS @ MIT CSAIL: Secure Shell Shock
Zultys Technologies - Datasheet-MX30
FireTune: Speedup, tweak, optimize and tune Firefox easily - faster browsing, fa...
How To Upgrade RedHat Using RHN
Ron Nicholson"s Palm OS Computing Information Page
Vulnwatch: KSpynix ::: the Unix version of KSpyware? (Proof Of Concept)
Battle for Wesnoth
Spice Trade
Debian is Different
Seven Criteria for Evaluating Open-Source Content Management Systems | Linux Jou...
voip-info.org : Asterisk Linksys WRT54G
OpenWrt
Asterisk on OpenWRT part 2 - Lest Blood Be Shed
Free Online Graph Paper / Grid Paper PDFs
NSLU2 Linux - Main / HomePage
Review: Deep Inspection Firewalls
Mad Mac mini multimedia machine, Part 1: Load Linux on the Mac mini
Multivalent pdf Tools
HTMLDOC PDF-o-matic - Easy Software Products
make pdf of webpages
Acrobat/PDF Resources
Good collection of pdf related tools
Chris Linfoot - Getting started with enhanced mail rules
HOWTO: How to create mini kickstart CD for FC3
ynp"s Web Site - Solaris/x86 Page
Solaris Advanced System Administrator"s Guide, Second Edition:Table of Contents
Using Solaris™ RBAC
Solaris Infrequently Asked Questions
PublicVPN.com
Solaris Hints and Tips
The mrEriksson-Network
Sun-Specific Sendmail Issues
Creating Solaris Packages
Celeste"s Tutorial on Solaris 2.x Modems & Terminals
Solaris Tips and Tricks
SecurityFocus HOME Infocus: Solaris 10 Security
Guide to armoring Solaris 8
ITworld.com - The Solaris Security FAQ
Installing Sun Solaris Intel 9 UNIX For x86 PC Installation
Interview with Siem Korteweg: System Configuration Collector - The Community"s C...
SCC
Apache Tutorial: .htaccess files
Solaris Operating System - Freeware
Open Source tools/libs etc
SunOS & Solaris Version History
Little out of date
Customer Support - Product Documentation
Solaris x86 laptop list
Solaris troubleshooting
lookandfeel free software -- SAM Jr
EasyTAG - Tag editor for MP3, Ogg Vorbis, FLAC, MusePack and Monkey"s Audio file...
sunhelp
Solaris - Tuning Your TCP/IP Stack
Solaris Security Guide
OpenSolaris.org
Phil"s Solaris hints
Solaris Internals
docs.sun.com:
SunSolve Home
SecurityFocus Printable INFOCUS 1768
Snort IDS Signatures for SQL Injection, Cross-site Scripting,
How to modify and write custom Snort rules
Sean"s Toolchest
B o r a n C o n s u l t i n g : Good reads...
Writing rules and understanding alerts for Snort
Hentges.net / Misc / Openzaurus
OpenZaurus
SUMMARY: gcc problem in compiling Libpcap & Snort under Solaris 8
brandonhutchinson.com -- Linux, Solaris, and general UNIX notes.
NewsForge | Get rid of pesky backgrounds with the GIMP
Linux.com | CLI Magic: rsnapshot
Solaris x86
Linux Magazine : And Now, Something Completely Different
GROKLAW The Daemon, the GNU, and the Penguin - Ch. 7
Solaris on Intel - x86 FAQ
Solaris Package Archive
Solaris Central - News and Information for Solaris Users and Administrators
Solaris 2 FAQ
Freeware for Solaris
Ethereal
Ethereal User"s Guide
Google Groups : news.admin.net-abuse.email
Brightmail Spam Filtering Test
oracle_standards_and_procedures.pdf (application/pdf Object)
ISDweb | Documentation | E-mail | Concepts | Brightmail | Frequently Asked Quest...
Linux Magazine: Securing Your Environment: Part 2
Symantec Enterprise Solutions
Trial form
Michigan Engineering - Brightmail Anti-Spam
Symantec Enterprise Solutions
Bunny suicides
Home - The home of Spybot-S&D!
Ad-Aware SE Personal - Software - Lavasoft
TightVNC: VNC-Based Free Remote Control Solution
Setting up TightVNC and SSH on a Windows NT machine
plumbing home improvement repair remodel
Mrs. FIXIT Home Repair & Household Tips
Hybrid Center
Dissassembling the Oracle Redolog
Version Control with Subversion
Podcasting - wiki.ucalgary.ca
The Voice (over IP) of Reason - The VoIP Weblog - voip.weblogsinc.com _
Oracle and SAP - Development Update 11/2003
C++ Programming HOW-TO
Unofficial Ubuntu 5.04 Starter Guide
Oracle on HP-UX – Best Practices
State of Spyware
PARISC-LINUX
HP-UX Security Guide
The LiveCD List
HP-UX Reference (Manpages)
The OpenPA Project
SMUG? What Is It?
Index of the HP Encyclopdeia
HP: HP-UX Forum - Tek-Tips
Securing an HP-Unix Production Server
Interex -- Publications
HP-UX 11i, the Proven Foundation for the Adaptive Enterprise
comp.sys.hp.hpux FAQ
Porting And Archive Centre For HP-UX
Organic Lawn Care For the Cheap and Lazy
HP OpenView OmniBack II system requirements
Beechglen Development Inc. - Omniback DB Maintenance
Beechglen Development Inc. - HP-UX Technical Articles